Re: [OAUTH-WG] Draft -12 feedback deadline

Marius Scurtescu <mscurtescu@google.com> Fri, 18 February 2011 17:40 UTC

Return-Path: <mscurtescu@google.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CBCFA3A6F5F for <oauth@core3.amsl.com>; Fri, 18 Feb 2011 09:40:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.977
X-Spam-Level:
X-Spam-Status: No, score=-105.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id E7K1d0UdVDRW for <oauth@core3.amsl.com>; Fri, 18 Feb 2011 09:40:09 -0800 (PST)
Received: from smtp-out.google.com (smtp-out.google.com [74.125.121.67]) by core3.amsl.com (Postfix) with ESMTP id 3A9823A6E69 for <oauth@ietf.org>; Fri, 18 Feb 2011 09:40:09 -0800 (PST)
Received: from hpaq12.eem.corp.google.com (hpaq12.eem.corp.google.com [172.25.149.12]) by smtp-out.google.com with ESMTP id p1IHeg4S011032 for <oauth@ietf.org>; Fri, 18 Feb 2011 09:40:42 -0800
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1298050842; bh=cJEHvVJaRHiKR28lfzB4e14t+3k=; h=MIME-Version:In-Reply-To:References:From:Date:Message-ID:Subject: To:Cc:Content-Type; b=dr2voTntB3nALCs4a6QN+WD7bAfNtfB1Xs8jg4gIDiNbwYcpN/PBt2lTpNInTnZSg kmf2HReJyJ1i05isM7e6w==
Received: from gxk27 (gxk27.prod.google.com [10.202.11.27]) by hpaq12.eem.corp.google.com with ESMTP id p1IHeAXD030899 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT) for <oauth@ietf.org>; Fri, 18 Feb 2011 09:40:41 -0800
Received: by gxk27 with SMTP id 27so1729064gxk.31 for <oauth@ietf.org>; Fri, 18 Feb 2011 09:40:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=beta; h=domainkey-signature:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type; bh=wO84oJ37m5iXqyv3QYBkIrLY3+W2Bg9+EGsVjfRi76c=; b=Vaouc/mk8ESPRVT5c6J7Pqi8cm3B2FktVYcfkVyxn08O48wGPHinuSs4NLDrjRyJDv wAUMynzle+so1OmBYgng==
DomainKey-Signature: a=rsa-sha1; c=nofws; d=google.com; s=beta; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; b=wK/d4+usnErrDWxr4Hf3CVtWiED/6mMSjKZhX+URty651NgbbiEiGtxn4c4ALRDqYq omTTteuj1XDxuAj1iavw==
Received: by 10.100.33.16 with SMTP id g16mr463396ang.96.1298050841114; Fri, 18 Feb 2011 09:40:41 -0800 (PST)
MIME-Version: 1.0
Received: by 10.100.12.3 with HTTP; Fri, 18 Feb 2011 09:40:21 -0800 (PST)
In-Reply-To: <OFEFAF96E1.1837BBD4-ON8025783B.0040108E-8025783B.0040FF69@ie.ibm.com>
References: <90C41DD21FB7C64BB94121FBBC2E723445A8D6254D@P3PW5EX1MB01.EX1.SECURESERVER.NET> <AANLkTinMjQW26mLkoN7oMdLWLGAHp0_O9LbVi13RpMJB@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E723445A91D3EE9@P3PW5EX1MB01.EX1.SECURESERVER.NET> <AANLkTimjWkO8o+z+P=AKpyYkSjTh6oS7uM9N0JwR_vR6@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E723445A91D3F44@P3PW5EX1MB01.EX1.SECURESERVER.NET> <AANLkTi=tvwsR=_EhPRkYEwC+ERwRCNN2aAWDqRDvwx8B@mail.gmail.com> <FFDFD7371D517847AD71FBB08F9A315638493F514F@SP2-EX07VS06.ds.corp.yahoo.com> <AANLkTimxhoK1vt8HwSF9dvu4Z5xjqrLLb2SULj9pp=9b@mail.gmail.com> <AANLkTi=DtgpWNyEKBg=0GhOWuqSvzF5q0SJQgfZNRm8M@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E723445A91D3F9A@P3PW5EX1MB01.EX1.SECURESERVER.NET> <AANLkTindJ3oGpggvZ7jRJ4TRhTRomyZG+DwLOfbHD2kq@mail.gmail.com> <OFEFAF96E1.1837BBD4-ON8025783B.0040108E-8025783B.0040FF69@ie.ibm.com>
From: Marius Scurtescu <mscurtescu@google.com>
Date: Fri, 18 Feb 2011 09:40:21 -0800
Message-ID: <AANLkTi=PnOmyaMnNrGgPnOO_wtF8b_=v99wiR5ospHLH@mail.gmail.com>
To: Mark Mcgloin <mark.mcgloin@ie.ibm.com>
Content-Type: text/plain; charset="ISO-8859-1"
X-System-Of-Record: true
Cc: OAuth WG <oauth@ietf.org>, oauth-bounces@ietf.org
Subject: Re: [OAUTH-WG] Draft -12 feedback deadline
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Feb 2011 17:40:11 -0000

On Fri, Feb 18, 2011 at 3:49 AM, Mark Mcgloin <mark.mcgloin@ie.ibm.com> wrote:
> Marius
>
> Isn't the risk of the refresh token leaking the same as the risk of the
> access token leaking, i.e. why not provide both?

Sure, but refresh tokens never die.


> IMO, the refresh token
> just provides a server side mechanism for revoking access, where resource
> servers are distributed, through having short lived access tokens
>
> Of course, the refresh access token flow currently requires a secret so
> would need to be changed or alternative flow introduced. Will wait for
> details of how auth code flow can be used

The flow is not changing. For native apps the client secret can either
be declared optional, or a "well known secret" can be issued for
native apps.

The authorization server can also insist that each native app has a
unique secret and it must guard it, that may or may not make sense.

Marius