Re: [OAUTH-WG] draft-ietf-oauth-dyn-reg and bearer tokens

2013-06-06 Thread Tschofenig, Hannes (NSN - FI/Espoo)
Because bearer tokens have a stable RFC-numbered spec and are widely implemented and the registration flow as documented seems like it should work? -T That’s the answer for why there is support for bearer tokens but it is not the answer to why that’s the only supported mechanism. If we want to

Re: [OAUTH-WG] draft-ietf-oauth-dyn-reg and bearer tokens

2013-06-06 Thread John Bradley
There are a couple of reasons. One criticism Hannes and others make of OAuth specs is they are not tightly profiled enough to be interoperable without further out of band configuration and profiling. Making registration work with minimal ambiguity was a priority for Connect and that has ca

Re: [OAUTH-WG] draft-ietf-oauth-dyn-reg and bearer tokens

2013-06-06 Thread Tschofenig, Hannes (NSN - FI/Espoo)
That's fair, John. Having a mandatory-to-implement mechanism in place is certainly useful. Pushing stronger security mechanisms to other specifications is also fine. It would be good to re-read the document to see whether we can actually fit the currently worked on security mechanisms into the

Re: [OAUTH-WG] draft-ietf-oauth-dyn-reg and bearer tokens

2013-06-06 Thread John Bradley
On the face of it I think adding proof of possession aught to be possible. The hard part will be that those mechanisms assume a registered client. I think the trick will be not crating a circular registration problem. Adding the other token types to the RS will be simple in comparison. Joh

[OAUTH-WG] OAuth2.0 Interop event at MIT (Oct 31 - Nov 1, 2013)

2013-06-06 Thread Thomas Hardjono
Folks, Roland and I are planning for an OAuth2.0 Interop event at MIT Campus (Boston, USA) during the week prior to the IETF88-Vancouver. The event will be co-sponsored by ISOC and MIT-KIT. Here's some more info: (1) Dates: Thursday-Friday Oct 31 and Nov 1, 2013. (2) Venue: MIT Campus, Ca

Re: [OAUTH-WG] Redirect_uri: provided at the client registration, missing in client redirects

2013-06-06 Thread John Bradley
Perhaps it is better to say that from a security point of view a client must only be redirected back to a URI that exactly matches a pre registered redirect URI. The reasons for that should be clear from Facebooks recent issues with trying to pattern match. In the instance where there is exact

Re: [OAUTH-WG] draft-ietf-oauth-dyn-reg and bearer tokens

2013-06-06 Thread Manger, James H
John, Why is the circularity of registration any different for a non-bearer scheme? A developer browsing a service portal can grab an id & secret, just as easily as grabbing a bearer token, to configure into an app as the initial access token. A client registration endpoint can return an id & s

Re: [OAUTH-WG] draft-ietf-oauth-dyn-reg and bearer tokens

2013-06-06 Thread Phil Hunt
As I've said before the initial auth token should nothing to do with auth. It is simply an assertion given to the developer to distribute in order to pass on signed claims about the software. Bearer or not bearer is a distraction. The fact that the contents and format of this token is out of s

Re: [OAUTH-WG] draft-ietf-oauth-dyn-reg-11 section 4.1

2013-06-06 Thread Justin Richer
We added this text to give examples of how to form the URL so that server developers would be able to see common patterns. Without this text, I heard from developers who thought that it *must* require a client_id query parameter, or that it *must* be a URL template, or that it *must* be differe

Re: [OAUTH-WG] draft-ietf-oauth-dyn-reg and bearer tokens

2013-06-06 Thread John Bradley
We haven't defined the various proof of possession tokens yet. It may be that there are different registration requirements for clients being issued those tokens. It is possible that the client must have registered and pushed a public key to the AS before it is issued a HoK token. It may be j

Re: [OAUTH-WG] draft-ietf-oauth-dyn-reg and bearer tokens

2013-06-06 Thread Justin Richer
James, thanks for the review. On 06/06/2013 12:06 AM, Manger, James H wrote: BEARER tokens dominate OAuth 2 deployments today, but OAuth 2 is deliberately extensible to support other sorts of credentials (eg MAC authentication). Why is draft-ietf-oauth-dyn-reg hardwired to only support BEAR

