Re: [OAUTH-WG] Refresh token security considerations

Phil Hunt <phil.hunt@oracle.com> Tue, 12 July 2011 17:27 UTC

Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6DCCA21F8C80 for <oauth@ietfa.amsl.com>; Tue, 12 Jul 2011 10:27:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.439
X-Spam-Level:
X-Spam-Status: No, score=-3.439 tagged_above=-999 required=5 tests=[AWL=-0.840, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9rE2ELGO9ANI for <oauth@ietfa.amsl.com>; Tue, 12 Jul 2011 10:27:45 -0700 (PDT)
Received: from rcsinet15.oracle.com (rcsinet15.oracle.com [148.87.113.117]) by ietfa.amsl.com (Postfix) with ESMTP id 1D42B21F8C73 for <oauth@ietf.org>; Tue, 12 Jul 2011 10:27:45 -0700 (PDT)
Received: from acsinet22.oracle.com (acsinet22.oracle.com [141.146.126.238]) by rcsinet15.oracle.com (Switch-3.4.4/Switch-3.4.4) with ESMTP id p6CHRcQC011515 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 12 Jul 2011 17:27:39 GMT
Received: from acsmt356.oracle.com (acsmt356.oracle.com [141.146.40.156]) by acsinet22.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id p6CHRbeW005393 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 12 Jul 2011 17:27:37 GMT
Received: from abhmt106.oracle.com (abhmt106.oracle.com [141.146.116.58]) by acsmt356.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p6CHRWES005980; Tue, 12 Jul 2011 12:27:32 -0500
Received: from [192.168.1.8] (/24.85.235.164) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Tue, 12 Jul 2011 10:27:31 -0700
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset="us-ascii"
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <CALT9B_Qm1aeswry9tB759OoxpjM2xN_dbRJmmFKsQCX3oEMm5g@mail.gmail.com>
Date: Tue, 12 Jul 2011 10:27:30 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <56047276-99F9-4D71-881C-3EC727267EB3@oracle.com>
References: <90C41DD21FB7C64BB94121FBBC2E7234501D4A005B@P3PW5EX1MB01.EX1.SECURESERVER.NET> <152fee05-9248-45e5-a9b5-86e880e5b1f9@email.android.com> <1310315898.93782.YahooMailNeo@web31802.mail.mud.yahoo.com> <6bb0fea2-48e6-4c70-93a4-ba4528a0f9b8@email.android.com> <1310484568.80888.YahooMailNeo@web31808.mail.mud.yahoo.com> <CALT9B_Qm1aeswry9tB759OoxpjM2xN_dbRJmmFKsQCX3oEMm5g@mail.gmail.com>
To: Brian Eaton <beaton@google.com>
X-Mailer: Apple Mail (2.1084)
X-Source-IP: acsinet22.oracle.com [141.146.126.238]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090205.4E1C840C.001C:SCFMA922111,ss=1,re=-4.000,fgs=0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Refresh token security considerations
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Jul 2011 17:27:49 -0000

+1

Maybe either way at the issuers discretion (optional) until we have a strong feeling why one technique is particularly problematic. i.e. if the server chooses to provide a new refresh token the old token is expired.

Phil

@independentid
www.independentid.com
phil.hunt@oracle.com





On 2011-07-12, at 9:32 AM, Brian Eaton wrote:

> On Tue, Jul 12, 2011 at 8:29 AM, William J. Mills <wmills@yahoo-inc.com> wrote:
>> Why would you re-issue a refresh token every usage?  What's the use case
>> where this makes sense?
> 
> It's key rotation built into the protocol.  Even if a refresh token is
> stolen, it's going to become useless to the attacker very quickly.
> 
> My main concern with rotating refresh tokens with every use is that it
> can cause problems with distributed client apps; they have to keep the
> refresh token in sync, and it adds complexity.  But for desktop and
> mobile apps it's quite a good idea.
> 
> (You can see a similar design in how Active Directory manages kerberos
> machine keys.  They took a slightly different approach, in that the
> client machines phone home to change their keys, but it provides
> similar benefits.)
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth