section 1.5

"(A)  The client requests an access token by authenticating with the
        authorization server, and presenting an authorization grant."

This statement does not reflect that client authentication is not always required.

Proposal:

"The client requests an access token by presenting an authorization grant. The authorization server may require the client to authenticate as a pre-requisite."

section 4.1

"(D)  The client requests an access token from the authorization
        server's token endpoint by including the authorization code
        received in the previous step.  When making the request, the
        client authenticates with the authorization server."

Same as above. Proposal:

".... When making the request, the
client may be required to authenticate with the authorization server"

"(E)  The authorization server authenticates the client, validates the
        authorization code, and ensures the redirection URI received
        matches the URI used to redirect the client in step (C)."

Same as above.

Additionally, is the URI check also required if the client did not passed a redirect uri but relied on its pre-registered redirect_uri?

section 4.1.1

"state" parameter: Would it make sense to elaborate on the usage of this parameter and its importance for preventing CSRF attacks (incl. the nessessary entropy)? Alternatively, a reference to the security consideration section could be added.

section 4.1.3

"If the client type is private or was issued client credentials ..." Isn't the later the most important property of a "private" client? If so, "or was issued client credentials" is redundant.

section 4.4.3

"A refresh token SHOULD NOT be included." Why not "MUST NOT"?

section 5.2

"The authorization server MAY return an HTTP 401
               (Unauthorized) status code to indicate which HTTP
               authentication schemes are supported."

Given the usage of HTTP authentication schemes is the way to authenticated client recommended by the spec, status code 401 should be the default status code for this kind of error. Usage of status code 400 should be the exception.

"unauthorized_client"

So above - status code 403 seems to be a more appropriate default.

section 10

"and furthermore that rotation of the client
      authentication credentials is impractical."

What does this mean?

Please update reference [I-D.lodderstedt-oauth-security] to [I-D.ietf-oauth-v2-threatmodel].

section 10.2

last sentence: "... ensure the repeated request comes from an authentic client and not an
   impersonator."

The authorization server must ensure that the request comes from the same client not just any authentic client. So I would propose to adjust the text as follows:

"... ensure the repeated request comes from the original client and not an
   impersonator."

section 10.3

"Access token (as well as any type-specific attributes) MUST ..." does "type-specific" refer to access token type specific? If so, please add this information.

section 10.6

Please replace the first sentence with the following text:

"Such an attack leverages the authorization code ..."





_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to