- From: Jim Whitehead <ejw@soe.ucsc.edu>
- Date: Fri, 6 Jan 2006 08:00:19 -0800
- To: webdav WG <w3c-dist-auth@w3.org>
- Message-Id: <3F143F78-E528-41E2-A7FA-AB6FEA569CCA@cs.ucsc.edu>
FYI. I have added Joe's email to the accept2 list. - Jim Begin forwarded message: > From: Joe Orton <jorton@redhat.com> > Date: January 5, 2006 2:24:02 PM PST > To: Lisa Dusseault <lisa@osafoundation.org> > Cc: HTTP authentication list <ietf-http-auth@osafoundation.org>, > webdav WG <w3c-dist-auth@w3.org> > Subject: [Moderator Action] Re: [Ietf-http-auth] Clients desiring > to authenticate > > > > On Thu, Jan 05, 2006 at 10:33:13AM -0800, Lisa Dusseault wrote: >> Thanks for your thoughts on the authentication stuff, Joe, but I >> certainly disagree at a most fundamental level about whether it's >> something clients need to be able to do. Browsers might not need >> to do >> so, but I can think of cases where that would be useful for browsers >> too, and it's definitely useful for authoring clients where >> authorization info is usually necessary to do write operations. >> >> Consider some of the WebDAV clients that I'm familiar with: > ... > > None of this has anything to do with "pre-authenticating" in HTTP. > > If your application is designed such that it cannot interactively > prompt > users for credentials when challenged, fine, the app must request > those > credentials from the user ahead of time. That is purely an > application > design problem, it doesn't imply that the user agent must send those > credentials to the server *before it is challenged to do so*. > >> I also disagree about your reading of 2617. The text is "If the >> origin >> server does not wish to accept the credentials sent with a >> request, it >> SHOULD return a 401 (Unauthorized) response. " Isn't ignoring the >> credentials the same thing as "not wish to accept"? How can you >> justify accepting a bogus username and password except by entirely >> ignoring it? > > The server has no basis on which to validate the credentials, and > hence > do anything other than ignore them. It *cannot* form a valid WWW-Auth > challenge because it has not been configured to do so. Follow your > argument through as if you were going to implement it server-side: > what > challenge do you expect the server to send? It cannot make one up out > of thin air. > >> But we can certainly quibble about *how* the problem is solved, I >> care >> more *that* the problem is solved -- for HTTP, WebDAV, CalDAV and >> others. Would you feel it was still a hack if the client used what >> had previously been a legitimate username (at least for elsewhere in >> that domain)? > > If we're not talking about the "I don't want to have to send the 100MB > PUT body twice in case I get a 401 the first time" problem (which is > what I presumed that Appendix D was really about), I don't know what > problem you're talking about. > > joe
Received on Friday, 6 January 2006 16:00:27 UTC