From: William Denniss [mailto:wdenn...@google.com]
Sent: Tuesday, January 02, 2018 5:38 PM
To: Hollenbeck, Scott <shollenb...@verisign.com>
Cc: oauth@ietf.org
Subject: [EXTERNAL] Re: [OAUTH-WG] OAuth 2.0 Device Flow LC Comment (and OpenID 
Connect)



On Mon, Nov 27, 2017 at 6:32 AM Hollenbeck, Scott 
<shollenb...@verisign.com<mailto:shollenb...@verisign.com>> wrote:

   I have reviewed draft-ietf-oauth-device-flow-07. Just one comment regarding 
Section 5.1:

   Would it be possible to suggest some minimally acceptable entropy value? The 
text says "The user code SHOULD have enough entropy that when combined with 
rate limiting makes a brute-force attack infeasible", but just how much entropy 
is enough?



   There are a few challenges with requiring a minimum entropy of the user_code 
due to the fact it's user-visible. Normally we would just set a nice high 
number (like OAuth did<https://tools.ietf.org/html/rfc6749#section-10.10>) and 
that would be fine, as normally a few extra bytes on the token is no problem. 
With the user_code however, the longer it is the harder it is to use. My 
expectation is that the authorization server would determine their own 
acceptable amount of entropy, trading off security for usability and taking 
into account the expiry time of the code, and any brute-force mitigations they 
have in place such as rate limiting.



   Do you have any text to suggest?



   [SAH] I agree that there’s not a singular recommendation to be made here. 
Since that’s the case it’s appropriate to provide guidance that describes the 
trade-offs to be made by an implementer. The text you wrote above does that 
nicely, so I would suggest something like this:



   “There are trade-offs to be considered in determining just how much entropy 
is “enough”. With the user_code, the longer it is the harder it is to use. The 
authorization server can thus determine their own acceptable amount of entropy, 
trading off security for usability and taking into account the expiry time of 
the code and any brute-force mitigations they have in place such as rate 
limiting.”



   A related question: the last call made me wonder if there are any plans to 
add a device flow for OpenID Connect. Does anyone know if such a thing is in 
the works?



   The Google implementation of the device flow already supports OpenID 
Connect. Just add "openid" to the scopes in the request as you normally would, 
and you'll get an ID Token on the response.



   There isn't any effort that I'm aware of to document this. We could do it I 
guess if there was demand, it would be quite a short document.



   [SAH] Thanks!

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to