Re: [OAUTH-WG] [Errata Verified] RFC7800 (6187)

2020-06-01 Thread Barry Leiba
One thing we have talked about is having the RPC handle editorial class 1 reports, and we can discuss that again if we like. Should we do that, it might make sense to have a separate handling code for those that the RPC resolves. Barry On Mon, Jun 1, 2020 at 9:16 AM Barry Leiba wrote: > &

Re: [OAUTH-WG] [Errata Verified] RFC7800 (6187)

2020-06-01 Thread Barry Leiba
That's what the "technical" vs "editorial" distinction is supposed to be for. Barry On Mon, Jun 1, 2020 at 8:27 AM Rob Wilton (rwilton) wrote: > > > > > -Original Message- > > From: iesg On Behalf Of Benjamin Kaduk > > Sent: 31 May 2020 05:09 > > To: Pete Resnick > > Cc: m...@microsoft

Re: [OAUTH-WG] [Errata Verified] RFC7800 (6187)

2020-05-31 Thread Barry Leiba
> But https://www.ietf.org/about/groups/iesg/statements/processing-rfc-errata/, > in particular: > > Only errors that could cause implementation or deployment problems or > significant confusion should be Verified. > Things that are clearly wrong but could not cause an implementation or > deploy

Re: [OAUTH-WG] Adam Roach's No Objection on draft-ietf-oauth-resource-indicators-05: (with COMMENT)

2019-09-05 Thread Barry Leiba
a bit hesitant to make a change >> like that at this stage. I guess I'd be looking for a little more buy-in >> from folks first. Though it's not actually a functional breaking change. So >> maybe okay to just go with. >> >> On Wed, Sep 4, 2019 at 2:54

Re: [OAUTH-WG] Adam Roach's No Objection on draft-ietf-oauth-resource-indicators-05: (with COMMENT)

2019-09-04 Thread Barry Leiba
> Yeah, with query parameters lacking the hierarchical semantics that the path > component has, it is much less clear. In fact, an earlier revision of the > draft forbid the query part as I was trying to avoid the ambiguity that it > brings. But there were enough folks with some use case for it

Re: [OAUTH-WG] Barry Leiba's No Objection on draft-ietf-oauth-resource-indicators-05: (with COMMENT)

2019-09-03 Thread Barry Leiba
>> AH. I read later in the document and figured out my problem: I think it >> would >> help if you hyphenate "audience-restrict" (and "audience-restricted" later). >> No? > > Yes? Short of Adam Roach stepping in here to teach me more about proper use > of hyphens [1], I > think that would be hel

[OAUTH-WG] Barry Leiba's No Objection on draft-ietf-oauth-resource-indicators-05: (with COMMENT)

2019-09-03 Thread Barry Leiba via Datatracker
Barry Leiba has entered the following ballot position for draft-ietf-oauth-resource-indicators-05: No Objection When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please

Re: [OAUTH-WG] Barry Leiba's No Objection on draft-ietf-oauth-token-exchange-18: (with COMMENT)

2019-07-21 Thread Barry Leiba
gt; >> That works for me. >> >> On Sat, Jul 20, 2019 at 10:28 PM Benjamin Kaduk wrote: >>> >>> On Fri, Jul 19, 2019 at 10:05:57AM -0600, Brian Campbell wrote: >>> > On Fri, Jul 19, 2019 at 8:31 AM Barry Leiba >>> > wrote: >>> &g

Re: [OAUTH-WG] Barry Leiba's No Objection on draft-ietf-oauth-token-exchange-18: (with COMMENT)

2019-07-19 Thread Barry Leiba
>> and I trust the authors and responsible AD to do the right thing. > > I always endeavor to do the right thing. You do; hence, the trust. :-) And thanks for the quick responses. >> — Section 1.1 — >> Given the extensive discussion of impersonation here, what strikes me as >> missing is pointin

Re: [OAUTH-WG] Barry Leiba's No Objection on draft-ietf-oauth-token-exchange-18: (with COMMENT)

2019-07-18 Thread Barry Leiba
> I think I was reading this as "if the server can't fulfil the exact request > as given, it returns an error and says "try again slightly differently". Yes, I'm sure that's what's meant. I'm asking that that be clarified, because I have seen problems in implementation of other specifications whe

[OAUTH-WG] Barry Leiba's No Objection on draft-ietf-oauth-token-exchange-18: (with COMMENT)

2019-07-18 Thread Barry Leiba via Datatracker
Barry Leiba has entered the following ballot position for draft-ietf-oauth-token-exchange-18: No Objection When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer

[OAUTH-WG] Barry Leiba's Yes on draft-ietf-oauth-jwt-bcp-06: (with COMMENT)

2019-06-24 Thread Barry Leiba via Datatracker
Barry Leiba has entered the following ballot position for draft-ietf-oauth-jwt-bcp-06: Yes When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer to https

Re: [OAUTH-WG] Barry Leiba's No Objection on draft-ietf-oauth-proof-of-possession-09: (with COMMENT)

2015-12-16 Thread Barry Leiba
> Thanks for your review. Please see my responses inline below... And thanks for your responses. All OK, including the alternatives you gave to my suggestions. Thanks, as always, for addressing my comments. Barry ___ OAuth mailing list OAuth@ietf.or

[OAUTH-WG] Barry Leiba's No Objection on draft-ietf-oauth-proof-of-possession-09: (with COMMENT)

2015-12-15 Thread Barry Leiba
Barry Leiba has entered the following ballot position for draft-ietf-oauth-proof-of-possession-09: No Objection When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please

Re: [OAUTH-WG] OAuth implementation fail

2015-07-23 Thread Barry Leiba
> Now, as to the spec change is concerned, I agree with John that it is not > required. > > However, a Best practice document would probably help the developers. That's exactly what I had in mind -- no spec change, but something (or some things) to help guide developers into do the right thing, se

Re: [OAUTH-WG] Barry Leiba's No Objection on draft-ietf-oauth-spop-14: (with COMMENT)

2015-07-07 Thread Barry Leiba
> In JWS we used ASCII(string) to indicate that the output is a sequence of > octets, strings are not necessarily 8 characters bits and may have null > termination etc. > > However as Brian states other changes may have removed the need for that. > > I admit saying "where STRING is a sequence of ze

[OAUTH-WG] Barry Leiba's No Objection on draft-ietf-oauth-spop-14: (with COMMENT)

2015-07-06 Thread Barry Leiba
Barry Leiba has entered the following ballot position for draft-ietf-oauth-spop-14: No Objection When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer to https

[OAUTH-WG] Barry Leiba's No Objection on draft-ietf-oauth-introspection-10: (with COMMENT)

2015-06-22 Thread Barry Leiba
Barry Leiba has entered the following ballot position for draft-ietf-oauth-introspection-10: No Objection When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer

Re: [OAUTH-WG] Barry Leiba's No Objection on draft-ietf-oauth-introspection-09: (with COMMENT)

2015-06-11 Thread Barry Leiba
>> 1. Why is GET an optimization? It has privacy disadvantages, and I >> don't see any advantages. >> >> 2. This "tight coupling" thing is something that I think weakens the >> interoperability of the OAuth protocol in general, and I've never >> liked it. In this case, in particular, I don't see

Re: [OAUTH-WG] Barry Leiba's Discuss on draft-ietf-oauth-spop-12: (with DISCUSS and COMMENT)

2015-06-11 Thread Barry Leiba
> Hi, Hannes, and thanks for clearing this bit up. > >>>4) The attacker (via the installed app) is able to observe responses >>> from the authorization endpoint. As a more sophisticated attack >>> scenario the attacker is also able to observe requests (in >>> addition to resp

Re: [OAUTH-WG] Barry Leiba's Discuss on draft-ietf-oauth-spop-12: (with DISCUSS and COMMENT)

2015-06-11 Thread Barry Leiba
Hi, Hannes, and thanks for clearing this bit up. >>4) The attacker (via the installed app) is able to observe responses >> from the authorization endpoint. As a more sophisticated attack >> scenario the attacker is also able to observe requests (in >> addition to responses)

[OAUTH-WG] Barry Leiba's Discuss on draft-ietf-oauth-spop-12: (with DISCUSS and COMMENT)

2015-06-11 Thread Barry Leiba
Barry Leiba has entered the following ballot position for draft-ietf-oauth-spop-12: Discuss When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer to https

Re: [OAUTH-WG] Barry Leiba's Discuss on draft-ietf-oauth-spop-12: (with DISCUSS and COMMENT)

2015-06-11 Thread Barry Leiba
vailable to an attacker by removing PKCE entirely from the > request. > > Unfortunately this week is CIS for me and I am having a hard time keeping up > with email. > > Let me know what you think. > > I agree that we want to direct developers to S256 as the preference, bu

Re: [OAUTH-WG] Barry Leiba's Discuss on draft-ietf-oauth-spop-12: (with DISCUSS and COMMENT)

2015-06-11 Thread Barry Leiba
Hi, Nat, and thanks for the reply. >> How does "plain" do anything at all to mitigate this attack? Wouldn't >> anyone who could snag the grant also be able to snag the code verifier as >> well? Why is "plain" even here? > > You have to understand that this spec deals with a scenario that the > c

Re: [OAUTH-WG] Barry Leiba's No Objection on draft-ietf-oauth-introspection-09: (with COMMENT)

2015-06-09 Thread Barry Leiba
Hi, Justin. Thanks for the response and discussion. >> -- Section 2 -- >> >>The introspection endpoint MUST be protected by a transport-layer >>security mechanism as described in Section 4. >> >> I know what it means for a communication path to be protected by TLS, but >> I don't know wha

[OAUTH-WG] Barry Leiba's Discuss on draft-ietf-oauth-spop-12: (with DISCUSS and COMMENT)

2015-06-08 Thread Barry Leiba
Barry Leiba has entered the following ballot position for draft-ietf-oauth-spop-12: Discuss When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer to https

Re: [OAUTH-WG] Barry Leiba's No Objection on draft-ietf-oauth-introspection-09: (with COMMENT)

2015-06-08 Thread Barry Leiba
>> -- Section 3.1 -- >> I'd REALLY like to see us stop trying to tell IANA how to handle review >> by designated experts. This should be re-cast as instructions to the DE >> (to make sure that the mailing list is consulted), and IANA should be >> left to handle the expert review with their existin

[OAUTH-WG] Barry Leiba's No Objection on draft-ietf-oauth-introspection-09: (with COMMENT)

2015-06-08 Thread Barry Leiba
Barry Leiba has entered the following ballot position for draft-ietf-oauth-introspection-09: No Objection When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer

Re: [OAUTH-WG] Pete Resnick's No Objection on draft-ietf-oauth-assertions-17: (with COMMENT)

2014-10-15 Thread Barry Leiba
> > >>Assertions used in the protocol exchanges defined by this >>specification MUST always be protected against tampering using a >>digital signature or a keyed message digest applied by the issuer. >> >> Why is that? Aren't you using assertions over a protected channel (as >> required

[OAUTH-WG] Barry Leiba's No Objection on draft-ietf-oauth-assertions-17: (with COMMENT)

2014-10-14 Thread Barry Leiba
Barry Leiba has entered the following ballot position for draft-ietf-oauth-assertions-17: No Objection When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer to

Re: [OAUTH-WG] Barry Leiba's Discuss on draft-ietf-oauth-json-web-token-27: (with DISCUSS and COMMENT)

2014-10-05 Thread Barry Leiba
> At Stephen Farrell's request, I'm responding with "> " line prefixes > on previous thread content. Yeh, Outlook (and certain other clients, such as Lotus Notes) are particularly bad at cooperating with the Internet-style quoting, and it can get to be quite a mess as people with all different kin

[OAUTH-WG] Reaction to the current assertion pair {framework, SAML}

2014-02-26 Thread Barry Leiba
>> Any idea, on the two Assertion Documents, if there is or will be any >> feedback from the IESG and, if so, what form it might take? > > I'm sorry that I haven't been able to get to reviewing this yet -- > I've had a bunch of pre-IETF travel, in addition to preparing for the > meeting. I aim to

Re: [OAUTH-WG] Draft Agenda

2014-02-26 Thread Barry Leiba
> Any idea, on the two Assertion Documents, if there is or will be any > feedback from the IESG and, if so, what form it might take? I'm sorry that I haven't been able to get to reviewing this yet -- I've had a bunch of pre-IETF travel, in addition to preparing for the meeting. I aim to have a lo

Re: [OAUTH-WG] Question/comments on draft-ietf-oauth-revocation-09

2013-05-24 Thread Barry Leiba
> As I recall, the argument was that without this, someone could just keep > fishing at the > token revocation endpoint for valid tokens. Though thinking about it now, > even if you > did get a "token was valid" response, the token wouldn't be valid anymore and > it wouldn't > do you much good.

