[email protected] writes:

>> Sure, this works for a single request.  However it also means you need
>> to have the AS involved in *every* request because you cannot reuse R.
>> Another option would be:
>>
>> AS sends an Access token, encrypted to the RS, and includes a MAC
>> Session Key (Kms).  The Client can send the token, a Nonce (N), and N
>> encrypted with Kms ({N}Kms) to prove posession of Kms.  Of course to
>> protect replay attacks the RS has to keep a cache of all Nonces used
>> under Kms.

> Prove knowledge of key by encryption is not a good idea,as you
> mentioned, for having to keep a cache.

You only have to keep a cache for the validity of the token.  In your
case you have to keep a cache forever, because the token could
theoretically be reused over and over with the same commitment and R
values.  At best the caches are the same, but in both cases you have to
contain a cache.  Therefore your statement above is invalid.

-derek
-- 
       Derek Atkins                 617-623-3745
       [email protected]             www.ihtfp.com
       Computer and Internet Security Consultant
_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to