Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-introspection-02.txt

2014-12-03 Thread Richer, Justin P.
Small update to the Introspection draft incorporating comments from the past couple days. I haven't put together the IANA considerations section that will tie the introspection claims to the JWT registry yet, but that's the intent. Please check the diffs, read the new version, and continue to se

[OAUTH-WG] I-D Action: draft-ietf-oauth-introspection-02.txt

2014-12-03 Thread internet-drafts
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Web Authorization Protocol Working Group of the IETF. Title : OAuth 2.0 Token Introspection Author : Justin Richer Filename: draft-

Re: [OAUTH-WG] SPOP: Code Challenge Discussion

2014-12-03 Thread Bill Mills
Quoting from 7.1  "It is RECOMMENDED that the output of a suitable random number generator be used to create a 32-octet sequence." So the spec is already recommending 256 bits of randomness, is that language not clear enough? On Wednesday, December 3, 2014 3:17 AM, Hannes Tschofenig wrot

Re: [OAUTH-WG] Notes on draft-ietf-oauth-introspection-01

2014-12-03 Thread Richer, Justin P.
On Dec 3, 2014, at 9:03 AM, Thomas Broyer mailto:t.bro...@gmail.com>> wrote: On Tue Dec 02 2014 at 19:53:27 Richer, Justin P. mailto:jric...@mitre.org>> wrote: Thomas, thanks for the review. Responses inline. On Dec 2, 2014, at 11:08 AM, Thomas Broyer mailto:t.bro...@gmail.com>> wrote: T

Re: [OAUTH-WG] Notes on draft-ietf-oauth-introspection-01

2014-12-03 Thread Thomas Broyer
On Tue Dec 02 2014 at 19:53:27 Richer, Justin P. wrote: > Thomas, thanks for the review. Responses inline. > > On Dec 2, 2014, at 11:08 AM, Thomas Broyer wrote: > > > The methods of managing and >validating these authentication credentials are out of scope of this >specification, t

[OAUTH-WG] SPOP: Salt & other ideas

2014-12-03 Thread Hannes Tschofenig
Hi all, I also wanted to respond to various ideas that were entertained, including adding salt into the hash function and also for including other parameters in the hash. Before adding new functionality we have to talk about the threats we are trying to address. For example, adding salt just mak

Re: [OAUTH-WG] SPOP: Code Challenge Discussion

2014-12-03 Thread Hannes Tschofenig
On 12/03/2014 01:14 PM, John Bradley wrote: > The only question is if the OAuth ext review list is the correct place for > review. I think it is. signature.asc Description: OpenPGP digital signature ___ OAuth mailing list OAuth@ietf.org https://ww

Re: [OAUTH-WG] SPOP: Code Challenge Discussion

2014-12-03 Thread John Bradley
The only question is if the OAuth ext review list is the correct place for review. I don't have a problem with re using an existing review process for a new registry, if that works for people. John B. > On Dec 3, 2014, at 9:09 AM, Hannes Tschofenig > wrote: > > I just looked at the IANA c

Re: [OAUTH-WG] SPOP: Code Challenge Discussion

2014-12-03 Thread Hannes Tschofenig
I just looked at the IANA consideration section and I noticed that there is no policy defined for adding, or deprecating values from various registries, such as the code_challenge_method. So, you can essentially decide about how easy or difficult you can make it for yourself. I would think that '

Re: [OAUTH-WG] SPOP: Code Challenge Discussion

2014-12-03 Thread John Bradley
We have been thinking that new hash functions and new mechanisms (eg ECDH-ES) would be treated the same and require a spec and review. (At some point I will do a asymmetric extension so that the key can also be used to encrypt POP keys back to the client, but I don't want to make this spec lo

Re: [OAUTH-WG] SPOP: Code Challenge Discussion

2014-12-03 Thread Hannes Tschofenig
Hi John, I believe it makes sense to give recommendations for extensions (if you envision them). Of course, I hope that we do not see a flood of extensions that all use different hash functions. Changing the mechanism to something that provides even stronger security properties would definitely r

Re: [OAUTH-WG] SPOP: Code Challenge Discussion

2014-12-03 Thread Nat Sakimura
Thanks Hannes. One question: we are recommending 32 octetes=256 bits to fill the sha256 range. Is there a reason for asking for a lesser entropy? On 2014年12月3日(水) at 20:37 John Bradley wrote: > Thanks Hannes. > > Other methods such as different hashes need to be added via extension > specs. > >

Re: [OAUTH-WG] SPOP: Code Challenge Discussion

2014-12-03 Thread John Bradley
Thanks Hannes. Other methods such as different hashes need to be added via extension specs. Are you saying that we should set minimum recommendations for them. It is also possible that those methods might use something other than hashing. Key agreement might be a possibility. Those propert

[OAUTH-WG] SPOP: Code Challenge Discussion

2014-12-03 Thread Hannes Tschofenig
Hi all, I am trying to figure out how to progress the SPOP document and therefore I read through the discussion about the code challenge, see I wanted to share my view about this topic. As a summary, the mechanism works as follows: C: Compute code_verifier:=rand() C: Compute code_challenge:=fun