Category: Internet Protocols
Articles relating to Internet Protocols, protocol design issues, etc.
How to make block chains strongly consistent
Going off chain for storage
Why are enterprises interested in the block chain?
State diagrams for Paxos made simple
Wrapped or Native Paxos?
Average, percentiles and measuring service performance
Distributed Storage Reading List
My technical wanderings of late at Microsoft have taken me into the realm of massively distributed storage. Of course, I've been here before but this time I need to bring some other folks along. So I was asked to put together suggested readings to help people come up to speed. I thought the list might be of general interest so I'm posting it here.
What do you think? Is this a good list? A bad one? What would you suggest?
Continue reading Distributed Storage Reading ListOAuth 2.0 Bearer tokens – unsafe at any speed?
Eran's latest article raises a number of specific security threats by way of arguing that bearer tokens are irredeemably insecure. In this article I examine the attacks Eran calls out and demonstrate that they are already addressed by OAuth 2.0. Eran's article does bring up the interesting question of - do we need defense in depth for the tamper resistance and confidentiality provided by SSL/TLS?
Continue reading OAuth 2.0 Bearer tokens – unsafe at any speed?Why does OAuth need request tokens?
OAuth's current access dance is based getting a request token that is later exchanged for an access token. Introducing the request token takes what could have been a 4 round trip protocol and makes it into a 6 round trip protocol. Couldn't we just simplify OAuth down to 4 round trips by getting rid of the request token all together? Or is there some critical use case enabled by request tokens that makes all the complexity worth the price?
[5/26/2009 – Updated with Q&A on open redirectors]
[6/2/2009 – Updated with a note from Allen Tom on another way to prevent open redirector attacks]