Your comment was that having client authentication makes it easier to recovery 
from an attack. I don't understand how the comments below about changing client 
secrets every 30 days are relevant. Are you suggesting to wait until the next 
routine secret cycle to revoke compromised credentials? Or that 30 days is a 
reasonable time period for ignoring an attack?

EHL

From: Brian Eaton [mailto:bea...@google.com]
Sent: Wednesday, June 15, 2011 6:15 PM
To: Eran Hammer-Lahav
Cc: Brian Campbell; OAuth WG
Subject: Re: [OAUTH-WG] Client authentication requirement

On Wed, Jun 15, 2011 at 6:02 PM, Eran Hammer-Lahav 
<e...@hueniverse.com<mailto:e...@hueniverse.com>> wrote:
How does it make recovery easier? Why is revoking refresh token any harder than 
changing client secret?

Changing a client secret can be done without disrupting users.  You can even 
schedule it, do it every 30 days as part of your general operational 
procedures.  It's part of a healthy system.

Revoking refresh tokens every 30 days is not really feasible.

As for the assertion grant type, where is the specified that the refresh token 
is bound to the private keys used to produce the assertion used to obtain the 
refresh token in the first place?

Well, the spec currently has refresh tokens bound to client ids.

And the assertion spec proposal authenticated client ids with public/private 
key pairs.

You wouldn't bind the refresh token directly to a private key, for the same 
reason that you don't bind the refresh token directly to the client secret.  
You bind refresh tokens to clients, and then you require client authentication.
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to