Re: [OAUTH-WG] Question/comments on draft-ietf-oauth-revocation-09

2013-05-24 Thread Barry Leiba
> Sergey has the correct interpretation -- it's to prevent a class of oracle > attacks. > Think of it this way, if you go to revoke a token, and the token wasn't there > in the > first place, the end result is the same: the token's not there when you're > done. So > it's a 200 because the result

Re: [OAUTH-WG] Meeting for people interested in OpenID Connect at IETF#86 in Sun Mar 10

2013-03-02 Thread Barry Leiba
> The eventbrite page for people wanting to attend the openID Connect session > prior to IETF86 is now available at: > http://openid-ietf-86.eventbrite.com/ That page says this: OpenID Meeting at IETF 86 The OpenID Foundation Thursday, April 11, 2013 from 1:00 PM to 4:00 PM (EDT) Orlan

Re: [OAUTH-WG] Mandatory to implement

2013-02-19 Thread Barry Leiba
> I can tell you that I don't think Barry and I are asking for > contradictory things. They are different, but not contradictory, > and have the same goal (interop). I believe Barry would agree > with that. > > Saying that field X is MTI can be entirely consistent with > defining a protocol that al

Re: [OAUTH-WG] oauth assertions plan

2013-02-18 Thread Barry Leiba
> > "Dynamically declaring," in what sense? Where are those mechanisms > documented? > > ** ** > > Many of them are documented in draft-ietf-oauth-dyn-reg. > > ** ** > > One profile (an outer doll J) that enables fully interoperable > implementations is documented in draft-hardjono-oauth-u

Re: [OAUTH-WG] oauth assertions plan

2013-02-18 Thread Barry Leiba
> > It seems like the scope of your criticism has more to do with RFC 6749 & > RFC 6750 overall, than the assertions drafts themselves. > No, and I'm sorry if it came across that way. I mentioned the token-type issue only by way of background. As it happens, I do think it was a mistake to publis

Re: [OAUTH-WG] oauth assertions plan

2013-02-18 Thread Barry Leiba
I'll get to John's message later, after I digest it more. I can reply to this one now. please explain how you and I can each write applications to that? > > ** > > ** ** > > You can write applications to that by having the profile chain end, and > with the contents of the Audience field being com

Re: [OAUTH-WG] oauth assertions plan

2013-02-17 Thread Barry Leiba
OK, I have some time to respond to this on a real computer. Let's look at the general mechanism that oauth provides, using one use case: A client asks an authorization server for authorization to do something. The authorization server responds with an authorization token, which the client is requi

Re: [OAUTH-WG] [Editorial Errata Reported] RFC6749 (3446)

2013-01-07 Thread Barry Leiba
> Corrected Text > -- > Resource owners cannot revoke access to an individual third party without > revoking access > to all third parties, and must do so by changing their password. > > Notes > - > The text was originally "their" but changed to "the third party's" between > the l

Re: [OAUTH-WG] fyi: IETF conflict review results for draft-secure-cookie-session-protocol

2012-12-06 Thread Barry Leiba
> [ I was nosing around and noticed this relatively recent decision, it didn't > appear to have been fwd'd to these lists. fyi/fwiw... ] ... > The IESG has no problem with the publication of 'SCS: Secure Cookie > Sessions for HTTP' as an > Informational RFC. > > The IESG has concluded that this wo

[OAUTH-WG] Input for conflict review of draft-secure-cookie-session-protocol

2012-10-17 Thread Barry Leiba
the ISE at . General discussion of the document on these lists or the saag list will likely not get to the authors or the ISE. Barry Leiba, Applications AD ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] FW: New Version Notification for draft-ietf-oauth-use-cases-02.txt

2012-10-10 Thread Barry Leiba
> Particularly, the authors are looking for advice with the use of the example > URLs. Following the guidance of RFC 2606, > > we have used “example” as the top level domain name (e.g., example.com). > This may mislead readers into thinking that all URLs belong to the same > organization. A general

Re: [OAUTH-WG] Change in editorship of OAuth Core Spec

2012-07-11 Thread Barry Leiba
> Eran Hammer has decided to step down as Editor of the OAuth Core > specification. I would like to personally thank Eran for all his years > of hard work and effort to the draft as well as to the working group at > large. As former chair, I want to add my thanks. Eran has done a *lot* of work o

Re: [OAUTH-WG] Operations Directorate Review of draft-ietf-oauth-v2-threatmodel-06

2012-07-08 Thread Barry Leiba
> 1. The relation between this document, OAuth 1.0 (RFC 5849) and OAuth > 2.0 is not clear. In the Introduction we find: > >This document gives additional security considerations for OAuth, >beyond those in the OAuth specification, based on a comprehensive >threat model for the OAuth 2.

Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-urn-sub-ns-04.txt

2012-06-23 Thread Barry Leiba
> > Per http://www.ietf.org/mail-archive/web/oauth/current/msg09407.html > and barring any objections, I'd ask the Chairs to give the AD the okay > to move this to LC. The irresponsible AD from Apps thinks this s a fine idea, and that this version is ready. Barry

Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-urn-sub-ns-03.txt

2012-06-21 Thread Barry Leiba
>>> Have Section 3 note that certain classes might create new >>> sub-registries for what goes under them, if necessary. >> >> I honestly don't understand the push to have additional registries under >> urn:ietf:params:oauth? > > I agree that one registry is sufficient.  The number of registrations

Re: [OAUTH-WG] AD review of draft-ietf-oauth-urn-sub-ns-02

2012-06-21 Thread Barry Leiba
>> Stephen: >> Yeah, I'm not sure Standards Track is needed. > > On this bit: I personally don't care, except that we don't have to do it twice > because someone later on thinks the opposite and wins that argument, which > I'd rather not have at all  (My one-track mind:-) Doing the 4 week last call

Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-urn-sub-ns-03.txt

2012-06-21 Thread Barry Leiba
This one's mostly there. As Mike and Hannes are discussing, the WG needs to sort out exactly what goes under "oauth" here. Here's a suggestion: Have Section 3 specify that what comes after "oauth" are one or more tokens, delimited by ":". Have Section 3 create the registry for the first-level tok

Re: [OAUTH-WG] AD review of draft-ietf-oauth-urn-sub-ns-02

2012-06-21 Thread Barry Leiba
>> (1) Why Informational? Everything else at that level seems to >> be specified in a standards track or BCP level RFC, and IETF >> Consensus is required. [1] I think you have to do this as >> standards track. Did I miss something? >> > Standards Track is OK. Stephen: Yeah, I'm not sure Standards

Re: [OAUTH-WG] AD review of draft-ietf-oauth-urn-sub-ns-02

2012-06-20 Thread Barry Leiba
I'd like to see the new version, since there appear to be a bunch of changes, but first here are some issues that I don't think have been brought up yet: The URN registration stuff seems very incompletely baked. The title of 5.1 correctly says it's registering a sub-namespace, but the text incorr

Re: [OAUTH-WG] ABNF elements for suggested WG review

2012-06-02 Thread Barry Leiba
> Things like "%x21 / %x23-5B / %x5D-7E" should be named once and re-used. An excellent suggestion, and one I hope is adopted. Barry ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] Shepherd review of draft-ietf-oauth-v2-threatmodel

2012-04-26 Thread Barry Leiba
Oh, and sorry... > threats document should be addressing that "overselling" problem[1], > and if that means highlighting a few things that we think should be > obvious, I'm in favour of it. ...I forgot to include the footnote. Barry [1] Note that I'm NOT saying that the WG is overselling OAuth,

Re: [OAUTH-WG] Shepherd review of draft-ietf-oauth-v2-threatmodel

2012-04-26 Thread Barry Leiba
Phil said... > **However**  Editorially I feel strongly the comments fall outside the > intended scope > and purpose for this document. This document is about threats specifically > related > to the OAuth protocol.  It's intent is to go beyond security considerations > to give > implementers a

Re: [OAUTH-WG] Agenda Proposal

2012-03-26 Thread Barry Leiba
> As far as I know, none of my concerns were incorporated. Correct, and I will take care of that (or try to) in my shepherd review. Barry ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] Fw: Breaking change in OAuth 2.0 rev. 23

2012-03-14 Thread Barry Leiba
> Off list. Or not so much off list. He-he. b ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] Fw: Breaking change in OAuth 2.0 rev. 23

2012-03-14 Thread Barry Leiba
Off list. > It would be great if people could just reply stating which they like best. כן Sometimes, one just has to whack people over the head. b ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] Agenda Proposal

2012-03-14 Thread Barry Leiba
Oh, and... > 4. MAC Token (TBD) > https://datatracker.ietf.org/doc/draft-ietf-oauth-v2-http-mac/ I believe that in Eran's last communication about this he said that he does, after all, have the time and inclination to finish it, and would like to. b __

Re: [OAUTH-WG] Agenda Proposal

2012-03-14 Thread Barry Leiba
Looks good to me. One note: > 2. OAuth Threats Document (Torsten) > https://datatracker.ietf.org/doc/draft-ietf-oauth-v2-threatmodel/ I have been terribly remiss on this, so here's the thing: - We have completed WGLC on this, and are awaiting my shepherd review (which will include a recommendat

Re: [OAUTH-WG] Fw: Breaking change in OAuth 2.0 rev. 23

2012-03-14 Thread Barry Leiba
> I am sorry, but with this language this is a different spec with > different compliance profiles and without supplying enough guidance > for creating interoperable server implementations for common > deployment models. As I read this thread, I see two things come out clearly: 1. Eran didn't int

Re: [OAUTH-WG] OK to post updated Bearer spec changing and adding examples?

