The approach looks right to me; the key is that the 1.0 state machine is rather simple. A priori, I don't see the 2.0 as more complex (even though it involves an additional machine), and I think it should be straight-forward to build the machine and run the reachability analysis on the system graph.

The conclusions of this paper puzzle me though. There are things that I simply do not understand. For instance, what does this mean: "The current OAuth specification uses nonce, timestamps and signatures to guard against possible attacks. If the API interfaces are secure, they are not needed. On the other hand, if the API interfaces are insecure, they are not sufficient to guarantee the desired security properties."

Igor

Mark Mcgloin wrote:
Does anyone know of a formal security protocol analysis that has been
carried out for OAuth 2.0?

I could only find analysis done against 1.0a, like this one:

http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5762765


thanks
Mark

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to