Le 25 oct. 2013 19:28, "Torsten Lodderstedt" <tors...@lodderstedt.net> a
écrit :
>
>
> Am 25.10.2013 11:19, schrieb Thomas Broyer:
>>
>>
>>
>>
>> On Thu, Oct 24, 2013 at 7:50 AM, Torsten Lodderstedt <
tors...@lodderstedt.net> wrote:
>>>
>>> Hi Thomas,
>>>
>>> we generate access tokens per resource server in order to mitigate this
and other risks. You must issue those tokens to different audiences
(resource server id) and the resource servers must validate if the token is
issued for its particular audience. Otherwise a compromised resource server
can still abuse the tokens.
>>>
>>> Talking about burden: You need to compare the effort needed to obtain
different access tokens to the effort needed to implement proof of
possession.
>>
>>
>> On our backlog is also support for "service accounts" (to use Google's
terminology), so clients will likely need to do some crypto-related work.
Asking them to do it for each and every request to sign the access token
might not be that
>
>
> I assume you mean signing the request or at least some request data. Just
signing the access token won't help.

I meant signing the access token + PR identifier/URI + some timestamp, at a
minimum.
I explained it better in my answer to Justin; something like jwt-bearer
applied to access tokens.

>> much of a problem (if they have the right tools;
google-oauth-java-client for instance does a great job making all of this
easier, and google-api-java-client adds service accounts support with a
just-as-easy-to-use API:
https://code.google.com/p/google-api-java-client/wiki/OAuth2#Service_Accounts;
same for PHP, Python, etc.)
>> That said, I'm rather new to crypto too, so I might be oversimplifying
things…
>> I'll check with the project manager and project owner which approach
we'd use (we could also support both…)
>>
>>> I recommend you to take a look into the OAuth threat model for a
discussion of this threat ( http://tools.ietf.org/html/rfc6819#section-4.6.4
).
>>
>>
>> Thanks for the pointer. I had already read that RFC but somehow forgot
about some details, and failed to check it back for that particular problem.
>>
>>
>> --
>> Thomas Broyer
>> /tɔ.ma.bʁwa.je/ <http://xn--nna.ma.xn--bwa-xxb.je/>
>
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to