Hi James,

On Mon, May 10, 2010 at 5:36 PM, Manger, James H
<james.h.man...@team.telstra.com> wrote:
> Marius,
>
>> But then again, how does the client end up making a request to
> the wrong site?
>
> The client follows a redirect or link. It doesn't know if the ultimate source 
> of the new URI was the resource server’s internal logic, user-generated 
> content, or a parameter in the request URI (eg an open redirector).

If the protected resource sends a redirect instead of serving the
resource then probably it knows what it is doing.

Following links, how do you see that happening? Normally a client will
not follow links without understanding them and at the same time send
access tokens.

All I am saying is that IMO it is not very likely that redirects and
links will cause tokens to leak. I do agree that "sites" can help in
these cases, just not sure it is worth the complexity.


>>> If the wrong site uses HTTP then the token is also exposed on the network 
>>> -- so it has just been broadcast in the clear if you are using public wifi. 
>>> Again a security failure.
>
>> Sure, but the "sites" parameter does not help in these cases.
>
> "sites" does help. If its value was:
>  "sites": ["https://api.example.com";, "https://img.example.com";]
> Then no HTTP URI matches so the token is never sent in the clear.

Yes, but HTTP and WIFI can compromise tokens even if sent to the
proper sites. Right?


Marius
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to