Re: [OAUTH-WG] Redirect_uri: provided at the client registration, missing in client redirects

2013-06-06 Thread John Bradley
Inline. On 2013-06-06, at 5:54 PM, Sergey Beryozkin wrote: > Hi > On 06/06/13 14:38, John Bradley wrote: >> Perhaps it is better to say that from a security point of view a client must >> only be redirected back to a URI that exactly matches a pre registered >> redirect URI. >> >> The reasons

Re: [OAUTH-WG] draft-ietf-oauth-dyn-reg and bearer tokens

2013-06-06 Thread Justin Richer
On 06/06/2013 11:20 AM, Phil Hunt wrote: As I've said before the initial auth token should nothing to do with auth. It is simply an assertion given to the developer to distribute in order to pass on signed claims about the software. Phil, as I and several others have explained previously, tha

Re: [OAUTH-WG] draft-ietf-oauth-dyn-reg and bearer tokens

2013-06-06 Thread Justin Richer
On 06/06/2013 10:48 AM, Manger, James H wrote: John, Why is the circularity of registration any different for a non-bearer scheme? A developer browsing a service portal can grab an id & secret, just as easily as grabbing a bearer token, to configure into an app as the initial access token

Re: [OAUTH-WG] draft-ietf-oauth-dyn-reg and bearer tokens

2013-06-06 Thread Phil Hunt
Phil @independentid www.independentid.com phil.h...@oracle.com On 2013-06-06, at 10:05 AM, Justin Richer wrote: > > On 06/06/2013 11:20 AM, Phil Hunt wrote: >> As I've said before the initial auth token should nothing to do with auth. >> It is simply an assertion given to the developer to

Re: [OAUTH-WG] draft-ietf-oauth-dyn-reg and bearer tokens

2013-06-06 Thread Justin Richer
Interoperability of the processing of OAuth tokens is a separate issue that needs to be solved not just for registration. When it is solved in the wider case, Registration as-is will inherit the solution. So today, if you're using an Initial Access Token (which is optional), then you're locked

Re: [OAUTH-WG] draft-ietf-oauth-dyn-reg and bearer tokens

2013-06-06 Thread Phil Hunt
This is why this to-MAY-to vs. to-MAH-to distinction around is the initial access token an authorization token is important. The purpose for the initial access token is dramatically different then normal access tokens. This is for "registration" and does not constitute authentication or author

Re: [OAUTH-WG] draft-ietf-oauth-dyn-reg and bearer tokens

2013-06-06 Thread Justin Richer
I thought we were talking about the registration access token, not the initial access token? -- Justin On 06/06/2013 01:48 PM, Phil Hunt wrote: This is why this to-MAY-to vs. to-MAH-to distinction around is the initial access token an authorization token is important. The purpose for the in

Re: [OAUTH-WG] draft-ietf-oauth-dyn-reg and bearer tokens

2013-06-06 Thread Phil Hunt
We have two separate discussions going on. 8-) Phil @independentid www.independentid.com phil.h...@oracle.com On 2013-06-06, at 10:48 AM, Justin Richer wrote: > I thought we were talking about the registration access token, not the > initial access token? > > -- Justin > > On 06/06/201

Re: [OAUTH-WG] draft-ietf-oauth-dyn-reg and bearer tokens

2013-06-06 Thread Justin Richer
... My bad, you're right. I was getting my wires crossed with all these emails. In my view, the initial access token is, fundamentally, an access token used to constrain access to the registration endpoint (not the configuration endpoint, and not to get "normal" access tokens). Just like a no

Re: [OAUTH-WG] draft-ietf-oauth-dyn-reg and bearer tokens

2013-06-06 Thread Phil Hunt
I think we are getting to the source of the confusion. To me, the client POSTING to the registration endpoint in federated scenarios is usually anonymous. It can present signed registration claims. My preference was through a non-credential vector, like the software_id parameter. This is jus