2012-03-10 Thread Barry Leiba
> OAuth Chairs, Changed CC address; please see my list message: http://www.ietf.org/mail-archive/web/oauth/current/msg08531.html > Do you approve of posting an updated Bearer spec as below, assuming the > working group does not object by mid-day Monday? Yes, that makes sense. Barry, still chair

[OAUTH-WG] Reminder: Contacting the chairs

2012-03-08 Thread Barry Leiba
Because we're in the middle of a chair change, we're having people contact the chairs by sending email to Hannes and me. (1) This leaves Derek out. (2) If you do this after the Paris meeting, you'll be sending email to someone who's not an OAuth chair any more. You can fix this by *always* using

Re: [OAUTH-WG] [apps-discuss] FW: Appsdir review of draft-ietf-oauth-v2-23

2012-03-08 Thread Barry Leiba
> OK, I now recognise a culture clash as the underlying point at issue, > so this spec. is the wrong place to address it. Ah... so if the issue is how IANA makes registry information available, then please go to the "happiana" mailing list ( https://www.ietf.org/mailman/listinfo/happiana ) and see

Re: [OAUTH-WG] [apps-discuss] FW: Appsdir review of draft-ietf-oauth-v2-23

2012-03-08 Thread Barry Leiba
> You have read the spec., and the _only_ concrete thing it tells you > about the registers is the name of an email list.  So you have to go > to the email archives and search for . . . what exactly?  Different in > the three cases above, and in none of them is it obvious how to know > what counts

Re: [OAUTH-WG] [apps-discuss] FW: Appsdir review of draft-ietf-oauth-v2-23

2012-03-07 Thread Barry Leiba
Henry says... >> No, I appreciate that you want to use registered short names in the protocol, >> that's just fine.  My problem is that you have left users, developers etc. >> with >> no way to discover what shortnames have been registered short of a non- >> trivial and error-prone informal search

Re: [OAUTH-WG] OAuth 2.0 LC conclusion

2012-02-15 Thread Barry Leiba
Do you have changes to make based on the Apps and TSV Directorate reviews? Barry ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] Last Call: (The OAuth 2.0 Authorization Protocol) to Proposed Standard

2012-01-23 Thread Barry Leiba
> The IESG has received a request from the Web Authorization Protocol WG > (oauth) to consider the following document: > - 'The OAuth 2.0 Authorization Protocol' >   as a Proposed Standard There are some downrefs in this document that need to be called out in the Last Call notice, which weren't.

Re: [OAUTH-WG] TLS version requirements in OAuth 2.0 base

2012-01-20 Thread Barry Leiba
> Added to section 1: > >   TLS Version > >          Whenever TLS is required by this specification, the appropriate > version (or versions) of >          TLS will vary over time, based on the widespread deployment and > known security >          vulnerabilities. At the time of this writing, TLS

Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011

2012-01-04 Thread Barry Leiba
> I have asked you to clearly describe the threat, not the mitigation. > > It obviously was either not clear or convincing the first time and I am not > going to start digging through emails when you clearly understand it. To try to shortcut this: Mike did lay it out clearly, I think, in his first

Re: [OAUTH-WG] Mandatory-to-implement token type

2011-12-18 Thread Barry Leiba
Closing out this issue: > 7.2 Access Token Implementation Considerations > > Access token types have to be mutually understood among the > authorization server, the resource server, and the client -- the > access token issues the token, the resource server validates it, and > the client is require

Re: [OAUTH-WG] TLS version requirements in OAuth 2.0 base

2011-12-18 Thread Barry Leiba
To close out this issue: There's disagreement about whether this proposed text is "necessary", but no one thinks it's *bad*, and I see consensus to use it. Eran, please make the following change in two places in the base document: > OLD > The authorization server MUST support TLS 1.0 ([RFC2246]),

Re: [OAUTH-WG] OK to post OAuth Bearer draft 15?

2011-12-18 Thread Barry Leiba
> Unless I hear a “no” from Mark, the chairs, or Stephen I’ll plan to publish > -15 over the weekend.  (Or if I hear a “yes”, I’ll do so right away. J) In general, I always prefer that people have the latest text to review and comment on, and when there are significant updates to distribute, a new

Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011

2011-12-15 Thread Barry Leiba
> Working group last call begins today on the threat model document: > http://tools.ietf.org/html/draft-ietf-oauth-v2-threatmodel-01 > > Please review this version and post last call comments by 9 December. Sorry, folks: I got a little behind here. Working-group last call is now over. There were

Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011

2011-12-03 Thread Barry Leiba
> Working group last call begins today on the threat model document: > http://tools.ietf.org/html/draft-ietf-oauth-v2-threatmodel-01 > > Please review this version and post last call comments by 9 December. Here's a reminder that we have about a week left for the working group last call on this, a

Re: [OAUTH-WG] Mandatory-to-implement token type

2011-12-03 Thread Barry Leiba
Stephen says: > On 12/02/2011 03:20 AM, Barry Leiba wrote: >> Maybe what would work best is some text that suggests what I say >> above: that toolkits intended for use in implementing OAuth services >> in general... implement [X and/or Y], and that code written for a &g

Re: [OAUTH-WG] Mandatory-to-implement token type

2011-12-01 Thread Barry Leiba
>> So an MTI token type + no client preference is equivalent to there >> only existing one token type. > > Maybe. > > However, no MTI token type + no client preference = no interop. I think this exchange, coupled with what you Stephen said in Taipei (noting that "mandatory to implement" doesn't me

Re: [OAUTH-WG] TLS version requirements in OAuth 2.0 base

2011-11-28 Thread Barry Leiba
> The OAuth base doc refers in two places to TLS versions (with the same > text in both places: > > OLD > The authorization server MUST support TLS 1.0 ([RFC2246]), SHOULD > support TLS 1.2 ([RFC5246]) and its future replacements, and MAY > support additional transport-layer mechanisms meeting its

Re: [OAUTH-WG] TLS version requirements in OAuth 2.0 base

2011-11-17 Thread Barry Leiba
> And if the servers don't implement the "should" on 1.0 how do we get > deployments for the other actors that can't talk to 1.2 1. Do you think we'll really see implementations that don't work with what's out there? 2. SHOULD doesn't mean MAY. SHOULD means "MUST, unless you have a really good r

Re: [OAUTH-WG] TLS version requirements in OAuth 2.0 base

2011-11-17 Thread Barry Leiba
> Please refer to this thread about the problem with requiring anything more > than TLS 1.0 > http://www.ietf.org/mail-archive/web/oauth/current/msg07234.html > > You will end up with a spec that virtually no one can implement and be in > conformance with. I still have yet to find an implementation

[OAUTH-WG] TLS version requirements in OAuth 2.0 base

2011-11-17 Thread Barry Leiba
The OAuth base doc refers in two places to TLS versions (with the same text in both places: OLD The authorization server MUST support TLS 1.0 ([RFC2246]), SHOULD support TLS 1.2 ([RFC5246]) and its future replacements, and MAY support additional transport-layer mechanisms meeting its security requ

[OAUTH-WG] Mandatory-to-implement token type

2011-11-17 Thread Barry Leiba
Stephen, as AD, brought up the question of mandatory-to-implement token types, in the IETF 82 meeting. There was some extended discussion on the point: - Stephen is firm in his belief that it's necessary for interoperability. He notes that mandatory to *implement* is not the same as mandatory to

[OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011

2011-11-17 Thread Barry Leiba
Working group last call begins today on the threat model document: http://tools.ietf.org/html/draft-ietf-oauth-v2-threatmodel-01 Please review this version and post last call comments by 9 December. Barry, as chair ___ OAuth mailing list OAuth@ietf.org

[OAUTH-WG] Meeting minutes from IETF 82

2011-11-17 Thread Barry Leiba
The chairs have posted minutes to the meeting materials page. Find them here: http://www.ietf.org/proceedings/82/minutes/oauth.txt A few messages will follow soon, with action items from the meeting. Barry, as chair ___ OAuth mailing list OAuth@ietf.or

Re: [OAUTH-WG] Rechartering

2011-10-20 Thread Barry Leiba
> do we have the band width to work on all these items, as some are > big and some are fairly small and contained. May have to have some > prioritized list of where people think these fit. Yes, exactly. And one of the things we'd like to hear from all of you is what your priorities are... how you

Re: [OAUTH-WG] Possible alternative resolution to issue 26

2011-10-04 Thread Barry Leiba
>> Existing practice is that simple ASCII strings like "email" "profile", >> "openid", etc. are used as scope elements.  Requiring them to be URIs >> would break most existing practice. > > Constraining syntax to an ascii token OR a URI (relative reference) might > work.  Anything with a colon can

Re: [OAUTH-WG] Proposed resolution for issue 26

2011-09-28 Thread Barry Leiba
I'd like to see more participation in this thread, besides just from Mike and James. What do others think? Barry, as chair On Mon, Sep 26, 2011 at 3:05 PM, Mike Jones wrote: > While you take the viewpoint that the bearer spec is restricting scope > values, in fact, the spec intentionally allows

Re: [OAUTH-WG] Proposed resolution for issue 26

2011-09-24 Thread Barry Leiba
> My proposed resolution is that %-encoding not be required in the > specification I agree with your analysis, now that I see it laid out clearly. I would feel better, though, if there were text in the document that explained that to others, who read it later. Perhaps, using your words, we could

[OAUTH-WG] Publication requested for draft-ietf-oauth-v2-22

2011-09-22 Thread Barry Leiba
Stephen, The OAuth working group requests publication of draft-ietf-oauth-v2-22 as Proposed Standard. The PROTO writeup is in the tracker: https://datatracker.ietf.org/doc/draft-ietf-oauth-v2/ Barry ___ OAuth mailing list OAuth@ietf.org https://www.ietf

[OAUTH-WG] Reviewing draft-ietf-oauth-v2-21

2011-09-07 Thread Barry Leiba
As you've all probably seen, Eran has posted version 21 of the OAuth base spec, in which he believes he's addressed all comments and issues that came up in the review of version 20. We should be ready to send this to the IESG. Everyone who had comments or issues, please review -21 and make sure t

Re: [OAUTH-WG] Fwd: New Version Notification for draft-campbell-oauth-urn-sub-ns-00.txt

2011-08-30 Thread Barry Leiba
Following up on this: On Sun, Jul 31, 2011 at 10:45, Barry Leiba wrote: > On 7/29/11 3:07 PM, Brian Campbell wrote: >> Following up from >> http://www.ietf.org/mail-archive/web/oauth/current/msg06949.html a few >> weeks ago, I've submitted a new I-D to establish an IET

Re: [OAUTH-WG] Auth Code Swap Attack

2011-08-24 Thread Barry Leiba
> I believe we have full consensus on this approach. I agree, and I will close the issue. Barry, happy chair ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] OMA Liaison Has Arrived!

2011-08-24 Thread Barry Leiba
On Mon, Aug 22, 2011 at 1:53 PM, Barry Leiba wrote: > I intend to add the following to the response to this item: > "The working group understands that client code needs to know whether > to use and decode percent-encoding.  The issue is being discussed and > tracked, and will b

Re: [OAUTH-WG] OMA Liaison Has Arrived! scope-v

2011-08-22 Thread Barry Leiba
> +1 for Jame's feedback here.  We need to solve this. I have opened an issue in the tracker on this: http://trac.tools.ietf.org/wg/oauth/trac/ticket/26 I intend to add the following to the response to this item: "The working group understands that client code needs to know whether to use and dec

Re: [OAUTH-WG] Partial set of last call comments on OAuth draft 20 from Yaron Goland

2011-08-18 Thread Barry Leiba
> Chairs - please open an issue for this: "Clarifying reference to refresh > tokens > in section 1.4.3 of -20". http://trac.tools.ietf.org/wg/oauth/trac/ticket/25 b ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] OMA Liaison Has Arrived! scope-v

2011-08-18 Thread Barry Leiba
The text for the answer below came from Mike, as the chairs asked for at the IETF 81 meeting. Mike, do you have a response to James's issue? Can we give a better response here? Should the bearer doc specify %-encoding explicitly? Barry On Thu, Aug 18, 2011 at 7:15 AM, Manger, James H wrote: >

Re: [OAUTH-WG] Draft 20 last call comment (Resource Owner Impersonation)

2011-08-18 Thread Barry Leiba
>> Yes, the example I provided is a very lightweight one which does take the >> form of CSRF, but it is only the simplest example of a family of automated >> authorization flow attacks. Indeed, a nonce (or hidden token, both serve the >> same purpose in this case) would be enough here. > > Great. S

Re: [OAUTH-WG] Draft 20 last call comment (Resource Owner Impersonation)

2011-08-18 Thread Barry Leiba
> I'd like to ask the chairs to open an issue for this. http://trac.tools.ietf.org/wg/oauth/trac/ticket/24 > I didn't realize how hyper sensitive this working group has become that every > proposal being questioned needs a ticket to prove to people that they are not > being dismissed. It's OK: t

Re: [OAUTH-WG] OMA Liaison Has Arrived!

2011-08-17 Thread Barry Leiba
I'm sorry for the delay in getting this written. Because of the delay, the working group has just a short time to review my proposed response, below. Everyone, please have a look at the answers I propose to send, and post any objections to this thread by the end of the day on Monday, 22 August.

  1   2   >