Re: [OAUTH-WG] best practices for storing access token for implicit clients
Doug Tangren <d.tangren@gmail.com> Tue, 12 July 2011 00:31 UTC
Return-Path: <d.tangren@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9BD7511E8158 for <oauth@ietfa.amsl.com>; Mon, 11 Jul 2011 17:31:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level:
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BCB5FXDC25sA for <oauth@ietfa.amsl.com>; Mon, 11 Jul 2011 17:31:07 -0700 (PDT)
Received: from mail-gy0-f172.google.com (mail-gy0-f172.google.com [209.85.160.172]) by ietfa.amsl.com (Postfix) with ESMTP id 879B611E80BA for <oauth@ietf.org>; Mon, 11 Jul 2011 17:31:07 -0700 (PDT)
Received: by gyd5 with SMTP id 5so2088378gyd.31 for <oauth@ietf.org>; Mon, 11 Jul 2011 17:31:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; bh=9azX3boH218TRrJ9e/hnhG77UuISOkUDHOxQ4AXMk/I=; b=b24LhAUk29x29nasNifW7QXiLrWbx8jsfpvugyIAFQMF7RWCls/CG0GP7vUhJYuW+g tEKRTBhHejdj+v03MyGikNZ8GaAxfvqf+9WYS7H691DyFKyq+cdHFYHvhs4c9YwONBRr StjvS28j8H2aa4MUrZp2PEE8yjs141yePc5Ro=
Received: by 10.90.2.6 with SMTP id 6mr4829123agb.7.1310430666261; Mon, 11 Jul 2011 17:31:06 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.90.113.14 with HTTP; Mon, 11 Jul 2011 17:30:46 -0700 (PDT)
In-Reply-To: <CAKMDUCaHUZjeGxBqwSht8wLAtuZAC-P+3LogyGAbYLhV9qUPZw@mail.gmail.com>
References: <BANLkTimU=RGHpHJTb97xvnpaqxqbc_qLhw@mail.gmail.com> <CAGdjJpLBg7-998tZm1uYQ2brsgfc7kyEr7VdF4Rd6ns+CAQGmA@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E7234501D4A042D@P3PW5EX1MB01.EX1.SECURESERVER.NET> <CAKJ-YRbXQrTDRRsPbo+O3EVJH8CJAj1Cfn8ArT+qboEHC_GuFw@mail.gmail.com> <CAKMDUCaHUZjeGxBqwSht8wLAtuZAC-P+3LogyGAbYLhV9qUPZw@mail.gmail.com>
From: Doug Tangren <d.tangren@gmail.com>
Date: Mon, 11 Jul 2011 20:30:46 -0400
Message-ID: <CAJ2WPXgzacs3YQ4kK43z6Yvg9=HriAe1qTk6Gu2hHaBOAnzv5w@mail.gmail.com>
To: Ian McKellar <ian@mckellar.org>
Content-Type: multipart/alternative; boundary="0016363108735d860004a7d46ae1"
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] best practices for storing access token for implicit clients
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Jul 2011 00:31:08 -0000
My guess about no cookies was in the design of implicit client token passing, the access token is never shared with the server, only the browser via the redirect_uri's fragment. Once the browser has the token, my question was about how (or even if) people are storing access tokens between page refreshes. LocalStorage seemed to fit right but I wasn't sure what holes that may open up since other scripts may have access to the same local storage as the page that intercepts the access token. -Doug Tangren http://lessis.me On Mon, Jul 11, 2011 at 7:08 PM, Ian McKellar <ian@mckellar.org> wrote: > Can't LocalStorage etc be stolen with XSS too? If an attacker gets > their JS running on the page then the game is up. > > Ian > > On Mon, Jul 11, 2011 at 7:06 PM, Larry Suto <larry.suto@gmail.com> wrote: > > Cookies can be stolen by directed XSS attacks. > > > > Larry > > > > On Mon, Jul 11, 2011 at 3:46 PM, Eran Hammer-Lahav <eran@hueniverse.com> > > wrote: > >> > >> Any cookie? What about a Secure cookie limited to a specific sub-domain? > >> What are the concerns about cookies? I think this would be helpful to > >> discuss. > >> > >> EHL > >> > >> > -----Original Message----- > >> > From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On > Behalf > >> > Of Marius Scurtescu > >> > Sent: Monday, July 11, 2011 3:15 PM > >> > To: Doug Tangren > >> > Cc: oauth@ietf.org > >> > Subject: Re: [OAUTH-WG] best practices for storing access token for > >> > implicit > >> > clients > >> > > >> > On Thu, Jun 30, 2011 at 12:45 PM, Doug Tangren <d.tangren@gmail.com> > >> > wrote: > >> > > What is the current recommended practice of storing an implicit > >> > > client's access_tokens? LocalStorage, im mem and re-request auth on > >> > > every browser refresh? > >> > > >> > Both sound reasonable. I think most important is how NOT to store it, > in > >> > a > >> > cookie. > >> > > >> > Marius > >> > _______________________________________________ > >> > OAuth mailing list > >> > OAuth@ietf.org > >> > https://www.ietf.org/mailman/listinfo/oauth > >> _______________________________________________ > >> OAuth mailing list > >> OAuth@ietf.org > >> https://www.ietf.org/mailman/listinfo/oauth > > > > > > _______________________________________________ > > OAuth mailing list > > OAuth@ietf.org > > https://www.ietf.org/mailman/listinfo/oauth > > > > > > > > -- > Ian McKellar <http://ian.mckellar.org/> > ian@mckellar.org: email | jabber | msn > ianloic: flickr | aim | yahoo | skype | linkedin | etc. > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth >
- [OAUTH-WG] best practices for storing access toke… Doug Tangren
- [OAUTH-WG] best practices for storing access toke… Doug Tangren
- Re: [OAUTH-WG] best practices for storing access … Marius Scurtescu
- Re: [OAUTH-WG] best practices for storing access … Eran Hammer-Lahav
- Re: [OAUTH-WG] best practices for storing access … Larry Suto
- Re: [OAUTH-WG] best practices for storing access … Ian McKellar
- Re: [OAUTH-WG] best practices for storing access … Ian McKellar
- Re: [OAUTH-WG] best practices for storing access … Doug Tangren