Re: [OAUTH-WG] User-Agent flow and refresh tokens

Torsten Lodderstedt <torsten@lodderstedt.net> Thu, 16 September 2010 05:41 UTC

Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 050DA3A6897 for <oauth@core3.amsl.com>; Wed, 15 Sep 2010 22:41:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.407
X-Spam-Level:
X-Spam-Status: No, score=-1.407 tagged_above=-999 required=5 tests=[AWL=-0.555, BAYES_00=-2.599, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zEj+ng6d-GiJ for <oauth@core3.amsl.com>; Wed, 15 Sep 2010 22:40:47 -0700 (PDT)
Received: from smtprelay02.ispgateway.de (smtprelay02.ispgateway.de [80.67.18.44]) by core3.amsl.com (Postfix) with ESMTP id 5D5AF3A6AE0 for <oauth@ietf.org>; Wed, 15 Sep 2010 22:39:56 -0700 (PDT)
Received: from [79.253.24.64] (helo=[192.168.71.41]) by smtprelay02.ispgateway.de with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1Ow7Cb-0005Tj-DJ; Thu, 16 Sep 2010 07:40:09 +0200
References: <4C913EE3.90704@lodderstedt.net> <AANLkTikJGDUKCfiPiN_rAVXmbPF0SBN_sKNQFHw6-oqj@mail.gmail.com> <AANLkTime0dayBq1k+ee7xNp3pkBE2-Ltn-i=LNh0-XvB@mail.gmail.com>
In-Reply-To: <AANLkTime0dayBq1k+ee7xNp3pkBE2-Ltn-i=LNh0-XvB@mail.gmail.com>
Mime-Version: 1.0 (iPhone Mail 8B117)
Content-Transfer-Encoding: 7bit
Content-Type: multipart/alternative; boundary="Apple-Mail-4--781794886"
Message-Id: <0B18D334-441B-48C0-8836-8F285404B53F@lodderstedt.net>
X-Mailer: iPhone Mail (8B117)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
Date: Thu, 16 Sep 2010 07:39:14 +0200
To: Andrew Arnott <andrewarnott@gmail.com>
X-Df-Sender: 141509
Cc: "OAuth WG (oauth@ietf.org)" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] User-Agent flow and refresh tokens
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Sep 2010 05:41:33 -0000

Am 16.09.2010 um 05:53 schrieb Andrew Arnott <andrewarnott@gmail.com>:

> The user agent flow works for native apps that can host a web browser.  It works pretty well in my experience.
> 
Would like to see support for refresh tokens in this flow?
> Secrets on native apps are good!  The key is (no pun intended) that the secret not ship with the app.  Each client should register for its own client_id and secret when it is installed on the client machine. 
> 
Yes, native apps can obtain a key when they are installed on a device (Not part of the core). What does it help with respect to the Client authentication? 

Regards,
Torsten.

> --
> Andrew Arnott
> "I [may] not agree with what you have to say, but I'll defend to the death your right to say it." - S. G. Tallentyre
> 
> 
> 
> On Wed, Sep 15, 2010 at 3:25 PM, Marius Scurtescu <mscurtescu@google.com> wrote:
> I don't see why would you use the user-agent flow with a native
> application? Maybe the spec should suggest only the web server flow.
> The device flow would also work, but that's not part of the core spec.
> 
> Marius
> 
> 
> 
> On Wed, Sep 15, 2010 at 2:47 PM, Torsten Lodderstedt
> <torsten@lodderstedt.net> wrote:
> >  I'm wondering whether it makes sense to allow for the issuance of refresh
> > tokens by the user-agent flow.
> >
> > Background of my considerations is the development of applications on mobile
> > devices (apps :-)). The draft suggests to either use the web server or the
> > user agent flow for the integration of such applications with an OAuth
> > authorization server. For sake of user experience, I would expect mobile
> > applications to use refresh tokens instead of sending the user through the
> > authorization on every application start. I also would assume that the
> > mobile client does not use a client secret because it cannot really protect
> > it from recovery. Instead, token theft could be encountered by replacing
> > refresh tokens with every request to the tokens endpoint.
> >
> > This scenario is feasable with the web server flow but not with the
> > user-agent flow. This is because the later does only support the issuance of
> > access tokens. In previous discussions this has been motivated by the weaker
> > security (missing client authentication) of the user-agent flow. But as
> > pointed out above, the web server flow can (and will be) used w/o client
> > secret, too.
> >
> > So why don't we allow for the  issuance of refresh tokens by the user-agent
> > flow?
> >
> > regards,
> > Torsten.
> >
> >
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> >
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>