Huilan,
In the context of the OAuth protocol, can you describe how an innocent
user can cause the right context and state to be established, and why a
DDoS attacker can't accomplish the same, without making assumption on
additional security measures that are not mandated or recommended by the
OAuth specification?
Best regards,
Eric
On Fri, Mar 4, 2011 at 10:36 AM, Lu, Hui-Lan
(Huilan)<huilan...@alcatel-lucent.com>wrote:
Eric,
I'm confused. I didn't talk about an attacker impersonating Rob. At
any rate, inasmuch as we are back to square one, I would maintain
that receipt of an authorization code by the client alone is not
sufficient for causing it to issue an access token request to the
authorization server. The client has to have the right context and
be in the right state for that to happen. I should say that it is
valid to address DDoS attacks. At issue is only the plausibility of
the chain reaction suggested.
Best regards,
Huilan
________________________________
From:pf...@cs.stanford.edu
<mailto:pf...@cs.stanford.edu>[mailto:pf...@cs.stanford.edu
<mailto:pf...@cs.stanford.edu>]
Sent: Friday, March 04, 2011 1:23 AM
To: Lu, Hui-Lan (Huilan)
Cc:pf...@cs.stanford.edu <mailto:pf...@cs.stanford.edu>;
Torsten Lodderstedt;oauth@ietf.org <mailto:oauth@ietf.org>
Subject: Re: [OAUTH-WG] validate authorization code in draft 12
Hi Huilan,
The vulnerability being mentioned here is not that an
attacker impersonates Rob. Please refer to the original discussion
below:
"The issue is that according to the current draft, someone
who owns a botnet can locate the redirect URIs of clients that
listen on HTTP, and access them with random authorization codes, and
cause HTTPS connections to be made on the Authorization Server (AS).
There are a few things that the attacker can achieve with this OAuth
flow that he cannot easily achieve otherwise : ..."
The point 3. about the state parameter/CSRF defense is that
they can have the beneficial effect of making the above attack more
difficult, but does not prevent it.
Best regards,
Eric
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth