On Tue, Jul 13, 2010 at 9:40 PM, William Mills <wmi...@yahoo-inc.com> wrote:
> That's even worse I think, it's a harder problem.

Revoking previously issued refresh tokens is pretty easy.

Revoking the corresponding access tokens is hard in general, but in
some environments is feasible.

> Why do we want to revoke previously issued tokens here?

The threat model is an attacker who somehow grabs a verification code
from a user on the fly, then races to be the first one to exchange the
verification code with the authorization server.  The idea is to make
sure that if there is a race, the attacker always loses eventually.

This is sort of a remote scenario, though.  In practice if
verification codes leak, we're going to have trouble keeping the
protocol secure.

> It closes one door but opens a DOS attack.

What's the DOS attack?
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to