> Sergey has the correct interpretation -- it's to prevent a class of oracle 
> attacks.
> Think of it this way, if you go to revoke a token, and the token wasn't there 
> in the
> first place, the end result is the same: the token's not there when you're 
> done. So
> it's a 200 because the result is what you wanted even if the state going in 
> was wrong.

This highlights my point in my AD review:
https://datatracker.ietf.org/doc/draft-ietf-oauth-revocation/ballot/

...that this is *not* revocation.  It's invalidation or surrender
(requested by the bearer of the token) -- revocation would be an
action by another party to invalidate a token without the bearer's
involvement.

The usual defense against the sorts of attacks you're talking about is
to make the failure conditions indistinguishable -- not to make
success indistinguishable from failure.  That is, you have two
responses, success and failure, but the failure response doesn't say
why.

What, specifically, is the attack you're trying to defend against
here, any why is this the best approach to that attack?  I can't see
how a "please invalidate this token" request can in any way take
advantage of a "no" response to mount an attack.  It's possible that
there really is a threat here and that this is the right way to handle
it, but I'd like to see that explained.

Barry, Applications AD
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to