On Tue, Nov 20, 2018, 2:56 PM <oauth-requ...@ietf.org wrote:

> Send OAuth mailing list submissions to
>         oauth@ietf.org
>
> To subscribe or unsubscribe via the World Wide Web, visit
>         https://www.ietf.org/mailman/listinfo/oauth
> or, via email, send a message with subject or body 'help' to
>         oauth-requ...@ietf.org
>
> You can reach the person managing the list at
>         oauth-ow...@ietf.org
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of OAuth digest..."
> Today's Topics:
>
>    1. Re: I-D Action: draft-ietf-oauth-security-topics-10.txt
>       (Aaron Parecki)
>    2. Re: Refresh Token Expiration (George Fletcher)
>    3. Re: Refresh Token Expiration (Aaron Parecki)
>
>
>
> ---------- Forwarded message ----------
> From: Aaron Parecki <aa...@parecki.com>
> To: Torsten Lodderstedt <tors...@lodderstedt.net>
> Cc: OAuth WG <oauth@ietf.org>
> Bcc:
> Date: Tue, 20 Nov 2018 12:37:34 -0800
> Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-security-topics-10.txt
> The new section on refresh tokens is great! I have a couple
> questions/comments about some of the details.
>
> Authorization servers may revoke refresh tokens automatically in case
>> of a security event, such as:
>> o  logout at the authorization server
>
>
> This doesn't sound like the desired behavior for mobile apps, where the
> user's expectation of how long they are logged in to the mobile app is not
> tied to their web session where they authorized the app. However this does
> likely match a user's expectation when authorizing a browser-based app.
> Should this be clarified that it should not apply to the mobile app case,
> or only apply to browser-based apps?
>
> Refresh tokens should expire if the client has been inactive for some time
>
>
> This is a good suggestion, but I think it would benefit from a little more
> clarity. Specifically pointing out that what counts as "activity" is use of
> the access token and/or refresh token, if that's the intention. That will
> help avoid confusion that "inactivity" may be referring to the user's
> session at the authorization server.
>
> Is this supposed to be a capital "SHOULD" or lowercase "should"?
>
> It is also unclear whether this is meant to apply to public clients,
> private clients, or both, as well as whether it should apply to mobile apps
> or browser-based apps or both. I am curious what the intent is here, since
> I feel like that can have some serious implications for the user experience
> in some cases and is worth pointing out.
>
> Lastly, minor nit, I see the comment about changing occurrences of "SHALL"
> to "MUST", but the new refresh token section still has two uses of "SHALL".
>
> Thanks! Overall I'm happy to see this guidance!
>
> ----
> Aaron Parecki
> aaronparecki.com
>
>
>
> On Tue, Nov 20, 2018 at 11:33 AM Torsten Lodderstedt <
> tors...@lodderstedt.net> wrote:
>
>> Hi all,
>>
>> the new revision contains the following changes:
>>
>> * added section on refresh tokens
>> * additional justifications for recommendation for code
>> * refactored 2.1 in order to distinguish CSRF, authz response replay and
>> mix-up (based on feedback by Joseph Heenan)
>> * added requirement to authenticate clients during code exchange (PKCE or
>> client credential) to 2.1.1.
>> * changed occurrences of SHALL to MUST
>>
>> As always: looking forward for your feedback.
>>
>> kind regards,
>> Torsten.
>>
>> > Am 20.11.2018 um 20:26 schrieb internet-dra...@ietf.org:
>> >
>> >
>> > A New Internet-Draft is available from the on-line Internet-Drafts
>> directories.
>> > This draft is a work item of the Web Authorization Protocol WG of the
>> IETF.
>> >
>> >        Title           : OAuth 2.0 Security Best Current Practice
>> >        Authors         : Torsten Lodderstedt
>> >                          John Bradley
>> >                          Andrey Labunets
>> >                          Daniel Fett
>> >       Filename        : draft-ietf-oauth-security-topics-10.txt
>> >       Pages           : 38
>> >       Date            : 2018-11-20
>> >
>> > Abstract:
>> >   This document describes best current security practice for OAuth 2.0..
>> >   It updates and extends the OAuth 2.0 Security Threat Model to
>> >   incorporate practical experiences gathered since OAuth 2.0 was
>> >   published and covers new threats relevant due to the broader
>> >   application of OAuth 2.0.
