Eric,
 
I'm confused. I didn't talk about an attacker impersonating Rob. At any rate, 
inasmuch as we are back to square one, I would maintain that receipt of an 
authorization code by the client alone is not sufficient for causing it to 
issue an access token request to the authorization server. The client has to 
have the right context and be in the right state for that to happen. I should 
say that it is valid to address DDoS attacks. At issue is only the plausibility 
of the chain reaction suggested.     
 

Best regards,
Huilan 

________________________________

        From: pf...@cs.stanford.edu [mailto:pf...@cs.stanford.edu] 
        Sent: Friday, March 04, 2011 1:23 AM
        To: Lu, Hui-Lan (Huilan)
        Cc: pf...@cs.stanford.edu; Torsten Lodderstedt; oauth@ietf.org
        Subject: Re: [OAUTH-WG] validate authorization code in draft 12
        
        
        Hi Huilan,
        
        The vulnerability being mentioned here is not that an attacker 
impersonates Rob. Please refer to the original discussion below:
        "The issue is that according to the current draft, someone who owns a 
botnet can locate the redirect URIs of clients that listen on HTTP, and access 
them with random authorization codes, and cause HTTPS connections to be made on 
the Authorization Server (AS). There are a few things that the attacker can 
achieve with this OAuth flow that he cannot easily achieve otherwise : ..." 
        
        The point 3. about the state parameter/CSRF defense is that they can 
have the beneficial effect of making the above attack more difficult, but does 
not prevent it. 
        
        Best regards,
        Eric

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to