Hi Neil,

> On 22. Jul 2019, at 13:59, Neil Madden <neil.mad...@forgerock.com> wrote:
> 
>> In addition, a public client which does not use its refresh token in an 
>> “offline” manner may have theft go unnoticed for a considerable period of 
>> time, and the operational model of public clients usually puts detection of 
>> local token theft in the hand of the end user and client software, not an 
>> administrator or organizational security staff.
> 
> Given that a refresh token has to be used at the AS, isn't the situation here 
> *better* for refresh tokens? Every time an attacker uses a stolen refresh 
> token you get a nice ping against your centralised token endpoint, giving you 
> a great opportunity to run contextual checks to decide if something looks 
> fishy. 

I agree with your assessment. 

That why the Security BCP 
(https://tools.ietf.org/html/draft-ietf-oauth-security-topics-13#section-4..12) 
requires authorisation servers to detect refresh token replay. Even if the 
refresh token cannot be sender constraint, one-time refresh tokens (or refresh 
token rotation) is a viable option when used in combination with conditional 
revocation of the active refresh token if something looks fishy.

kind regards,
Torsten. 

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to