Re: [OAUTH-WG] Oauth Security Draft?

2011-02-20 Thread Torsten Lodderstedt
Hi Hannes, just submitted the document. I'm looking forward to a fruitful discussion. regards, Torsten. Am 18.02.2011 13:34, schrieb Tschofenig, Hannes (NSN - FI/Espoo): Hi Thorsten, Hi all, I am wondering what the status of the security draft is. The group is eagerly waiting for it. I fea

[OAUTH-WG] Fwd: New Version Notification for draft-lodderstedt-oauth-security-00

2011-02-20 Thread Torsten Lodderstedt
A new version of I-D, draft-lodderstedt-oauth-security-00.txt has been successfully submitted by Torsten Lodderstedt and posted to the IETF repository. Filename:draft-lodderstedt-oauth-security Revision:00 Title: OAuth 2.0 Threat Model and Security Considerations Creation

Re: [OAUTH-WG] New Working Group Items?

2011-02-07 Thread Torsten Lodderstedt
Hi Kristoffer, Hannes compiled the list :-) regards, Torsten. Am 07.02.2011 22:10, schrieb Kristoffer Gronowski: Hi Torsten! Great that you compiled the list on WG items. IMO there is one item missing and that is to create an optional formal interface between the authorization server and the

Re: [OAUTH-WG] validate authorization code in draft 12

2011-02-07 Thread Torsten Lodderstedt
Hi Eric, I'm trying to understand the attack you described. I would expect any client to mark its web sessions if it triggers an authorization process. If so, the attacker would need to forge a valid client session in the right state (authz process in progress) in order to place a sucessful a

Re: [OAUTH-WG] WWW-Auth. OAuth scheme (was RE: Bearer token type and scheme name (deadline: 2/10))

2011-02-07 Thread Torsten Lodderstedt
lternatively, some other discovery mechanismus could be used, such as host-meta on the resource server. Torsten Lodderstedt said: I would expect the WWW-Authenticate header to return all the data required to obtain the credentials/tokens, such as WWW-Authenticate: MAC realm="somere

Re: [OAUTH-WG] New Working Group Items?

2011-02-07 Thread Torsten Lodderstedt
Long introduction - here are the documents: A) Simple Web Discovery (SWD) http://www.ietf.org/id/draft-jones-simple-web-discovery-00.txt I consider authorization server endpoints and capabilities discovery an important aspect and would be willed to review. B) HTTP Authentication: MAC Aut

Re: [OAUTH-WG] who is working on security considerations?

2011-02-07 Thread Torsten Lodderstedt
Hi Brian, Mark McGloin, Phil Hunt and I are working on a security considerations document. We plan to submit it to the working group in the next couple of weeks. Your contribution would be highly appreciated. What would you like to contribute? regards, Torsten. Am 07.02.2011 19:09, schrieb

Re: [OAUTH-WG] Bearer token type and scheme name (deadline: 2/10)

2011-02-05 Thread Torsten Lodderstedt
that's not the way WWW-Authenticate headers are used today. Instead the resource server should return a single WWW-Authenticate header _per_ supported authentication scheme, such as WWW-Authenticate: MAC realm="somerealm" WWW-Authenticate: BEARER realm="somerealm" furthermore, I think interdep

Re: [OAUTH-WG] Bearer token type and scheme name (deadline: 2/10)

2011-02-05 Thread Torsten Lodderstedt
+1 for option 3, but would be fine with option 1, too Both are quite similar, except 3 keeps the link between the OAuth authorization server API (how to get a token) and the HTTP schemes used to send the tokens to the resource servers. Since OAuth is becoming, in my perception, the synonym for

Re: [OAUTH-WG] How to integrated DIGEST or SPNEGO with tokensendpoint?

2011-01-26 Thread Torsten Lodderstedt
nge credentials, such as password or ticket for an access token. I mean the resource owner password flow is already an example of such a flow. regards, Torsten. -- Bob Gregory On Tue, Jan 25, 2011 at 8:22 AM, Torsten Lodderstedt mailto:tors...@lodderstedt.net>> wrote: Zitat

Re: [OAUTH-WG] Why give the redirect URI when trading an [authorization] code for an access token?

2011-01-26 Thread Torsten Lodderstedt
m.free...@hp.com Desk in Palo Alto: (650) 857-2581 Home: (408) 774-1298 Cell: (408) 348-7536 -Original Message- From: Eran Hammer-Lahav [mailto:e...@hueniverse.com] Sent: Saturday, September 11, 2010 7:59 AM To: Torsten Lodderstedt Cc: Freeman, Tim; oauth@ietf.org Subject: RE: [OAUTH-WG] Wh

Re: [OAUTH-WG] How to integrated DIGEST or SPNEGO with tokensendpoint?

2011-01-25 Thread Torsten Lodderstedt
es I'm aware of authenticate users and I want to find a way to leverage them with OAuth to determine the token's identity. Regards, Torsten. Gesendet mit BlackBerry(r) Webmail von Telekom Deutschland -Original Message- From: Eran Hammer-Lahav Date: Mon, 24 Jan 2011 15:25:38 T

[OAUTH-WG] How to integrated DIGEST or SPNEGO with tokens endpoint?

2011-01-24 Thread Torsten Lodderstedt
Hi all, I'm currently thinking about the integration of existing HTTP authentication schemes with OAuth 2.0 for the purpose of end-user authentication on the tokens endpoint. Possible candidates are "Digest" for challenge-response-based username/password authentication and "Spnego" for Kerber

Re: [OAUTH-WG] redirect URI matching in section 3

2011-01-23 Thread Torsten Lodderstedt
done Am 21.01.2011 06:38, schrieb Eran Hammer-Lahav: Whoever is working on the security considerations section, please add this to your list. EHL -Original Message- From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Brian Eaton Sent: Saturday, July 10, 2010 11:

Re: [OAUTH-WG] Removal: credential body parameters

2011-01-18 Thread Torsten Lodderstedt
o use an existing client authentication scheme such as Digest, your solution creates a conflict, unless we define a way to combine grant + Digest into one header. EHL *From:*Torsten Lodderstedt [mailto:tors...@lodderstedt.net] *Sent:* Tuesday, January 18, 2011 10:36 PM *To:* Eran Hammer-Laha

Re: [OAUTH-WG] Removal: credential body parameters

2011-01-18 Thread Torsten Lodderstedt
ation using, say, Basic or Digest? Seems like a complex framework for combining schemes into one header. EHL *From:*Torsten Lodderstedt [mailto:tors...@lodderstedt.net] *Sent:* Sunday, January 16, 2011 10:55 AM *To:* Eran Hammer-Lahav *Cc:* OAuth WG *Subject:* Re: [OAUTH-WG] Removal: credential

Re: [OAUTH-WG] Removal: credential body parameters

2011-01-18 Thread Torsten Lodderstedt
..@ietf.org] On Behalf Of Torsten Lodderstedt [tors...@lodderstedt.net] Sent: Sunday, January 16, 2011 1:54 PM To: Eran Hammer-Lahav Cc: OAuth WG Subject: Re: [OAUTH-WG] Removal: credential body parameters Hi Eran, you made some good points and I agree with most of your analysis. The way we use BASI

Re: [OAUTH-WG] Format of user-agent response parameters

2011-01-16 Thread Torsten Lodderstedt
+1 pro JSON Am 16.01.2011 08:41, schrieb Eran Hammer-Lahav: Why is the token returned in the fragment using form-encoding? This makes no sense. It should be a JSON string for the following reasons: 1.All token responses should be the same, which will enable returning structured responses in

Re: [OAUTH-WG] Removal: 'OAuth2' HTTP Authentication Scheme

2011-01-16 Thread Torsten Lodderstedt
wouldn't that mean to drop section 6 completely? regards, Torsten. Am 15.01.2011 07:32, schrieb Eran Hammer-Lahav: One of the main problems with OAuth in general has always been the unsanitary mix of authorization and authentication ("it's an authentication protocol... authorization protocol

Re: [OAUTH-WG] Removal: credential body parameters

2011-01-16 Thread Torsten Lodderstedt
Hi Eran, you made some good points and I agree with most of your analysis. The way we use BASIC in the current draft is not perfect, mainly because it is a compromise. It was basically the attempt to be more HTTP compliant while still supporting the parameter-based approach. I would strongly

Re: [OAUTH-WG] Re-Chartering: What Items to work on?

2011-01-12 Thread Torsten Lodderstedt
sten. -- Justin ________ From: Torsten Lodderstedt [tors...@lodderstedt.net] Sent: Wednesday, January 12, 2011 4:07 PM To: Richer, Justin P. Cc: oauth@ietf.org Subject: Re: [OAUTH-WG] Re-Chartering: What Items to work on? thank you for your feedback. So you would suggest to l

Re: [OAUTH-WG] OAuth MAC token type draft

2011-01-12 Thread Torsten Lodderstedt
intercepted signed request included the hostname and port of the real resource server. Zachary *From:*Torsten Lodderstedt [mailto:tors...@lodderstedt.net] *Sent:* Wednesday, January 12, 2011 3:40 PM *To:* Eran Hammer-Lahav *Cc

Re: [OAUTH-WG] Re-Chartering: What Items to work on?

