Yes, its still open to a limited MITM attack, but the real issue is of 
confidentiality of the request (addressed in 6.2) or blocking the request. The 
client request will either:


 1.  read data
 2.  write/delete data

If the attacker executes the #1, they get to see the result (6.2). If they 
execute #2, nothing bad happens because that's just what the user wanted 
(assuming the body is protected, which is coming in -01). The only problem is 
if they attacker does not execute the captured request, but that's just a DOS 
attack of sorts (and should be easy to detect).

I'll see if I can make this clearer, but at most, a MITM can see confidential 
data (in which case use TLS), or can block execution. It cannot do anything 
other than what the client was trying to do, as-is.

EHL




On 1/12/11 11:46 AM, "Zeltsan, Zachary (Zachary)" 
<zachary.zelt...@alcatel-lucent.com> wrote:

Eran,

>> - 6.3. Spoofing by Counterfeit Servers
>> The protocol does not support server authentication but it should prevent
>> token abuse by the Counterfeit server, shouldn't it?

> It does because the token secret is never sent.

According to section 6.3 a counterfeit server may intercept client's request. 
Cannot a counterfeit server use the intercepted signed request for getting 
access to the resource at the real server?

Zachary

-----Original Message-----
From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Eran 
Hammer-Lahav
Sent: Monday, January 10, 2011 4:46 PM
To: Torsten Lodderstedt
Cc: OAuth WG
Subject: Re: [OAUTH-WG] OAuth MAC token type draft



> -----Original Message-----
> From: Torsten Lodderstedt [mailto:tors...@lodderstedt.net]
> Sent: Monday, January 10, 2011 1:08 PM
> To: Eran Hammer-Lahav
> Cc: OAuth WG
> Subject: Re: [OAUTH-WG] OAuth MAC token type draft
>
> Eran,
>
> - Authentication schemes
> You propose to use the authentication scheme name "OAuth2" for the
> WWW-Authenticate header but another scheme name "MAC" for the
> authorization header. I've never seen such an asymmetric approach before.
> Don't you think people get confused about that? Moreover, the bearer draft
> also uses the name "OAuth2" in the authorization header.  Why this
> difference? Why don't you just add some parameters to the "OAuth2"
> scheme?

This was proposed by James Manger and discussed earlier on the list. I'll let 
James explain it.

> - 6.3. Spoofing by Counterfeit Servers
> The protocol does not support server authentication but it should prevent
> token abuse by the Counterfeit server, shouldn't it?

It does because the token secret is never sent.

EHL

>
> regards,
> Torsten.
>
> Am 09.01.2011 18:18, schrieb Eran Hammer-Lahav:
> http://tools.ietf.org/html/draft-hammer-oauth-v2-mac-token
>
> Feedback appreciated, especially for section 3.2.1 (the new normalized
> request string) which is an attempt to take the HMAC-SHA1 flow from 1.0a
> and simplify it.
>
> No body signature support yet, but will add that in -01.
>
> EHL
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to