On Tue, Jul 13, 2010 at 2:59 PM, Brian Eaton <bea...@google.com> wrote:

>  the question is what happens if both the
> signing key and the token database get compromised.
>
> Now that I think of it, you may have issues if the signing key alone
> is compromised.  It depends how much other entropy you've added to the
> tokens...
>

Um, if the signing key is lost, you're sunk.  Forget about the database,
with the signing key you can forge your own tokens till doomsday (which will
come much more quickly).  The keys are definitely the most confidential part
of the system, naturally.
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to