> -----Original Message-----
> From: Brian Eaton [mailto:bea...@google.com]
> Sent: Wednesday, June 15, 2011 1:53 PM

> > But I have no idea why we need client authentication for using a refresh
> token?
> 
> This is covered here: http://www.ietf.org/mail-
> archive/web/oauth/current/msg06362.html.

So basically, it is authentication on top of bearer credentials to achieve 
another level of security. Are we just assuming that stealing the refresh token 
will be harder than stealing the client credentials? Seems a bit optimistic.

Both client secret and refresh token are sent in plain text over TLS during the 
same client-server interaction. If there is a problem with TLS, both secrets 
are exposed. The client is more likely to store its client secret in source 
code or local storage because it rarely changes, as opposed to storing the 
refresh token in some other cache or database. I can't figure out which one 
will be harder to steal.

What attack vector is requiring client authentication when using the refresh 
token protects against?

EHL


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to