Re: [OAUTH-WG] single use authorization codes

2010-07-15 Thread Igor Faynberg
ssage- From: Brian Eaton [mailto:bea...@google.com] Sent: Wednesday, July 14, 2010 1:35 PM To: William Mills Cc: Eran Hammer-Lahav; OAuth WG Subject: Re: [OAUTH-WG] single use authorization codes On Wed, Jul 14, 2010 at 11:58 AM, William Mills wrote: If I can see things go by on the

Re: [OAUTH-WG] single use authorization codes

2010-07-14 Thread Brian Eaton
On Wed, Jul 14, 2010 at 2:28 PM, William Mills wrote: > We're trying to design around transport security with short expiration > and single use tokens. SSL solves the problem. No, we're not, and no, it doesn't. The issue here is not that tokens are sent over unencrypted channels, or unauthentic

Re: [OAUTH-WG] single use authorization codes

2010-07-14 Thread Torsten Lodderstedt
ammer-Lahav; OAuth WG Subject: Re: [OAUTH-WG] single use authorization codes On Wed, Jul 14, 2010 at 11:58 AM, William Mills wrote: If I can see things go by on the fly I can submit the token late and mess with the user by revoking their session. Meh. If the bes

Re: [OAUTH-WG] single use authorization codes

2010-07-14 Thread William Mills
mmer-Lahav; OAuth WG > Subject: Re: [OAUTH-WG] single use authorization codes > > On Wed, Jul 14, 2010 at 11:58 AM, William Mills > wrote: > > If I can see things go by on the fly I can submit the token > late and > > mess with the user by revoking their session. > &g

Re: [OAUTH-WG] single use authorization codes

2010-07-14 Thread Brian Eaton
On Wed, Jul 14, 2010 at 11:58 AM, William Mills wrote: > If I can see things go by on the fly I can submit the token late and > mess with the user by revoking their session. Meh. If the best the attacker can do in those circumstances is DOS, we're in good shape. Bear in mind that if we do nothi

Re: [OAUTH-WG] single use authorization codes

2010-07-14 Thread William Mills
If I can see things go by on the fly I can submit the token late and mess with the user by revoking their session. > > > It closes one door but opens a DOS attack. > > What's the DOS attack? > ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/

Re: [OAUTH-WG] single use authorization codes

2010-07-14 Thread Brian Eaton
On Tue, Jul 13, 2010 at 9:40 PM, William Mills wrote: > That's even worse I think, it's a harder problem. Revoking previously issued refresh tokens is pretty easy. Revoking the corresponding access tokens is hard in general, but in some environments is feasible. > Why do we want to revoke previ

Re: [OAUTH-WG] single use authorization codes

2010-07-13 Thread William Mills
mmer-Lahav Sent: Tuesday, July 13, 2010 9:26 PM To: Brian Eaton; OAuth WG Subject: Re: [OAUTH-WG] single use authorization codes How about: Authorization codes SHOULD expire shortly after they are issued to minimize the risk of leaks

Re: [OAUTH-WG] single use authorization codes

2010-07-13 Thread Brian Eaton
I'd suggest "authorization server MAY revoke all tokens". Revoking an access token that was just issued is surprisingly tricky. Fast to verify, easy to revoke, scalable: pick two. On Tue, Jul 13, 2010 at 9:26 PM, Eran Hammer-Lahav wrote: > How about: > > Authorization codes SHOULD expire shortly

Re: [OAUTH-WG] single use authorization codes

2010-07-13 Thread Eran Hammer-Lahav
How about: Authorization codes SHOULD expire shortly after they are issued to minimize the risk of leaks. Clients MUST NOT reuse authorization codes. If an authorization code is used more than once, the authorization server SHOULD revoke all tokens previously issued based on that authorization c

[OAUTH-WG] single use authorization codes

2010-07-13 Thread Brian Eaton
Draft 10 currently requires that the authorization code issued for the web-app profile is a single use token. That won't scale well. This got added in draft 4, I'm not sure why. Anybody know...? Here's the relevant section: http://tools.ietf.org/html/draft-ietf-oauth-v2-10#section-3 "The autho