> Another example I mentioned earlier is when the client does
> not expose the protected resources back to the bearer of the
> code. For example, a Twitter application sending you emails
> when someone stops following you. Since all it does is get
> the code and then uses it internally (no user login
> functionality), TLS adds NOTHING.

I'm not sure I understand the example.  Would the attacker
be able to get emails when someone stops following the user?
Would that be OK?

Anyway, an application that accesses Twitter on the user's
behalf is likely to be able to send tweets on the user's
behalf.  The attacks we've been discussing would allow the
attacker to send tweets on the user's behalf.  That's
definitely not cool.

User impersonation when Oauth is used for social login is
not the only consequence of not requiring TSL for the
callback endpoint.

Francisco

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to