Why would there be any use experience at all?
1. An OAuth client gets a refresh token in the context of http://example.com
2. While interacting with http://example.com the OAuth client sees a link to
http://foo.com and has reason to believe that foo.com is actually part of
example.com but isn't sure.
3. So the OAuth client goes to the token issuer it uses for http://example.com
and submits its refresh token along with a scope pointing at http://foo.com.
4. At this point either http://example.com returns an access token for
http://foo.com or it doesn't.
This approach doesn't require discovery, user interaction or a change to the
existing protocol.
Yaron
> -----Original Message-----
> From: Eran Hammer-Lahav [mailto:[email protected]]
> Sent: Tuesday, May 11, 2010 4:36 PM
> To: Yaron Goland; Manger, James H; OAuth WG ([email protected])
> Subject: RE: sites with wildcard
>
>
>
> > -----Original Message-----
> > From: [email protected] [mailto:[email protected]] On Behalf
> > Of Yaron Goland
> > Sent: Tuesday, May 11, 2010 4:29 PM
> > To: Manger, James H; OAuth WG ([email protected])
> > Subject: Re: [OAUTH-WG] sites with wildcard
> >
> > Thanks for explaining, I now believe I understand the use case.
> >
> > But I would point out that this is really an unsolved problem in
> > general and if we are to tackle it we have to deal with real concerns
> > such as – what happens if in the time since the site list was provided
> > and when the token was used the list was changed? If an attacker now
> > controls a previously listed site then the attacker can just swallow
> > the bearer token and do bad things. So now we have to think about
> > expiration information on the site list or a revocation mechanism or some
> kind of negotiation.
>
> Tokens can be short lived - that's why we have refresh tokens. And if there is
> a chance of the sites list changing, the tokens should not be issued to
> overlap
> with such a change. But in general, this is really not a real concern in any
> production environment where people lose control over their domain names
> in such a timeframe.
>
> > One wonders if it wouldn’t be simpler for clients that are in doubt to
> > just make another token request to the original service’s token issuer
> > with a scope for the desired site. That works with the existing
> > protocol and mitigates the previous attack.
>
> That's a very bad user experience (having to grand access again for the same
> client), assuming there even is a user to bug about authorization.
>
> EHL
_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth