Can't LocalStorage etc be stolen with XSS too? If an attacker gets
their JS running on the page then the game is up.

Ian

On Mon, Jul 11, 2011 at 7:06 PM, Larry Suto <larry.s...@gmail.com> wrote:
> Cookies can be stolen by directed XSS attacks.
>
> Larry
>
> On Mon, Jul 11, 2011 at 3:46 PM, Eran Hammer-Lahav <e...@hueniverse.com>
> wrote:
>>
>> Any cookie? What about a Secure cookie limited to a specific sub-domain?
>> What are the concerns about cookies? I think this would be helpful to
>> discuss.
>>
>> EHL
>>
>> > -----Original Message-----
>> > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf
>> > Of Marius Scurtescu
>> > Sent: Monday, July 11, 2011 3:15 PM
>> > To: Doug Tangren
>> > Cc: oauth@ietf.org
>> > Subject: Re: [OAUTH-WG] best practices for storing access token for
>> > implicit
>> > clients
>> >
>> > On Thu, Jun 30, 2011 at 12:45 PM, Doug Tangren <d.tang...@gmail.com>
>> > wrote:
>> > > What is the current recommended practice of storing an implicit
>> > > client's access_tokens? LocalStorage, im mem and re-request auth on
>> > > every browser refresh?
>> >
>> > Both sound reasonable. I think most important is how NOT to store it, in
>> > a
>> > cookie.
>> >
>> > Marius
>> > _______________________________________________
>> > OAuth mailing list
>> > OAuth@ietf.org
>> > https://www.ietf.org/mailman/listinfo/oauth
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>



-- 
Ian McKellar  <http://ian.mckellar.org/>
i...@mckellar.org: email | jabber | msn
ianloic: flickr | aim | yahoo | skype | linkedin | etc.
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to