>> >
>> >
>> > The IETF datatracker status page for this draft is:
>> > https://datatracker.ietf.org/doc/draft-ietf-oauth-security-topics/
>> >
>> > There are also htmlized versions available at:
>> > https://tools.ietf.org/html/draft-ietf-oauth-security-topics-10
>> >
>> https://datatracker.ietf.org/doc/html/draft-ietf-oauth-security-topics-10
>> >
>> > A diff from the previous version is available at:
>> > https://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-security-topics-10
>> >
>> >
>> > Please note that it may take a couple of minutes from the time of
>> submission
>> > until the htmlized version and diff are available at tools.ietf.org.
>> >
>> > Internet-Drafts are also available by anonymous FTP at:
>> > ftp://ftp.ietf.org/internet-drafts/
>> >
>> > _______________________________________________
>> > OAuth mailing list
>> > OAuth@ietf.org
>> > https://www.ietf.org/mailman/listinfo/oauth
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>
>
>
> ---------- Forwarded message ----------
> From: George Fletcher <gffle...@aol.com>
> To: Torsten Lodderstedt <tors...@lodderstedt.net>, oauth@ietf.org
> Cc:
> Bcc:
> Date: Tue, 20 Nov 2018 15:37:57 -0500
> Subject: Re: [OAUTH-WG] Refresh Token Expiration
> Hi Torsten,
>
> This is the module I much prefer. By default all refresh_tokens are bound
> to the user's authenticated session. When the authentication session is
> terminated, the refresh_tokens are invalidated. If a client wants to get a
> refresh_token that is NOT bound to an authentication session, then it much
> explicitly request the "offline_access" scope which then provides a consent
> interaction with the user which allows the user to know that this client
> wants to access their resources even when the user isn't logged in
> (present). This also provides the AS with the ability to control which
> clients are authorized to request "offline_access" and hence restrict that
> capability to know/approved clients.
>
> We've implemented this module in two different Authorization Servers.
>
> Thanks,
> George
>
> On 11/15/18 9:28 AM, Torsten Lodderstedt wrote:
>
> Hi all,
>
> I‘m preparing a new section on Refresh Token best practices for the Security 
> BCP. I‘m wondering whether anyone has implemented a binding of the refresh 
> token‘s expiration/revocation with the state of the session the refresh token 
> was issued in/for. So do you revoke refresh tokens when the user logs out 
> from the AS or the session terminated for other reasons?
>
> kinds regards,
> Torsten.
>
>
>
> _______________________________________________
> OAuth mailing listOAuth@ietf.orghttps://www.ietf.org/mailman/listinfo/oauth
>
>
>
>
>
> ---------- Forwarded message ----------
> From: Aaron Parecki <aa...@parecki.com>
> To: gffletch=40aol....@dmarc.ietf.org
> Cc: Torsten Lodderstedt <tors...@lodderstedt.net>, OAuth WG <
> oauth@ietf.org>
> Bcc:
> Date: Tue, 20 Nov 2018 12:56:13 -0800
> Subject: Re: [OAUTH-WG] Refresh Token Expiration
> Hi George,
>
> Reading this description, am I understanding correctly that you *always*
> return a refresh token to every client? Are there any situations in which a
> refresh token would not be returned? Specifically I'm wondering about how
> this applies to browser-based apps using the authorization code flow and
> refresh tokens.
>
> ----
> Aaron Parecki
> aaronparecki.com
>
>
>
> On Tue, Nov 20, 2018 at 12:38 PM George Fletcher <gffletch=
> 40aol....@dmarc.ietf.org> wrote:
>
>> Hi Torsten,
>>
>> This is the module I much prefer. By default all refresh_tokens are bound
>> to the user's authenticated session. When the authentication session is
>> terminated, the refresh_tokens are invalidated. If a client wants to get a
>> refresh_token that is NOT bound to an authentication session, then it much
>> explicitly request the "offline_access" scope which then provides a consent
>> interaction with the user which allows the user to know that this client
>> wants to access their resources even when the user isn't logged in
>> (present). This also provides the AS with the ability to control which
>> clients are authorized to request "offline_access" and hence restrict that
>> capability to know/approved clients.
>>
>> We've implemented this module in two different Authorization Servers.
>>
>> Thanks,
>> George
>>
>> On 11/15/18 9:28 AM, Torsten Lodderstedt wrote:
>>
>> Hi all,
>>
>> I‘m preparing a new section on Refresh Token best practices for the Security 
>> BCP. I‘m wondering whether anyone has implemented a binding of the refresh 
>> token‘s expiration/revocation with the state of the session the refresh 
>> token was issued in/for. So do you revoke refresh tokens when the user logs 
>> out from the AS or the session terminated for other reasons?
>>
>> kinds regards,
>> Torsten.
>>
>>
>>
>> _______________________________________________
>> OAuth mailing listOAuth@ietf.orghttps://www.ietf.org/mailman/listinfo/oauth
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to