This is actually the approach that I favor now as well -- let the server do the secret rotation if it wants to, and have the client be prepared to receive a new client_secret or registration_access_token on any read or update request.

This would necessitate changing the returned values, essentially collapsing the returns from the read/update and rotate actions into one structure that's closer to the one returned from initial registration. This has the added benefit of parallelizing the responses for these three actions, which I like as well.

 -- Justin

On 02/11/2013 08:42 PM, John Bradley wrote:
OAuth doesn't say anything about client secrets other than they are provisioned 
in a magic realm outside the OAuth spec (Getting in the mood for the next IETF).

Rotating client secrets was something I made up for connect because it seemed 
like a good idea at the time given that someone breaking in to the registration 
endpoint could take over a connection.

We later separated the authentication to the token endpoint from the 
registration endpoint,in what I think was a good move.

It is sort of up to the authorization server to make decisions about rotating 
client secrets, I expect that in the real world a client would try access ing 
the token endpoint and get back a invalid_client error response and then heck 
it's registration to see if the client_secret has changed.

I suppose that a client could request rotating its secret if it thinks it has 
been compromised,  however the compromiser is more likely to quickly change the 
secret to lock out the legitimate clients before the good one notices.    I 
think the client wanting to rotate is enough of a edge case that it could deal 
with it out of band.

Letting the server rotate the client secret according to what ever policy it 
decides is best is probably safest.

We didn't have anything for rotating the access token.  I suspect that rotating 
it under the clients control is going to create as many problems as it solves.

If you want to rotate it,  make it a refresh token that is issues and use OAuth 
to provide access tokens from the token endpoint.   Creating a new endpoint to 
duplicate existing OAuth functionality is overkill.

John B.
On 2013-02-11, at 10:18 PM, Mike Jones <michael.jo...@microsoft.com> wrote:

The rotate_secret operation was added to OpenID Connect Registration as a 
workaround to the fact that registration updates used to be authenticated using 
the client secret, so it seemed overly dangerous to have an update operation 
potentially return an updated secret and have the secret be lost due to 
communication problems - leaving the client stranded.  Since then, registration 
was changed to use a bearer token to authenticate update operations, and so 
this failure mode can't occur anymore.  It was an omission not to have deleted 
the unneeded operation then.

It's been deleted from OpenID Connect Registration and should likewise be 
deleted from OAuth registration, since it is unneeded.  If a new client secret 
is needed, there's nothing stopping the registration server from returning it 
in the result of an update operation.

                                -- Mike

-----Original Message-----
From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of 
Justin Richer
Sent: Monday, February 11, 2013 1:15 PM
To: oauth@ietf.org
Subject: [OAUTH-WG] Registration: Client secret rotation

Draft -05 of OAuth Dynamic Client Registration [1] defines a means of the 
client requesting a new client_secret (if applicable) and a new 
registration_access_token. Client secrets MAY expire after some period of time, 
and this method allows for a refresh of that secret. Draft -00 defined no such 
operation, drafts -01 through -04 defined this operation in terms of the 
operation=rotate_secret parameter, and draft -05 defines it through a secondary 
endpoint, the Client Secret Rotation Endpoint.
This raises several questions:

  - Should the client be allowed to request rotation of its secret?
  - Would a client ever take this action of its own accord?
  - Can a server rotate the secret of the client without the client asking? (This seems 
to be an obvious "yes")

Alternatives that keep this functionality include defining the rotate_secret 
operation in terms of an HTTP verb, a query parameter, or separate endpoint. 
Alternatively, we could drop the rotate_secret operation all together. If we do 
this, we have to decide if the client secret can still expire. If it can, then 
we need a way for the client to get this new secret through a means that 
doesn't require it to request a change in secret, such as sending it back as 
part of the client READ operation (see other thread on RESTful verbs).

  -- Justin


[1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to