Don't you have larger problems if your protected resources are compromised?
You might want to revoke access tokens or take the Google/Yahoo! model of
them expiring frequently with refresh tokens.


On Thu, May 6, 2010 at 11:09 PM, Manger, James H <
james.h.man...@team.telstra.com> wrote:

>  David said:
>
> > Why wouldn't the client send the token with the new request? If I'm
> trying to access https://api.example.com/pr?access_token=loin21op and I
> get a 301 response, I'll need to follow that if I want any chance of
> accessing the protected resource.
>
>
>
>
>
> If https://api.example.com/pr?access_token=loin21op responses with
> “Location: http://evil.com/log” should the client get http://evil.com/logor
> http://evil.com/log?access_token=loin21op? Surely the later is potentially
> insecure. I don’t think we can assume (mandate) that services only redirect
> to “good” sites. We certainly can’t assume (mandate) that links in the
> content on the response are to “good” sites.
>
>
>
> The answer is a bit easier if the token is passed as a query param (like
> with Facebook) -- as the client could rely on the service to include or omit
> the token param in the redirect/link URI as appropriate. It is less obvious
> with an Authorization header, or POST is used.
>
>
>
> --
>
> James Manger
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to