Re: [OAUTH-WG] Refresh Tokens

"William J. Mills" <wmills@yahoo-inc.com> Thu, 11 August 2011 23:25 UTC

Return-Path: <wmills@yahoo-inc.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5631621F8ACE for <oauth@ietfa.amsl.com>; Thu, 11 Aug 2011 16:25:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.125
X-Spam-Level:
X-Spam-Status: No, score=-17.125 tagged_above=-999 required=5 tests=[AWL=0.473, BAYES_00=-2.599, HTML_MESSAGE=0.001, USER_IN_DEF_WHITELIST=-15]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9ZRKjXPpW-zs for <oauth@ietfa.amsl.com>; Thu, 11 Aug 2011 16:25:46 -0700 (PDT)
Received: from nm3-vm1.bullet.mail.ne1.yahoo.com (nm3-vm1.bullet.mail.ne1.yahoo.com [98.138.91.53]) by ietfa.amsl.com (Postfix) with SMTP id B632121F86D8 for <oauth@ietf.org>; Thu, 11 Aug 2011 16:25:45 -0700 (PDT)
Received: from [98.138.90.53] by nm3.bullet.mail.ne1.yahoo.com with NNFMP; 11 Aug 2011 23:26:21 -0000
Received: from [98.138.87.1] by tm6.bullet.mail.ne1.yahoo.com with NNFMP; 11 Aug 2011 23:26:21 -0000
Received: from [127.0.0.1] by omp1001.mail.ne1.yahoo.com with NNFMP; 11 Aug 2011 23:26:21 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 154067.79985.bm@omp1001.mail.ne1.yahoo.com
Received: (qmail 53132 invoked by uid 60001); 11 Aug 2011 23:26:20 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo-inc.com; s=ginc1024; t=1313105180; bh=r0qC4jlrEij1FX/IwNj4ZkiK8k/xEvugr5FvXcdwHM8=; h=X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=diFuoKbyjVM1vh9nMTUah/AeEQ7UQcUBNKuGZqjAt/3wR6/bDfbD7Cnb7dBgw0N6bpu/dABpJawU83jBvOtuV2GuSnKh0OsBr2PNRa27BPypH1LfPcrNXoaqBM01VZbYDwIDDm3X+gTZlbwmZQZsdIrbucA+p4mH1Lp8c11SK6E=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=ginc1024; d=yahoo-inc.com; h=X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=eSs31BtB97kkydNCkfvdGV4xQPgDmRw/No2UBD+mIofdC5iZONB9ECcWcc9482pCyjgkd1y/3U/wOPMMXOZrsOsFS6L0wqLZBSyci3ixgCx+0MAoD2S4sPwJcSYlerSFAfAE7BwSLjmTfEhbhaKP8CdXRPq/VA9KF6LtDGRe7vQ=;
X-YMail-OSG: dJ1Z1n4VM1kvLcZTuZZl7zEb64dB1m0QJPIpv3AkbSv3S9t hSnZvO2ePlnayfjd.Cbg.9v4ct2UEJ_dSmOEZvw3rkqlKyjZ44pD1NLiw6U0 3k6JxKMC9oyCa3rqcaOqf.aWtzbo2rUW2DlEEnEUrAJRWGv8wt3Loa7DK0gq CPuTIsjJstIYRsotiA4RQXmkxbVsIA.7SwIFguKz3PhcHXoPeOmmfmF9Q_9v 1IujU3JXDA.cHUXXKLGGVVFtUmAhSWMDS4Pgi83WJDf..BhUspY7e_tDMyPk TfTTK1fhALaAKbrq3C5AElP.kynZL7tohAVFvscbxOfM_sYg51hkhdVxQIyo hNOA7qICciZtuCo8t2z5h.uHPnybx1DMkiaMXM7aiQbLNEtaMqmletaH_wO2 gYiqiGbSkQYnr1lIoTnGGqxeaTk1Kb8VY9oWzwGUHrV2L
Received: from [209.131.62.115] by web31803.mail.mud.yahoo.com via HTTP; Thu, 11 Aug 2011 16:26:20 PDT
X-RocketYMMF: william_john_mills
X-Mailer: YahooMailWebService/0.8.113.315625
References: <B26C1EF377CB694EAB6BDDC8E624B6E723B89DBF@SN2PRD0302MB137.namprd03.prod.outlook.com> <CA698D45.17CCD%eran@hueniverse.com> <B26C1EF377CB694EAB6BDDC8E624B6E723B89F11@SN2PRD0302MB137.namprd03.prod.outlook.com> <3CA3D010-E3C1-44A7-BC08-5FA3C83F305A@hueniverse.com> <B26C1EF377CB694EAB6BDDC8E624B6E723B8A115@SN2PRD0302MB137.namprd03.prod.outlook.com> <90DA4C9C-83E1-4D78-BD6E-340084B4E912@hueniverse.com> <B26C1EF377CB694EAB6BDDC8E624B6E723B8A1F6@SN2PRD0302MB137.namprd03.prod.outlook.com>
Message-ID: <1313105180.20903.YahooMailNeo@web31803.mail.mud.yahoo.com>
Date: Thu, 11 Aug 2011 16:26:20 -0700
From: "William J. Mills" <wmills@yahoo-inc.com>
To: Anthony Nadalin <tonynad@microsoft.com>, Eran Hammer-Lahav <eran@hueniverse.com>
In-Reply-To: <B26C1EF377CB694EAB6BDDC8E624B6E723B8A1F6@SN2PRD0302MB137.namprd03.prod.outlook.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-1082365393-1313105180=:20903"
Cc: "OAuth WG (oauth@ietf.org)" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Refresh Tokens
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: "William J. Mills" <wmills@yahoo-inc.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Aug 2011 23:25:47 -0000

