Please hold off on editorial feedback. Trying to figure out section numbers 
after the move is just too annoying.

EHL

> -----Original Message-----
> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf
> Of Oleg Gryb
> Sent: Thursday, April 07, 2011 9:37 AM
> To: Torsten Lodderstedt; OAuth WG
> Subject: Re: [OAUTH-WG] Security Considerations Section Proposal -02
> 
> Definitions
> "they can seamlessly make use of it capabilities" - its?
> 
> 2.3 "Application developers MUST NOT store access tokens in non-transient
>    memory".
> What is non-transient memory? Is non-persistent cookie non-transient? Do
> we know how all browsers store their non-persistent cookies?
> What if my non-persistent cookie is swapped to a HD along with my user
> agent by OS?
> 
> Consider alternative. Application developers MUST limit the life time and
> accessibility of access tokens in the same way how they protect other secrets
> on their clients. A 'secure' and 'HTTPOnly' attributes MUST be used if an
> access token is stored in a cookie.
> 
> 2.6.
> 
> "MUST NOT be
>    transmitted in clear: access tokens"
> 
> It contrdicts to the results of our "MUST" vs "SHOULD" discussion. If we have
> SHOULD in the spec, we should use the same here.
> 
> 2.9.
> "It is strongly RECOMMENDED that native application developers use
>    external browsers instead of browsers embedded in the application for
>    performing the end-user authorization process.  External browsers
>    offer a familiar usage experience and a trusted environment, in which
>    users can confirm the authentictity of the site"
> 
> I'm not sure why we're writing this. Was it proven that embedded browsers
> are less secure than external. Did anyone analyze all mobile proprietary
> "external"
> and "internal" browsers. Please provide evidence or remove the whole
> paragraph (if such evidence doesn't exist)
> 
> 2.10.
> "The authorization server operators SHOULD require..."
> Can this SHOULD be changed to MUST? If it was already discussed, please
> ignore and let me know where.
> 
> 
> 
> 
> ----- Original Message ----
> > From: Torsten Lodderstedt <tors...@lodderstedt.net>
> > To: OAuth WG <oauth@ietf.org>
> > Sent: Thu, April 7, 2011 12:27:21 AM
> > Subject: [OAUTH-WG] Security Considerations Section Proposal -02
> >
> > Hi all,
> >
> > I just posted a new revision of the proposed text for the core  draft's
> >security considerations section
> >(http://tools.ietf.org/html/draft-lodderstedt-oauth-securityconsiderations-
> 02).
> >
> > The  text makes some strong statements wrt client secrets/authentication,
> >HTTPS,  refresh tokens and other topics. This is to facilitate a clear and
> >understandable specification while also considering (and supporting) _all_
> >relevant use cases (e.g. native apps).
> >
> > Since this is the last major  building block of the draft, we would like to
> >include this text as soon as  possible.
> >
> > So please give your feedback soon!
> >
> > thanks in  advance,
> > Torsten.
> > _______________________________________________
> > OAuth  mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> >
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to