Eran,

> The only consequence is compromising the *client*
> login/authentication security. I'm not trying to play it
> down, but I we need to be clear. This is not a compromise of
> the protected resources or authorization server.

We are definitely talking about a compromise of the
protected resources.  The attacker can access the protected
resources through the client.  And George Fletcher described
an attack variant where the attacker does that without
logging in as the user.

Francisco

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to