This was discussed extensively and is covered in the text of the RFC, but the 
summary is simple: the request isn’t a bad request (which is what 400 means). 
It’s a perfectly valid request, it’s just that the token you’re asking about 
might not be valid for some reason, or it might not be valid *for you*. Either 
way, you don’t actually want to divulge too much information about why the 
token is bad in a production environment or else you let attackers poke around 
and learn more about the system than they really need to know to function. As 
far as a protected resource is concerned, it likely doesn’t matter anyway. And 
an OAuth client isn’t going to be propagated that information, it’s just going 
to have to go get a new token. Since an OAuth client needs to be able to get a 
new token at a moment’s notice anyway, there’s not really anything useful in 
communicating it.

This is a similar approach to the Revocation spec (RFC 7009) which always 
returns 200 whether or not the token existed or was successfully revoked. In 
any event, the client needs to assume that the token was revoked and stop using 
it, and it’s up to the server to deal with the consequences of error 
conditions. 

Hope this helps,
 — Justin

> On Oct 21, 2015, at 4:27 PM, Vivek Biswas <vivek_bis...@yahoo.com> wrote:
> 
> Yes indeed a nice job  !!!!.
> 
> I have one question on the RFC.
> 
> Not sure where I can submit request for comments. Hence, adding to this email 
> thread
> 
> 
> In the use-case mentioned below
> The following is a non-normative example response for a token that
>    has been revoked or is otherwise invalid:
> 
>      HTTP/1.1 200 OK
>      Content-Type: application/json
> 
>      {
>       "active": false
>      }
> 
> 
> 
> Where the token is revoked or invalid, why not send a HTTP response code of 
> 400
> 
> There are 2 benefits for the same.
> A. Just looking at the header, we know that token validation didn't went 
> through. No need to look in the payload. This is especially very helpful in 
> gateway design implementation.
> 
> B. You are further hiding from the user why the request failed and not 
> letting him know if the token was processed by the server.
> 
> Cheers
> Vivek
> 
>    
> 
> From: Kathleen Moriarty <kathleen.moriarty.i...@gmail.com>
> To: Hannes Tschofenig <hannes.tschofe...@gmx.net> 
> Cc: "<oauth@ietf.org>" <oauth@ietf.org> 
> Sent: Wednesday, October 21, 2015 4:47 AM
> Subject: Re: [OAUTH-WG] RFC 7662 on OAuth 2.0 Token Introspection
> 
> Yes, nice job!
> 
> Sent from my iPhone
> 
> > On Oct 21, 2015, at 4:20 AM, Hannes Tschofenig <hannes.tschofe...@gmx.net 
> > <mailto:hannes.tschofe...@gmx.net>> wrote:
> > 
> > Thank you Justin for the hard work!
> > 
> >> On 10/20/2015 06:32 PM, Justin Richer wrote:
> >> Thank you to everyone who helped make token introspection into a real 
> >> standard!
> >> 
> >> — Justin
> >> 
> >>> On Oct 19, 2015, at 6:56 PM, rfc-edi...@rfc-editor.org 
> >>> <mailto:rfc-edi...@rfc-editor.org> wrote:
> >>> 
> >>> A new Request for Comments is now available in online RFC libraries.
> >>> 
> >>> 
> >>>      RFC 7662
> >>> 
> >>>      Title:      OAuth 2.0 Token Introspection 
> >>>      Author:    J. Richer, Ed.
> >>>      Status:    Standards Track
> >>>      Stream:    IETF
> >>>      Date:      October 2015
> >>>      Mailbox:    i...@justin.richer.org <mailto:i...@justin.richer.org>
> >>>      Pages:      17
> >>>      Characters: 36591
> >>>      Updates/Obsoletes/SeeAlso:  None
> >>> 
> >>>      I-D Tag:    draft-ietf-oauth-introspection-11.txt
> >>> 
> >>>      URL:        https://www.rfc-editor.org/info/rfc7662 
> >>> <https://www.rfc-editor.org/info/rfc7662>
> >>> 
> >>>      DOI:        http://dx.doi.org/10.17487/RFC7662 
> >>> <http://dx.doi.org/10.17487/RFC7662>
> >>> 
> >>> This specification defines a method for a protected resource to query
> >>> an OAuth 2.0 authorization server to determine the active state of an
> >>> OAuth 2.0 token and to determine meta-information about this token.
> >>> OAuth 2.0 deployments can use this method to convey information about
> >>> the authorization context of the token from the authorization server
> >>> to the protected resource.
> >>> 
> >>> This document is a product of the Web Authorization Protocol Working 
> >>> Group of the IETF.
> >>> 
> >>> This is now a Proposed Standard.
> >>> 
> >>> STANDARDS TRACK: This document specifies an Internet Standards Track
> >>> protocol for the Internet community, and requests discussion and 
> >>> suggestions
> >>> for improvements.  Please refer to the current edition of the Official
> >>> Internet Protocol Standards (https://www.rfc-editor.org/standards 
> >>> <https://www.rfc-editor.org/standards>) for the 
> >>> standardization state and status of this protocol.  Distribution of this 
> >>> memo is unlimited.
> >>> 
> >>> This announcement is sent to the IETF-Announce and rfc-dist lists.
> >>> To subscribe or unsubscribe, see
> >>> https://www.ietf.org/mailman/listinfo/ietf-announce 
> >>> <https://www.ietf.org/mailman/listinfo/ietf-announce>
> >>> https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist 
> >>> <https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist>
> >>> 
> >>> For searching the RFC series, see https://www.rfc-editor.org/search 
> >>> <https://www.rfc-editor.org/search>
> >>> For downloading RFCs, see https://www.rfc-editor.org/rfc.html 
> >>> <https://www.rfc-editor.org/rfc.html>
> >>> 
> >>> Requests for special distribution should be addressed to either the
> >>> author of the RFC in question, or to rfc-edi...@rfc-editor.org. 
> >>> <mailto:rfc-edi...@rfc-editor.org.>  Unless
> >>> specifically noted otherwise on the RFC itself, all RFCs are for
> >>> unlimited distribution.
> >>> 
> >>> 
> >>> The RFC Editor Team
> >>> Association Management Solutions, LLC
> >>> 
> >>> 
> >>> _______________________________________________
> >>> OAuth mailing list
> >>> OAuth@ietf.org <mailto:OAuth@ietf.org>
> >>> https://www.ietf.org/mailman/listinfo/oauth 
> >>> <https://www.ietf.org/mailman/listinfo/oauth>
> 
> 
> 
> >> 
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org <mailto:OAuth@ietf.org>
> >> https://www.ietf.org/mailman/listinfo/oauth 
> >> <https://www.ietf.org/mailman/listinfo/oauth>
> > 
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org <mailto:OAuth@ietf.org>
> > https://www.ietf.org/mailman/listinfo/oauth 
> > <https://www.ietf.org/mailman/listinfo/oauth>
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth 
> <https://www.ietf.org/mailman/listinfo/oauth>
> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to