Can you point out where it says that, I think I must of missed it.

Warren Parad

Founder, CTO
Secure your user data with IAM authorization as a service. Implement
Authress <https://authress.io/>.


On Thu, Sep 2, 2021 at 10:21 AM Ash Narayanan <ashvinnaraya...@gmail.com>
wrote:

> Hey Warren,
>
> 7009 states that you need to pass just the client_id for public clients,
> so if:
>
>> The client_id isn't necessary.
>>
>
> Then obviously something about 7009 needs to change.
>
> Whichever angle you look at, 7009 needs to change.
>
> On Thu, Sep 2, 2021 at 5:16 PM Warren Parad <wpa...@rhosys.ch> wrote:
>
>> Great, then let's fix 6749 not this one. The client_id isn't necessary.
>>
>> And then wouldn't 7009 not need to be changed because it already says you
>> don't need to pass any authorization for public clients?
>>
>> For credentialled client issued grants, refresh tokens, and access
>> tokens, these must not be able to be revoked without client credentials, so
>> using the refresh token or access token only for all other client types
>> must not be supported.
>>
>> On Thu, Sep 2, 2021, 08:52 Ash Narayanan <ashvinnaraya...@gmail.com>
>> wrote:
>>
>>> Hi Warren,
>>>
>>> If you are referring to the client_id as arbitrary information, then the
>>> same would also be true for refresh requests to the token endpoint from
>>> public clients.  As per 6749, you need to pass the client_id along with the
>>> refresh token. The client_id adds no additional security.
>>>
>>> But really, the whole point I've been trying to make from the start is
>>> that the token itself should be the only form of 'security' needed...as
>>> that's the point of OAuth.
>>>
>>> Regardless, 7009 needs to be made obsolete by a newer RFC.
>>>
>>> Ash
>>>
>>> On Thu, Sep 2, 2021 at 4:41 PM Warren Parad <wpa...@rhosys.ch> wrote:
>>>
>>>> What's the point in passing arbitrary other information that is already
>>>> known by the AS and does not provide the level of security necessary to
>>>> prevent abuse of the revocation endpoint?
>>>>
>>>> On Thu, Sep 2, 2021, 01:12 Ash Narayanan <ashvinnaraya...@gmail.com>
>>>> wrote:
>>>>
>>>>> Hi Thomas,
>>>>>
>>>>> The approach you've suggested sounds good. Passing just the client_id
>>>>> along with the token and type (regardless of client type) would be
>>>>> consistent with how refresh_token requests are structured. As long as the
>>>>> new RFC obsoletes this one.
>>>>>
>>>>> Ash
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>
>>>>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to