It's implementation specific.  You can choose to make them anonymous or you can issue signed plaintext tokens that conceal nothing.  The spec doesn't care.  It's a security consideration of the end implementation, just like the need for tamper protection.  The spec needs only to define them as opaque blobs with a particular syntax.  We are not specifying what encryption you have to use here, and we should not.




________________________________
From: Anthony Nadalin <tonynad@microsoft.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
Cc: "OAuth WG (oauth@ietf.org)" <oauth@ietf.org>
Sent: Thursday, August 11, 2011 3:45 PM
Subject: Re: [OAUTH-WG] Refresh Tokens


 
Disagree, this was our rational and this is one way it’s used today with our scenarios. This needs to be assigned an issue.
 
From:Eran Hammer-Lahav [mailto:eran@hueniverse.com] 
Sent: Thursday, August 11, 2011 3:39 PM
To: Anthony Nadalin
Cc: Dick Hardt; OAuth WG (oauth@ietf.org)
Subject: Re: [OAUTH-WG] Refresh Tokens
 
The text is wrong. This is not why refresh tokens were introduced (originally by Yahoo then in WRAP). And is also technically unfounded. Refresh tokens have no special anonymity properties. 
 
EHL

On Aug 11, 2011, at 18:18, "Anthony Nadalin" <tonynad@microsoft.com> wrote:
I’m raising the issue on the current text, I already provided text if the original append.  
> 
>From:Eran Hammer-Lahav [mailto:eran@hueniverse.com] 
>Sent: Thursday, August 11, 2011 3:03 PM
>To: Anthony Nadalin
>Cc: Dick Hardt; OAuth WG (oauth@ietf.org)
>Subject: Re: [OAUTH-WG] Refresh Tokens
> 
>1. Process-wise it does. This is a brand new concept *here* and was not mentioned in the charter or any use cases. Therefore, out of scope. 
> 
>2. The current text provides all the information needed to imement. No one raised an implementation issue on the current text.
> 
>3. Refresh token do not provide anonymity. An implementation could but this was never considered in the design. 
> 
>4. If you have suggested text, present it before the WGLC is over. I am not adding issues to my list without suggested text and wg consensus. 
> 
>EHL
>
>On Aug 11, 2011, at 17:44, "Anthony Nadalin" <tonynad@microsoft.com> wrote:
>There are no use cases at all in WRAP to help explain choices taken, it does not matter if there were or were not previous issues raised, it is being raised now.
>> 
>>From:Eran Hammer-Lahav [mailto:eran@hueniverse.com] 
>>Sent: Thursday, August 11, 2011 1:46 PM
>>To: Anthony Nadalin; Dick Hardt
>>Cc: OAuth WG (oauth@ietf.org)
>>Subject: Re: [OAUTH-WG] Refresh Tokens
>> 
>>That's irrelevant given WRAP does not mention anonymity or anything else about refresh token not explicitly addressed already by v2. Your email is the very first time this has been raised on this list.
>> 
>>EHL
>> 
>>From: Anthony Nadalin <tonynad@microsoft.com>
>>Date: Thu, 11 Aug 2011 12:41:28 -0700
>>To: Eran Hammer-lahav <eran@hueniverse.com>, Dick Hardt <dick.hardt@gmail.com>
>>Cc: "OAuth WG (oauth@ietf.org)" <oauth@ietf.org>
>>Subject: RE: [OAUTH-WG] Refresh Tokens
>> 
>>Anonymity was certainly part of the design for WRAP
>>> 
>>>From:Eran Hammer-Lahav [mailto:eran@hueniverse.com] 
>>>Sent: Thursday, August 11, 2011 12:35 PM
>>>To: Anthony Nadalin; Dick Hardt
>>>Cc: OAuth WG (oauth@ietf.org)
>>>Subject: Re: [OAUTH-WG] Refresh Tokens
>>> 
>>>Section 1.5 already covers refresh tokens. There are many use cases for refresh tokens. They are basically a protocol feature used to make scalability and security more flexible. Anonymity was never part of their design, and by the nature of this protocol, is more in the domain of the resource server (based on what information it exposes via its API). In fact, your email if the first such suggestion of anonymity.
>>> 
>>>EHL
>>> 
>>>From: Anthony Nadalin <tonynad@microsoft.com>
>>>Date: Thu, 11 Aug 2011 11:15:28 -0700
>>>To: Dick Hardt <dick.hardt@gmail.com>
>>>Cc: "OAuth WG (oauth@ietf.org)" <oauth@ietf.org>
>>>Subject: Re: [OAUTH-WG] Refresh Tokens
>>> 
>>>Many reasons, but none are explained in the specification
>>>> 
>>>>From:Dick Hardt [mailto:dick.hardt@gmail.com] 
>>>>Sent: Thursday, August 11, 2011 10:51 AM
>>>>To: Anthony Nadalin
>>>>Cc: OAuth WG (oauth@ietf.org)
>>>>Subject: Re: [OAUTH-WG] Refresh Tokens
>>>> 
>>>>My recollection of refresh tokens was for security and revocation.
>>>> 
>>>>security: By having a short lived access token, a compromised access token would limit the time an attacker would have access
>>>> 
>>>>revocation: if the access token is self contained, authorization can be revoked by not issuing new access tokens. A resource does not need to query the authorization server to see if the access token is valid.This simplifies access token validation and makes it easier to scale and support multiple authorization servers.  There is a window of time when an access token is valid, but authorization is revoked. 
>>>> 
>>>> 
>>>> 
>>>>On 2011-08-11, at 10:40 AM, Anthony Nadalin wrote:
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>Nowhere in the specification is there explanation for refresh tokens, The reason that the Refresh token was introduced was for anonymity. The scenario is that a client asks the user for access. The user wants to grant the access but not tell the client the user's identity. By issuing the refresh token as an 'identifier' for the user (as well as other context data like the resource) it's possible now to let the client get access without revealing anything about the user. Recommend that the above explanation be included so developers understand why the refresh tokens are there.
>>>>_______________________________________________
>>>>OAuth mailing list
>>>>OAuth@ietf.org
>>>>https://www.ietf.org/mailman/listinfo/oauth
>>>> 
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth