Yes, I think it would apply to all three (in cases where the value is
some reference).  I feel like a refresh token should be a little
longer but I don't know if that feeling would actually hold up when
doing a real threat model analysis.

On Wed, Jul 6, 2011 at 9:53 PM, Eran Hammer-Lahav <e...@hueniverse.com> wrote:
> Does that apply to access tokens, refresh tokens, and authorization codes? I 
> can try squeezing in 22 characters.
>
> EHL
>
>> -----Original Message-----
>> From: Brian Campbell [mailto:bcampb...@pingidentity.com]
>> Sent: Wednesday, July 06, 2011 8:46 PM
>> To: Oleg Gryb
>> Cc: Eran Hammer-Lahav; OAuth WG
>> Subject: Re: [OAUTH-WG] Example tokens
>>
>> So on the 128-bit note, the examples could probably be a bit shorter,
>> 22 characters would give somewhat more than 128 bits of randomness.
>> But to EHL's original question, the examples (currently 7-12
>> characters) should probably be longer.
>>
>> On Wed, Jul 6, 2011 at 5:27 PM, Oleg Gryb <oleg_g...@yahoo.com> wrote:
>> > log2(64^27)=162 bits
>> >
>> > Looks good. For comparison, 128-bit entropy for a key in symmetric
>> > encryption used by SSL is considered as strong.
>> > I'm assuming that all those 162 bits are generated by a good randomizer.
>> >
>> >
>> >
>> >
>> > ----- Original Message ----
>> >> From: Brian Campbell <bcampb...@pingidentity.com>
>> >> To: Eran Hammer-Lahav <e...@hueniverse.com>
>> >> Cc: OAuth WG <oauth@ietf.org>
>> >> Sent: Wed, July 6, 2011 4:06:29 PM
>> >> Subject: Re: [OAUTH-WG] Example tokens
>> >>
>> >> If I've done the math correctly, 27 characters would give you a
>> >> little more  than 20 bytes worth of randomness (assuming your are
>> >> using  random alphanumeric characters or base64url encoded bytes).
>> >> 20 bytes  is something you see as a SHOULD type minimum length in
>> >> other  protocols for random identifiers.  Not sure if that's
>> >> sufficient  reasoning but it's what I can come up with.
>> >>
>> >> On Wed, Jul 6, 2011 at  4:40 PM, Eran Hammer-Lahav
>> >> <e...@hueniverse.com>
>> > wrote:
>> >> > Are  the tokens used in the examples long enough? I don't want the
>> >> > examples
>> >> >  to demonstrate poor choice of byte count.
>> >> > EHL
>> >> >  _______________________________________________
>> >> > OAuth mailing  list
>> >> > OAuth@ietf.org
>> >> > https://www.ietf.org/mailman/listinfo/oauth
>> >> >
>> >> >
>> >> _______________________________________________
>> >> OAuth  mailing list
>> >> OAuth@ietf.org
>> >> https://www.ietf.org/mailman/listinfo/oauth
>> >>
>> >
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to