2011-01-12 Thread Torsten Lodderstedt
t to revoke all "related" tokens at once, in which case I think you need a different mechanism to do so. -- Justin From: oauth-boun...@ietf.org [oauth-boun...@ietf.org] On Behalf Of Torsten Lodderstedt [tors...@lodderstedt.net] Sent: Tuesday, Ja

Re: [OAUTH-WG] Specification organization (Endpoints vs. Flows) - Vote by 1/17

2011-01-12 Thread Torsten Lodderstedt
+1 for option 2 because it will facilitates security analysis of the protocol. From a security analysis perspective, I think we need two views: 1) A structural view, describing the OAuth architecture (entities, interfaces, communication paths) and 2) a flow-oriented view, which is built based o

Re: [OAUTH-WG] OAuth MAC token type draft

2011-01-12 Thread Torsten Lodderstedt
request for getting access to the resource at the real server? Zachary -Original Message- From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Eran Hammer-Lahav Sent: Monday, January 10, 2011 4:46 PM To: Torsten Lodderstedt Cc: OA

Re: [OAUTH-WG] Proposal to drop/relocate response_type=code_and_token

2011-01-12 Thread Torsten Lodderstedt
Am 12.01.2011 01:43, schrieb Brian Eaton: On Tue, Jan 11, 2011 at 2:44 PM, Torsten Lodderstedt wrote: Do you see any need to restrict the power of this token or is it as powerful as the tokens obtained using the code? I'm asking because this token is sent out without authenticating the c

Re: [OAUTH-WG] Proposal to drop/relocate response_type=code_and_token

2011-01-11 Thread Torsten Lodderstedt
>The frames timing issue is interesting, but doesn't it suggest a profile where the whole code step is bypassed (e.g. by receiving code and token)? The user-agent profile callback URL should end up looking like this: /callback#code=&token= The token component is there so immediately return a u

Re: [OAUTH-WG] Proposal to drop/relocate response_type=code_and_token

2011-01-11 Thread Torsten Lodderstedt
the only difference I see is the code in the fragement will not show up in HTTP referers. Am 11.01.2011 22:21, schrieb Eran Hammer-Lahav: But that's just an annoying implementation detail. If the only different now between the hybrid and web server flows is one character ('?' vs '#'), and all

Re: [OAUTH-WG] Re-Chartering: What Items to work on?

2011-01-11 Thread Torsten Lodderstedt
I just posted a new revision of http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-revocation/. Please consider it for the re-chartering process. Additionally, Mark and me are still working on the security document. It takes longer time than expected because of the topic's inherent compl

Re: [OAUTH-WG] OAuth MAC token type draft

2011-01-11 Thread Torsten Lodderstedt
Am 11.01.2011 06:44, schrieb Manger, James H: - Authentication schemes You propose to use the authentication scheme name "OAuth2" for the WWW-Authenticate header but another scheme name "MAC" for the authorization header. I've never seen such an asymmetric approach before. Don't you think people

Re: [OAUTH-WG] BOF about "JSON Cryptographic Syntax and Processing"

2011-01-10 Thread Torsten Lodderstedt
Hannes, in my opinion, OAuth should stay a token-format independent protocol. So intuitively, I would vote to work on this topic within another group. Otherwise people might get the impression that OAuth is directly tied to a certain token format. regards, Torsten. Am 10.01.2011 10:19, schr

Re: [OAUTH-WG] OAuth MAC token type draft

2011-01-10 Thread Torsten Lodderstedt
Eran, - Authentication schemes You propose to use the authentication scheme name "OAuth2" for the WWW-Authenticate header but another scheme name "MAC" for the authorization header. I've never seen such an asymmetric approach before. Don't you think people get confused about that? Moreover, th

[OAUTH-WG] Comments on OAuth 2.0 Bearer Token specification draft -01

2011-01-10 Thread Torsten Lodderstedt
Hi Mike, I've got some more comments on § 3.2 of your I-D. paragraph 4: "Encrypting the token contents is another alternative ..." How does token content encryption prevent the disclosure and abuse of a token? paragraph 5: "For those rare cases where the client is prevented from observing th

Re: [OAUTH-WG] Couple questions on draft-ietf-oauth-v2-bearer-01 security considerations

2011-01-10 Thread Torsten Lodderstedt
Independent of where this items belong to, the advice to only hand out tokens to authenticated clients is stronger as required by the core spec. There is a whole class of clients (native apps), which cannot keep secrets for the purpose of authentication. Moreover, what is the benefit of authen

Re: [OAUTH-WG] Final cuts and 3 interoperable implementations

2011-01-10 Thread Torsten Lodderstedt
please include me on behalf of Deutsche Telekom regards, Torsten. Am 05.01.2011 19:26, schrieb Eran Hammer-Lahav: In the next few weeks I plan to survey existing and planned implementations of each feature of the specification and those components without at least 3 interoperable (or complian

Re: [OAUTH-WG] unregistered applications

2011-01-05 Thread Torsten Lodderstedt
Francisco, Torsten, > Another question: how does the server validate the > identity/authenticity of the client? In other words, what > does a malicious app prevent from using the URL and server > of another native app? Let me rephrase your question (correct me if I'm wrong): can a malicious nat

Re: [OAUTH-WG] Native Client Extension

2011-01-04 Thread Torsten Lodderstedt
+1 I have asked myself all the time why "oob" disappeared in OAuth 2.0? Does Google use this feature? regards, Torsten. Am 29.12.2010 23:53, schrieb Marius Scurtescu: I would like to propose an OAuth 2 extension that helps native clients close the loop after the approval page. The extension d

Re: [OAUTH-WG] unregistered applications

2011-01-04 Thread Torsten Lodderstedt
Francisco, just to make sure I understood your paper correctly: even native clients are required to have a backend server component, which receives the authorization results and makes it available to the native client? regards, Torsten. Hi all, OAuth provides only weak security when used wi

Re: [OAUTH-WG] TLS is needed for redirecting back to the client

2011-01-04 Thread Torsten Lodderstedt
Francisco, the attack you described sounds very similar to session fixation attacks. TLS (more specifically server authentication) is one way to cope with spoofing in general (supposed the client has a reasonably CA policy). So it should do in this case, too. Validation of the redirect_uri a

Re: [OAUTH-WG] Fwd: New Version Notification for draft-campbell-oauth-saml-01

2010-12-14 Thread Torsten Lodderstedt
+1 Am 14.12.2010 um 04:19 schrieb Eran Hammer-Lahav : > I think the 'assertion' parameter should be moved into this draft and defined > there. This will also facilitate its proper definition and status (required, > singular, etc.). > > EHL > >> -Original Message- >> From: oauth-boun

Re: [OAUTH-WG] Comments on core draft -11

2010-12-13 Thread Torsten Lodderstedt
Am 13.12.2010 22:27, schrieb Marius Scurtescu: On Mon, Dec 13, 2010 at 11:00 AM, Torsten Lodderstedt wrote: section 5.2 “The authorization server SHOULD NOT issue a refresh token when the access grant type is an assertion or a set of client credentials.” How shall the server determine

[OAUTH-WG] Comments on core draft -11

2010-12-13 Thread Torsten Lodderstedt
section 5.1.5 Assertion I expected the assertion flow to be replaced by a general extension model for new grant types (as described in section 7.4)? But the the current text in section 5.1.5. requires every new grant type to use the "assertion" parameter. Thus it supports additional assertion

Re: [OAUTH-WG] 2nd OAuth Security Session, Thursday (18:10)

2010-11-10 Thread Torsten Lodderstedt
Hannes, will it be possible to dial-in? regards, Torsten. Am 09.11.2010 05:47, schrieb Hannes Tschofenig: Hi all, at yesterday's security session we discussed ways on what to provide in the security consideration for the OAuth specifications. The plan was to have another session on Thursday,

Re: [OAUTH-WG] [kitten] ** OAuth Tutorial & OAuth Security Session **

2010-11-09 Thread Torsten Lodderstedt
Am 10.11.2010 08:00, schrieb Nicolas Williams: [That is some cc list! Do you really need a cc list that large for this thread? I've set the reply-to to just oauth@ietf.org (note: I'm NOT subscribed to that list). Please honor the reply-to header. It's a good idea to set reply-to when making a

Re: [OAUTH-WG] Security Writeups -- Re: [kitten] [secdir] ** OAuth Tutorial & OAuth Security Session **

2010-11-09 Thread Torsten Lodderstedt
. Gesendet mit BlackBerry® Webmail von Telekom Deutschland -Original Message- From: Anthony Nadalin Date: Tue, 9 Nov 2010 01:54:57 To: Torsten Lodderstedt; Hannes Tschofenig Cc: ab...@ietf.org; r...@ietf.org; i...@ietf.org; sec...@ietf.org; web...@ietf.org; x...@ietf.org; kit...@ietf.or

Re: [OAUTH-WG] [secdir] ** OAuth Tutorial & OAuth Security Session **

2010-11-09 Thread Torsten Lodderstedt
n and considerations. The security considerations section of the core spec can then be distilled from this document. Regards, Torsten. Gesendet mit BlackBerry® Webmail von Telekom Deutschland -Original Message- From: Anthony Nadalin Date: Tue, 9 Nov 2010 01:54:57 To: Torsten Lodderstedt; Hannes Tscho

Re: [OAUTH-WG] ** OAuth Tutorial & OAuth Security Session **

2010-11-07 Thread Torsten Lodderstedt
Hi all, Mark McGloin and me have been working on OAuth 2.0 security considerations for a couple of weeks now. Since we both cannot attend the IETF-79 meetings, we would like to provide the WG with information regarding the current status of our work. I therefore uploaded a _preliminary_ versi

Re: [OAUTH-WG] OAuth abstractions

2010-10-22 Thread Torsten Lodderstedt
Martin, great to see you contributing to the WG! One question came into my mind: How do the other grant types (assertion, username/password, refresh token) fit into your abstractions? The grant type used also depends on the client and its capabilities, so just returning a single URL pointing

Re: [OAUTH-WG] OAuth session at IETF-79

2010-10-16 Thread Torsten Lodderstedt
Am 15.10.2010 19:52, schrieb David Recordon: Hey Hannes, I'd like to at least explain my reasoning behind not planning to go to the China meeting because it really isn't restrictions around travel. This is likely inpolitic to say, but it's because of how much of a waste of my time the LA meeti

Re: [OAUTH-WG] OAuth session at IETF-79

2010-10-14 Thread Torsten Lodderstedt
he WG planned to come to IETF-79? regards, Torsten. Am 14.10.2010 19:40, schrieb Hannes Tschofenig: No, there is not going to be a session at IETF79. We intentionally did not request a slot because of the IETF78 experience. On Oct 14, 2010, at 8:05 PM, Torsten Lodderstedt wrote: Will there

[OAUTH-WG] OAuth session at IETF-79

2010-10-14 Thread Torsten Lodderstedt
Will there be a OAuth session at IETF-79? The agenda currently does not contain such a session (http://tools.ietf.org/agenda/79/). regards, Torsten. ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] specification of authorization code properties

2010-10-01 Thread Torsten Lodderstedt
Prateek, as I remember previous discussions, both design options (self-contained short-living/one-time use tokens as well as random strings) shall be feasible. So your contribution would helpful anyway. regards, Torsten. Am 01.10.2010 18:36, schrieb PRATEEK MISHRA: Torsten, Brain Campbell

Re: [OAUTH-WG] Next steps (draft timeline)

2010-09-30 Thread Torsten Lodderstedt
Bassically, your suggestion sounds reasonable to me. The only thing I'm missing is discovery. As you pointed out in http://hueniverse.com/2010/09/oauth-2-0-without-signatures-is-bad-for-the-web/ this is a major enabler for interoperable APIs and motivates the need for signatures. Shouldn't we

Re: [OAUTH-WG] specification of authorization code properties

2010-09-30 Thread Torsten Lodderstedt
Thank you for your advice. The Oauth security considerations are not finished yet. They will handle the issues you raised, too. Regards, Torsten. Am 30.09.2010 um 01:33 schrieb PRATEEK MISHRA : > I read through v10 from the perspective of an implementor, and it seemed to > me that properties

Re: [OAUTH-WG] Basic signature support in the core specification

2010-09-27 Thread Torsten Lodderstedt
Am 27.09.2010 22:53, schrieb Dick Hardt: On 2010-09-27, at 11:25 AM, Torsten Lodderstedt wrote: Am 27.09.2010 19:11, schrieb Anthony Nadalin: What is needed is needed is the security considerations section complete, I don't think that the signature specification has to be in the core

Re: [OAUTH-WG] Basic signature support in the core specification

2010-09-27 Thread Torsten Lodderstedt
Am 27.09.2010 19:11, schrieb Anthony Nadalin: What is needed is needed is the security considerations section complete, I don't think that the signature specification has to be in the core to be complete, there are previsions to use SSL, if one needs to go beyond this then a reference to the

Re: [OAUTH-WG] Basic signature support in the core specification

2010-09-25 Thread Torsten Lodderstedt
Am 25.09.2010 04:22, schrieb Eran Hammer-Lahav: OAuth 2.0 is far from being published as an RFC. I estimate it is at least 6 months away from reaching final IESG approval, if not a year. This is mostly due to a significant effort needed in writing and reviewing the security considerations sect

Re: [OAUTH-WG] Basic signature support in the core specification

2010-09-24 Thread Torsten Lodderstedt
+1 for basic signature support there is a need to protect end-users from token abuse by rogue resource servers (see http://tools.ietf.org/html/draft-ietf-oauth-v2-10#section-5, paragraph 3). Signatures based on a token secret is one way to prevent this kind of attack. Signature mechanisms

Re: [OAUTH-WG] User-Agent flow and refresh tokens

2010-09-21 Thread Torsten Lodderstedt
Am 20.09.2010 07:34, schrieb Luke Shepard: Yes, Facebook is recommending the User-Agent flow for desktop > applications. This works for them because access tokens issued by > Facebook are not short lived, I don't think they expire. The desktop > app does not need a refresh token. > > If th

Re: [OAUTH-WG] User-Agent flow and refresh tokens

2010-09-19 Thread Torsten Lodderstedt
Am 18.09.2010 01:28, schrieb Kris Selden: Secrets on native apps are good! The key is (no pun intended) that the secret not ship with the app. Each client should register for its own client_id and secret when it is installed on the client machine. Maybe I'm missing something but... If it h

Re: [OAUTH-WG] User-Agent flow and refresh tokens

2010-09-19 Thread Torsten Lodderstedt
Am 16.09.2010 21:35, schrieb Marius Scurtescu: On Thu, Sep 16, 2010 at 12:00 PM, Torsten Lodderstedt wrote: I don't know whether I understand you correctly. Are you saying that refresh tokens only make sense in Web servers? I was referring to the "web server" flow/profile.

Re: [OAUTH-WG] Question about error response rule described in section 4.3 of draft v.10

2010-09-18 Thread Torsten Lodderstedt
Default for client password authentication is HTTP BASIC (cf. http://tools.ietf.org/html/draft-ietf-oauth-v2-10#section-2.1) regards, Torsten. Am 16.09.2010 15:52, schrieb mat...@gmail: Hi experts, I'm now developing OAuth2 server library in Ruby, rack-oauth2. I have one question about error

Re: [OAUTH-WG] User-Agent flow and refresh tokens

2010-09-16 Thread Torsten Lodderstedt
I don't know whether I understand you correctly. Are you saying that refresh tokens only make sense in Web servers? regards, Torsten. Am 16.09.2010 um 18:04 schrieb Marius Scurtescu : > On Wed, Sep 15, 2010 at 10:39 PM, Torsten Lodderstedt > wrote: >> Am 16.09.2010 um 05:

Re: [OAUTH-WG] User-Agent flow and refresh tokens

2010-09-15 Thread Torsten Lodderstedt
ote: > I don't see why would you use the user-agent flow with a native > application? Maybe the spec should suggest only the web server flow. > The device flow would also work, but that's not part of the core spec. > > Marius > > > > On Wed, Sep 15, 2010

[OAUTH-WG] User-Agent flow and refresh tokens

2010-09-15 Thread Torsten Lodderstedt
I'm wondering whether it makes sense to allow for the issuance of refresh tokens by the user-agent flow. Background of my considerations is the development of applications on mobile devices (apps :-)). The draft suggests to either use the web server or the user agent flow for the integration

Re: [OAUTH-WG] I-D on token revocation submitted

2010-09-14 Thread Torsten Lodderstedt
direct access token revocation is optional but, if supported, then all > associated assess tokens must also be revoked on a revocation of a > refresh token. > > On Sun, Sep 12, 2010 at 4:13 AM, Torsten Lodderstedt > wrote: >> Stefanie, >> >> thanks for your com

Re: [OAUTH-WG] Rechartering

2010-09-14 Thread Torsten Lodderstedt
I plan to work on that aspect. Do you (or someone else) want to contribute? regards, Torsten. Am 14.09.2010 um 17:18 schrieb Mark Mcgloin : > What about Security Considerations. I know some individuals have worked on > it in the past - does it need a WG to complete > > > Mark McGloin > > Han

Re: [OAUTH-WG] Why give the redirect URI when trading an access code for an access token?

2010-09-12 Thread Torsten Lodderstedt
token, attaching it to the evil user's account. 9. Evil user can now access victim user data on his client account. This is basically a session fixation attack. EHL -Original Message----- From: Torsten Lodderstedt [mailto:tors...@lodderstedt.net] Sent: Saturday, September 11, 2010 1:01 A

Re: [OAUTH-WG] I-D on token revocation submitted

2010-09-12 Thread Torsten Lodderstedt
y thoughts? Regards, Stefanie Am 08.09.2010 00:21, schrieb Torsten Lodderstedt: I just submited the first version of my I-D for token revocation. Link: https://datatracker.ietf.org/doc/draft-lodderstedt-oauth-revocation/ The I-D proposes an additional endpoint, which can be used to revok

Re: [OAUTH-WG] I-D on token revocation submitted

2010-09-12 Thread Torsten Lodderstedt
e or a shared data base to assure that revoked (refresh) tokens are invalid. => Is this requirement really a MUST? I don't think so. Any thoughts? Regards, Stefanie Am 08.09.2010 00:21, schrieb Torsten Lodderstedt: I just submited the first version of my I-D for token revoca

Re: [OAUTH-WG] Rechartering

2010-09-11 Thread Torsten Lodderstedt
Hannes, what about discovery? "Recommendations of commonly used Scope values" sounds to weak from my point of view. I would rather suggest to work towards a clear definition of scope syntax and semantics, including resource server identification. Please note, I submitted a I-D on token revo

Re: [OAUTH-WG] Why give the redirect URI when trading an access code for an access token?

2010-09-11 Thread Torsten Lodderstedt
Doesn't step 7 require the evil user to know the client's secret? Am 10.09.2010 17:06, schrieb Eran Hammer-Lahav: 1. Evil user starts the OAuth flow on the client using the web-server flow. 2. Client redirects the evil user to the authorization server, including state information about the evi

[OAUTH-WG] I-D on token revocation submitted

2010-09-07 Thread Torsten Lodderstedt
I just submited the first version of my I-D for token revocation. Link: https://datatracker.ietf.org/doc/draft-lodderstedt-oauth-revocation/ The I-D proposes an additional endpoint, which can be used to revoke both refresh and access tokens. The objective is to enhance OAuth security by givin

Re: [OAUTH-WG] Simpilfying use of assertions when requesting an access token

2010-09-03 Thread Torsten Lodderstedt
+1 we just discussed the need for adding grant types in order support Telekom-specific user authentication mechanisms. So this proposal comes right in time :-) regards, Torsten. Am 02.09.2010 um 23:27 schrieb Justin Richer : > +1 > > I've never liked the notion of not being able to extend

Re: [OAUTH-WG] issuing new refresh tokens

2010-09-02 Thread Torsten Lodderstedt
ensus as I was able to extract. EHL -Original Message----- From: Torsten Lodderstedt [mailto:tors...@lodderstedt.net] Sent: Wednesday, July 14, 2010 2:33 PM To: Brian Eaton Cc: Kris Selden; Eran Hammer-Lahav; OAuth WG Subject: Re: [OAUTH-WG] issuing new refresh tokens On Tue, Jul 13, 2010

Re: [OAUTH-WG] more than one assertion?

2010-08-31 Thread Torsten Lodderstedt
(aggregated) or these may be verified and passed on, there are cases where both are methods are used. So we have thought about multiple tokens,, this winds up being more complicated and traffic, the reason to not send directly is for user consent. *From:* Torsten Lodderstedt [mailto:tors

Re: [OAUTH-WG] survey: token revocation design options (intermediate result)

2010-08-28 Thread Torsten Lodderstedt
seams option 2 took the lead by one vote. 1a II 1b I 1c 2 III If no one objects by 08/29, I start writing the I-D based on option 2. regards, Torsten. Am 16.08.2010 23:09, schrieb Torsten Lodderstedt: Hi all, I intend to submit a I-D for token revocation. Based on previous discussions on

Re: [OAUTH-WG] comments/questions on draft 10

2010-08-28 Thread Torsten Lodderstedt
Am 28.08.2010 20:48, schrieb David Recordon: On Sat, Aug 28, 2010 at 11:38 AM, Torsten Lodderstedt mailto:tors...@lodderstedt.net>> wrote: I think a bit more then just defining the delimiter is required in order to make things work as you described (in a interoperable way).

Re: [OAUTH-WG] Moving the User Experience Extension draft forward

2010-08-28 Thread Torsten Lodderstedt
+1 on making this a WG item Am 27.08.2010 22:23, schrieb David Recordon: Given our implementation experience, an iPad should use "popup" as it's a full web browser on a reasonably large screen. Android and the iPhone should use "touch". I'd be happy to add clarifying language in the extension

Re: [OAUTH-WG] Moving the User Experience Extension draft forward

2010-08-28 Thread Torsten Lodderstedt
d for it yet in our production deployment. On Sat, Aug 28, 2010 at 11:08 AM, Torsten Lodderstedt mailto:tors...@lodderstedt.net>> wrote: David, any opinion on screen orientation and size? regards, Torsten. Am 27.07.2010 12:51, schrieb Torsten Lodderstedt: If I

Re: [OAUTH-WG] comments/questions on draft 10

2010-08-28 Thread Torsten Lodderstedt
peration on scope. 5.2.1 also defines how a protected resource can tell the client what additional scope(s) are needed in order to make their request successful. Standardizing the delimiter allows for this sort of "addition" interaction. --David On Tue, Aug 24, 2010 at 10:41 P

Re: [OAUTH-WG] Moving the User Experience Extension draft forward

2010-08-28 Thread Torsten Lodderstedt
David, any opinion on screen orientation and size? regards, Torsten. Am 27.07.2010 12:51, schrieb Torsten Lodderstedt: If I understand your proposal correctly, you assume the clients knows better than the authz server how to fit the client presentation capabilities the best. Wouldn'

Re: [OAUTH-WG] survey: token revocation design options

2010-08-24 Thread Torsten Lodderstedt
? Another drawback is that the access token response has to be extended. What kind of modifications of tokens do you have in mind? (as you commented with 1c) Regards, Stefanie Am 16.08.2010 23:09, schrieb Torsten Lodderstedt: Hi all, I intend to submit a I-D for token revocation. Based on previous

[OAUTH-WG] comments/questions on draft 10

2010-08-24 Thread Torsten Lodderstedt
--- p.6 terminology/authorization server " A server capable of issuing tokens after successfully authenticating the resource owner and obtaining authorization. The authorization server may be the same server as the resource server, or a separate entity. " Based

Re: [OAUTH-WG] more than one assertion?

2010-08-20 Thread Torsten Lodderstedt
What data shall the issued token contain? Different identifiers and also information about the different issuing authorities? Is the new token's data inherited from the source assertions or are the assertions just verified and the token data (incl. identity) are from other sources? What do yo

Re: [OAUTH-WG] survey: token revocation design options

2010-08-17 Thread Torsten Lodderstedt
17.08.2010 00:51, schrieb Lukas Rosenstock: +1 for your option 1a or 1b - 1c introduces another "token" to manage with the id, which I feel should be avoided. - 2 would also be fine, though not so "beautiful" in terms of architecture. 2010/8/16 Torsten Lodderstedt <mailto:

Re: [OAUTH-WG] survey: token revocation design options

2010-08-17 Thread Torsten Lodderstedt
1a and 1b. I suspect I missed something; if not, I would change my vote to 1c or 1a+1c.) Looking forward to seening the new I-D, Igor Torsten Lodderstedt wrote: Hi all, I intend to submit a I-D for token revocation. Based on previous discussions on the mailing list and here at Deutsche

Re: [OAUTH-WG] Returning HTTP 200 on Error for JSONP

2010-08-17 Thread Torsten Lodderstedt
the > letter of the core spec, which might take some wordsmithing.) > > On Monday, August 16, 2010, Torsten Lodderstedt > wrote: >> Paul Tarjan schrieb: >> >> Yes, I'm talking about 5.2.1 >> >> For JSONP the user's browser is the client. It

Re: [OAUTH-WG] Returning HTTP 200 on Error for JSONP

2010-08-16 Thread Torsten Lodderstedt
n status code 200 for such requests. This keeps the spec simpler and preserves the behavior of requests following the rules of section 5.1.1.. regards, Torsten. Paul On Aug 16, 2010, at 3:09 PM, Torsten Lodderstedt wrote: I would like to furthermore track down the relevant use cases. Assuming

Re: [OAUTH-WG] Returning HTTP 200 on Error for JSONP

2010-08-16 Thread Torsten Lodderstedt
I would like to furthermore track down the relevant use cases. Assuming you are referring to section 5.2.1, how does your client send the access token to the resource server? I'm asking because I think error handling for URI query parameters, Body parameters and Authorization headers could be h

[OAUTH-WG] survey: token revocation design options

2010-08-16 Thread Torsten Lodderstedt
Hi all, I intend to submit a I-D for token revocation. Based on previous discussions on the mailing list and here at Deutsche Telekom, I see a couple of design options. I would like to share those options with the WG and try to reach consensus on a single option before investing the time to w

Re: [OAUTH-WG] more than one assertion?

2010-08-13 Thread Torsten Lodderstedt
multiple (SAML) assertions also mean multiple subject statements. Are there any constraints regarding the relations among those subjects (identities)? regards, Torsten. Am 12.08.2010 um 22:01 schrieb Brian Campbell : > I generally agree more with Chuck, David and Brain E than I don't. > But

Re: [OAUTH-WG] Quick survey: fragment vs. query

2010-08-11 Thread Torsten Lodderstedt
? regards, Torsten. Am 10.08.2010 um 19:57 schrieb Torsten Lodderstedt : > Thank you for the explanation. > > I now understand that the fragment is used for efficiently passing token or > code on the client side. What I still don't understand is why a client would > need both a

Re: [OAUTH-WG] Proposal for OAuth dynamic client registration

2010-08-11 Thread Torsten Lodderstedt
Am 11.08.2010 um 17:40 schrieb Christian Scholz : > Am 11.08.10 17:31, schrieb Torsten Lodderstedt: >> >>>> >>>> >>> >>>> How is a UMA requestor envisioned to discover the auth server? >>> >>> On the Host side the u

Re: [OAUTH-WG] Proposal for OAuth dynamic client registration

2010-08-11 Thread Torsten Lodderstedt
Am 11.08.2010 um 17:40 schrieb Christian Scholz : > Am 11.08.10 17:31, schrieb Torsten Lodderstedt: >> >>>> >>>> >>> >>>> How is a UMA requestor envisioned to discover the auth server? >>> >>> On the Host side the u

Re: [OAUTH-WG] Proposal for OAuth dynamic client registration

2010-08-11 Thread Torsten Lodderstedt
>> >> > >> How is a UMA requestor envisioned to discover the auth server? > > On the Host side the user can tell it which AM (in UMA terms it's an > Authorization Manager, some sort of extended AS) to use or it might be > discovered via webfinger or similar means. > > The process for requeste

Re: [OAUTH-WG] Proposal for OAuth dynamic client registration

2010-08-11 Thread Torsten Lodderstedt
Am 11.08.2010 um 12:40 schrieb Torsten Lodderstedt : > Eve, > > thank you for writting this document. I consider it a good starting point for > a discussion about client registration and discovery. Will you propose this > as a WG item? > > My comments & questions

Re: [OAUTH-WG] Proposal for OAuth dynamic client registration

2010-08-11 Thread Torsten Lodderstedt
Eve, thank you for writting this document. I consider it a good starting point for a discussion about client registration and discovery. Will you propose this as a WG item? My comments & questions: You propose a host-meta based discovery of the registration endpoint on the authz server. Could

Re: [OAUTH-WG] Quick survey: fragment vs. query

2010-08-10 Thread Torsten Lodderstedt
were: >> >> 1. It's already coded this way. >> 2. It's the most efficient way of doing that, because that relay.html page >> is static and can be cached by a browser. >> >> None of the answers above looks very convincing to me, but that's w

Re: [OAUTH-WG] Quick survey: fragment vs. query

2010-08-10 Thread Torsten Lodderstedt
t; >> thread). The answers that I've got were: >> >> 1. It's already coded this way. >> 2. It's the most efficient way of doing that, because that relay.html page >> is static and can be cached by a browser. >> >> None of the answers

<    4   5   6   7   8   9   10   11   12   >