Re: [Standards] XMPP OAuth2 login at Google

2015-04-20 Thread Thijs Alkemade
[Reviving a very old thread] It looks like today is going to be the day Google shuts down ClientLogin [1], and with that, SASL PLAIN [2]. This might be the final nail in the coffin of XMPP support for Google Talk, as I fear few clients have implemented X-OAUTH2. We have an update in beta for

Re: [Standards] XMPP OAuth2 login at Google

2015-04-20 Thread Anu Pokharel
That’s a relief. I noticed you did this in the newer Adium betas and was wondering what was going on. I guess it’s on my radar to complete on Monal now as well. The gradual movement away from standard XMPP in gtalk is depressing. -Anu On Apr 20, 2015, at 10:01 AM, Thijs Alkemade

Re: [Standards] XMPP OAuth2 login at Google

2015-04-20 Thread Thijs Alkemade
On 20 apr. 2015, at 10:15, Thijs Alkemade th...@xnyhps.nl wrote: [Reviving a very old thread] It looks like today is going to be the day Google shuts down ClientLogin [1], and with that, SASL PLAIN [2]. This might be the final nail in the coffin of XMPP support for Google Talk, as I fear

Re: [Standards] XMPP OAuth2 login at Google

2012-09-24 Thread Peter Saint-Andre
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 9/18/12 12:19 PM, Hannes Tschofenig wrote: On 09/18/2012 08:51 PM, Peter Saint-Andre wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 9/18/12 11:25 AM, Hannes Tschofenig wrote: On 09/18/2012 08:21 PM, Peter Saint-Andre wrote: (Btw,

Re: [Standards] XMPP OAuth2 login at Google

2012-09-18 Thread Hannes Tschofenig
Here is my impression: Since the community OAuth specification allowed the usage of PLAIN without TLS there is most likely still a lot of code out there that uses it without any confidentiality protection (which is obviously very insecure). (Btw, the current XMPP OAuth XEP is also insecure...)

Re: [Standards] XMPP OAuth2 login at Google

2012-09-18 Thread Hannes Tschofenig
Hi Randy, the issue about the browser interaction is that the SSO mechanisms for the Web* have not standardized the authentication part. Since there is so much Web deployment out there and folks have an interest to work with existing deployment. However, there is a window of opportunity

Re: [Standards] XMPP OAuth2 login at Google

2012-09-18 Thread Peter Saint-Andre
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 9/18/12 11:16 AM, Hannes Tschofenig wrote: Here is my impression: Since the community OAuth specification allowed the usage of PLAIN without TLS there is most likely still a lot of code out there that uses it without any confidentiality

Re: [Standards] XMPP OAuth2 login at Google

2012-09-18 Thread Hannes Tschofenig
On 09/18/2012 08:21 PM, Peter Saint-Andre wrote: (Btw, the current XMPP OAuth XEP is also insecure...) Calling it current is a bit of a stretch.:) It was deferred for inactivity quite some time ago. At this point, any use of OAuth in XMPP would likely be based on the SASL mechanism. I didn't

Re: [Standards] XMPP OAuth2 login at Google

2012-09-18 Thread Hannes Tschofenig
The choices are: * OAuth SASL http://tools.ietf.org/html/draft-ietf-kitten-sasl-oauth-08 IMHO it would work fine with OpenID Connect since OpenID Connect is based on OAuth 2.0. * OpenID SASL http://tools.ietf.org/html/rfc6616 * SAML SASL http://tools.ietf.org/html/rfc6595

Re: [Standards] XMPP OAuth2 login at Google

2012-09-18 Thread Peter Saint-Andre
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 9/18/12 11:25 AM, Hannes Tschofenig wrote: On 09/18/2012 08:21 PM, Peter Saint-Andre wrote: (Btw, the current XMPP OAuth XEP is also insecure...) Calling it current is a bit of a stretch.:) It was deferred for inactivity quite some time ago.

Re: [Standards] XMPP OAuth2 login at Google

2012-09-18 Thread Hannes Tschofenig
On 09/18/2012 08:51 PM, Peter Saint-Andre wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 9/18/12 11:25 AM, Hannes Tschofenig wrote: On 09/18/2012 08:21 PM, Peter Saint-Andre wrote: (Btw, the current XMPP OAuth XEP is also insecure...) Calling it current is a bit of a stretch.:) It

Re: [Standards] XMPP OAuth2 login at Google

2012-09-17 Thread Ralph Meijer
On 2012-09-13 19:20, Peter Saint-Andre wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 9/11/12 4:24 PM, Lance Stout wrote: It's a bit annoying that they add an extra attribute to the auth / element, because it adds a special case to check in what would ideally be a fully generic

Re: [Standards] XMPP OAuth2 login at Google

2012-09-17 Thread Randy Turner
PLAIN is going to be deprecated, even though TLS is pretty much ubiquitous? RandyRalph Meijer ral...@ik.nu wrote:On 2012-09-13 19:20, Peter Saint-Andre wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 9/11/12 4:24 PM, Lance Stout wrote: It's a bit annoying that they add an extra

Re: [Standards] XMPP OAuth2 login at Google

2012-09-17 Thread Ralph Meijer
On 2012-09-17 21:10, Randy Turner wrote: PLAIN is going to be deprecated, even though TLS is pretty much ubiquitous? This has to do with their intent to ban the use of passwords in applications and rely on 2-step verification with OAuth2 bearer tokens. -- ralphm

Re: [Standards] XMPP OAuth2 login at Google

2012-09-17 Thread Kim Alvefur
On 2012-09-17T21:10:20 CEST, Randy Turner wrote: PLAIN is going to be deprecated, even though TLS is pretty much ubiquitous? Looks like it only affects GTalk. -- Regards, Kim Zash Alvefur signature.asc Description: OpenPGP digital signature

Re: [Standards] XMPP OAuth2 login at Google

2012-09-17 Thread Peter Saint-Andre
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 9/17/12 1:36 PM, Ralph Meijer wrote: On 2012-09-17 21:10, Randy Turner wrote: PLAIN is going to be deprecated, even though TLS is pretty much ubiquitous? This has to do with their intent to ban the use of passwords in applications and rely

Re: [Standards] XMPP OAuth2 login at Google

2012-09-17 Thread Justin Karneges
On Monday, September 17, 2012 01:39:46 PM Peter Saint-Andre wrote: On 9/17/12 1:36 PM, Ralph Meijer wrote: On 2012-09-17 21:10, Randy Turner wrote: PLAIN is going to be deprecated, even though TLS is pretty much ubiquitous? This has to do with their intent to ban the use of passwords

Re: [Standards] XMPP OAuth2 login at Google

2012-09-17 Thread Ivan Martinez
I'm currently considering wether to use OAuth2 or OpenID2 in my server. Which one do you think will be more adopted as a user authentication mechanism in XMPP servers?. Which companies are planing to use each of them?. Thanks, Ivan On Mon, 17 Sep 2012 13:39:46 -0600, Peter Saint-Andre wrote:

Re: [Standards] XMPP OAuth2 login at Google

2012-09-17 Thread Peter Saint-Andre
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 9/17/12 3:00 PM, Ivan Martinez wrote: I'm currently considering wether to use OAuth2 or OpenID2 in my server. Which one do you think will be more adopted as a user authentication mechanism in XMPP servers?. Which companies are planing to use

Re: [Standards] XMPP OAuth2 login at Google

2012-09-17 Thread Randy Turner
What about a combination...OpenID Connect ? Peter Saint-Andre stpe...@stpeter.im wrote:-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 9/17/12 3:00 PM, Ivan Martinez wrote: I'm currently considering wether to use OAuth2 or OpenID2 in my server. Which one do you think will be more adopted as a

Re: [Standards] XMPP OAuth2 login at Google

2012-09-17 Thread Randy Turner
I would like to emphasize the earlier point….it would be nice if we had a solution that did NOT require an interactive browser procedure. Randy On Sep 17, 2012, at 5:21 PM, Randy Turner rtur...@amalfisystems.com wrote: What about a combination...OpenID Connect ? Peter Saint-Andre

Re: [Standards] XMPP OAuth2 login at Google

2012-09-13 Thread Peter Saint-Andre
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 9/11/12 4:24 PM, Lance Stout wrote: It's a bit annoying that they add an extra attribute to the auth / element, because it adds a special case to check in what would ideally be a fully generic implementation. Fortunately, it doesn't seem to be

[Standards] XMPP OAuth2 login at Google

2012-09-11 Thread Arc Riley
FYI, Google recently documented their X-OAUTH2 SASL method; https://developers.google.com/talk/jep_extensions/oauth

Re: [Standards] XMPP OAuth2 login at Google

2012-09-11 Thread Lance Stout
It's a bit annoying that they add an extra attribute to the auth / element, because it adds a special case to check in what would ideally be a fully generic implementation. Fortunately, it doesn't seem to be required for now. -- Lance On Sep 11, 2012, at 3:15 PM, Arc Riley arcri...@gmail.com