On Wed, Jun 15, 2011 at 6:19 PM, Eran Hammer-Lahav <e...@hueniverse.com>wrote:

> Your comment was that having client authentication makes it easier to
> recovery from an attack. I don’t understand how the comments below about
> changing client secrets every 30 days are relevant. Are you suggesting to
> wait until the next routine secret cycle to revoke compromised credentials?
> Or that 30 days is a reasonable time period for ignoring an attack?
>

Sorry, there are multiple good reasons to require client authentication for
the access token endpoint.

- if you need to recover from a compromise, changing the client credentials
will prevent the attacker from abusing refresh tokens they have stolen.
 Changing a single client credential is much faster than revoking lots of
refresh tokens.

- if you want to follow best practices for management of authentication
credentials, you should do periodic key rotation.  Rotation of lots of
refresh tokens is quite challenging.  Rotation of client credentials is much
easier.

- if you want to bind refresh tokens to stronger authentication credentials,
such as private keys stored in an HSM, you need to require client
authentication when using the refresh token.

Is that helpful?

Cheers,
Brian
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to