Re: [OAUTH-WG] Token expiration
Jonathan Sergent <sergent@google.com> Mon, 21 September 2009 23:22 UTC
Return-Path: <sergent@google.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BC48F3A67AC for <oauth@core3.amsl.com>; Mon, 21 Sep 2009 16:22:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.977
X-Spam-Level:
X-Spam-Status: No, score=-105.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tWNmuMSDBnuL for <oauth@core3.amsl.com>; Mon, 21 Sep 2009 16:22:40 -0700 (PDT)
Received: from smtp-out.google.com (smtp-out.google.com [216.239.45.13]) by core3.amsl.com (Postfix) with ESMTP id A53573A6ADE for <oauth@ietf.org>; Mon, 21 Sep 2009 16:22:40 -0700 (PDT)
Received: from spaceape11.eur.corp.google.com (spaceape11.eur.corp.google.com [172.28.16.145]) by smtp-out.google.com with ESMTP id n8LNNgoS005848 for <oauth@ietf.org>; Mon, 21 Sep 2009 16:23:42 -0700
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1253575423; bh=7zKu0q4vIKc+kINcK8EvolMjIWo=; h=DomainKey-Signature:MIME-Version:In-Reply-To:References:Date: Message-ID:Subject:From:To:Cc:Content-Type: Content-Transfer-Encoding:X-System-Of-Record; b=E4Tg9AU0rH8gLjIKoS 4Qxrsp+cAwm4TlZFF6WVg39uy2ijdNRXIJboOEKc7YMNpbOGQPxOTjmoVdeLGIPxzib g==
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns; h=mime-version:in-reply-to:references:date:message-id:subject:from:to: cc:content-type:content-transfer-encoding:x-system-of-record; b=OBk6dV0yFmk5DDkZSXC127wHhuUI/5DiFLVM7PVgDQ7Z7l87nzTGJgeawt4MVtz1h GRPkAkBx4VR5fNtse4YBw==
Received: from pzk28 (pzk28.prod.google.com [10.243.19.156]) by spaceape11.eur.corp.google.com with ESMTP id n8LNN3cs006456 for <oauth@ietf.org>; Mon, 21 Sep 2009 16:23:39 -0700
Received: by pzk28 with SMTP id 28so2957191pzk.5 for <oauth@ietf.org>; Mon, 21 Sep 2009 16:23:38 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.143.154.17 with SMTP id g17mr15484wfo.247.1253575418740; Mon, 21 Sep 2009 16:23:38 -0700 (PDT)
In-Reply-To: <6c0fd2bc0909211600n541ef6d8g402c8596062e14f8@mail.gmail.com>
References: <90C41DD21FB7C64BB94121FBBC2E72343784D584A3@P3PW5EX1MB01.EX1.SECURESERVER.NET> <6c0fd2bc0909211441o3eacc564t2917cf5b94f99800@mail.gmail.com> <1bc4603e0909211522h2f659866v48ff9dcee9294b7a@mail.gmail.com> <6c0fd2bc0909211534s1f2b79c6m7577dee31accf9c7@mail.gmail.com> <adb0b2880909211547sd75fddfjdb2e9d31d2e825d4@mail.gmail.com> <6c0fd2bc0909211600n541ef6d8g402c8596062e14f8@mail.gmail.com>
Date: Mon, 21 Sep 2009 16:23:38 -0700
Message-ID: <adb0b2880909211623v21563aaai6603aa4de74589c@mail.gmail.com>
From: Jonathan Sergent <sergent@google.com>
To: Hubert Le Van Gong <hubertlvg@gmail.com>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
X-System-Of-Record: true
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Token expiration
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Sep 2009 23:22:41 -0000
I meant n seconds from when the response was sent by the server. On Mon, Sep 21, 2009 at 4:00 PM, Hubert Le Van Gong <hubertlvg@gmail.com> wrote: > In theory I'd agree with you but... > (1) there are ways of achieving reasonable clock sync nowadays > (2) usually the validity period is long enough that the clocks are > considered roughly in sync. > (3) the n seconds means I can keep the token for a very long period > of time and present it? Unless you meant seconds starting from > the sender's clock, in which case we're back to the same issue. > > If the token is for a sensitive resource, one can still impose a one time use... > > My 2 cents, > Hubert > > > On Tue, Sep 22, 2009 at 12:47 AM, Jonathan Sergent <sergent@google.com> wrote: >> IMO, it's problematic that this relies on clock synchronization >> between the sender and the receiver to work. This is a constant >> source of problems in need of debugging for us today. Why not specify >> times like this using intervals? "This token is valid for the next n >> seconds." >> >> On Mon, Sep 21, 2009 at 3:34 PM, Hubert Le Van Gong <hubertlvg@gmail.com> wrote: >>> An interesting example (to me at least since we use it) is the SAML token. >>> You have the ability to define three dates: >>> - IssueInstant: the time of issue of the token [required] >>> - NotBefore: time before which the token's invalid [optional] >>> - NotOnOrAfter: time after which the token becomes invalid [optional] >>> >>> All are dateTime (in UTC form). >>> >>> Thanks, >>> Hubert >>> >>> >>> On Tue, Sep 22, 2009 at 12:22 AM, Chris Messina <chris.messina@gmail.com> wrote: >>>> Seems like it'd be worth documenting existing approaches to this... what do >>>> other similar APIs do? >>>> I know I harp on this approach to technology development, but that was how >>>> OAuth was developed (for better or worse): by looking at existing practices, >>>> extracting convention, and codifying ]ideally] best practices. >>>> If this is common and working elsewhere, can't we just imitate it? >>>> Chris >>>> >>>> On Mon, Sep 21, 2009 at 2:41 PM, Hubert Le Van Gong <hubertlvg@gmail.com> >>>> wrote: >>>>> >>>>> It is obviously useful to have. In fact it's so useful I'll bet most >>>>> token format >>>>> used do include one. Having it outside the token becomes redundant then >>>>> but >>>>> maybe it's not that bad. >>>>> >>>>> BTW why not using dateTime (http://www.w3.org/TR/xmlschema-2/#dateTime)? >>>>> >>>>> Cheers, >>>>> Hubert >>>>> >>>>> >>>>> On Mon, Sep 21, 2009 at 11:25 PM, Eran Hammer-Lahav <eran@hueniverse.com> >>>>> wrote: >>>>> > Should the core spec support the ability to indicate the duration of >>>>> > token credentials? This would be an addition to the web delegation draft [1] >>>>> > in section 6 (Token Credentials) in the form of a new response parameter, >>>>> > something like: >>>>> > >>>>> > oauth_token_duration >>>>> > The token duration specified in second from the time of the HTTP >>>>> > response timestamp. >>>>> > >>>>> > This has been consistently at the top of missing core funcationality. >>>>> > >>>>> > >>>>> > EHL >>>>> > >>>>> > [1] http://tools.ietf.org/html/draft-ietf-oauth-web-delegation-01 >>>>> > >>>>> > _______________________________________________ >>>>> > OAuth mailing list >>>>> > OAuth@ietf.org >>>>> > https://www.ietf.org/mailman/listinfo/oauth >>>>> > >>>>> _______________________________________________ >>>>> OAuth mailing list >>>>> OAuth@ietf.org >>>>> https://www.ietf.org/mailman/listinfo/oauth >>>> >>>> >>>> >>>> -- >>>> Chris Messina >>>> Open Web Advocate >>>> >>>> Personal: http://factoryjoe.com >>>> Follow me on Twitter: http://twitter.com/chrismessina >>>> >>>> Citizen Agency: http://citizenagency.com >>>> Diso Project: http://diso-project.org >>>> OpenID Foundation: http://openid.net >>>> >>>> This email is: [ ] shareable [X] ask first [ ] private >>>> >>> _______________________________________________ >>> OAuth mailing list >>> OAuth@ietf.org >>> https://www.ietf.org/mailman/listinfo/oauth >>> >> > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth >
- [OAUTH-WG] Token expiration Eran Hammer-Lahav
- Re: [OAUTH-WG] Token expiration Hubert Le Van Gong
- Re: [OAUTH-WG] Token expiration Chris Messina
- Re: [OAUTH-WG] Token expiration Hubert Le Van Gong
- Re: [OAUTH-WG] Token expiration Jonathan Sergent
- Re: [OAUTH-WG] Token expiration Marcel Molina
- Re: [OAUTH-WG] Token expiration Hubert Le Van Gong
- Re: [OAUTH-WG] Token expiration Eran Hammer-Lahav
- Re: [OAUTH-WG] Token expiration Jonathan Sergent
- Re: [OAUTH-WG] Token expiration Chris Messina