Skip to content

Commit 7b358d9

Browse files
authored
Merge pull request #10 from ietf-wg-httpapi/signatures
Excempt signature-based authentication from revocation
2 parents bd403a6 + be2d390 commit 7b358d9

File tree

1 file changed

+8
-0
lines changed

1 file changed

+8
-0
lines changed

draft-ietf-httpapi-privacy.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -154,6 +154,14 @@ is potentially compromised. Servers SHOULD revoke such credentials immediately.
154154
When the credential is next used over a secure channel, a server MAY return an
155155
error that indicates why the credential was revoked.
156156

157+
Credentials in a request can take on different forms. API keys and tokens are simple
158+
modes for authentication, but can be abused by attackers to forfeit requests and hence
159+
should be revoked if compromised. Requests can also be authenticated using derived values,
160+
where they only include digital signatures or message authentication codes (MACs)
161+
derived from credentials but not the credentials themselves. Since an attacker cannot
162+
abuse the derived values to forfeit requests, the server MAY choose to not revoke the
163+
credentials in this case.
164+
157165
# Client Recommendations
158166

159167
The following recommendations increase the success rate of the server

0 commit comments

Comments
 (0)