On Aug 14, 2011, at 1:55 AM, Phillip Hunt wrote:

> No. I don't think so. In the new variant the client has to check the returned 
> state to confirm it has not changed or associated with a different user.  
> 
> Previously the authz server had to do the checks. 

In a CSRF attack, either of the two web servers (one is the OAuth "client" in 
this case) may be attacked with a CSRF. The defense against a CSRF is always 
for the recipient of the request to authenticate the requester in one way or 
another. One way to do that is with a CSRF token (see 
https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)_Prevention_Cheat_Sheet).
 

In OAuth, I think it's fair to say that an "OAuth CSRF attack" might be a 
special-case of a CSRF attack, but the typical defenses apply to both the OAuth 
"client" and the OAuth "resource server".

- John

> 
> Phil
> 
> On 2011-08-13, at 21:16, "William J. Mills" <wmi...@yahoo-inc.com> wrote:
> 
>> The defense is the same though, correct?
>> 
>> From: Phil Hunt <phil.h...@oracle.com>
>> To: Eran Hammer-Lahav <e...@hueniverse.com>
>> Cc: "OAuth WG (oauth@ietf.org)" <oauth@ietf.org>
>> Sent: Saturday, August 13, 2011 4:41 PM
>> Subject: Re: [OAUTH-WG] Auth Code Swap Attack
>> 
>> There are two CSRF variations scenarios that I see.
>> 
>> I can attack you and give my client access to your resources (original 
>> attack on the "resource").
>> 
>> I can attack you and give your client access to my resource (new attack on 
>> the "client").
>> 
>> Attack on the client vs. attack on the resource may be misleading here.  
>> Draft 20 only referred to attacks on the "resource" in its original CSRF 
>> description.
>> 
>> Phil
>> 
>> @independentid
>> www.independentid.com
>> phil.h...@oracle.com
>> 
>> 
>> 
>> 
>> 
>> On 2011-08-13, at 7:30 AM, Eran Hammer-Lahav wrote:
>> 
>>> All OAuth CSRF attacks are on the client.
>>> 
>>> EHL
>>> 
>>> From: Phil Hunt <phil.h...@oracle.com>
>>> Date: Sat, 13 Aug 2011 00:21:50 -0700
>>> To: Torsten Lodderstedt <tors...@lodderstedt.net>
>>> Cc: Eran Hammer-lahav <e...@hueniverse.com>, "OAuth WG (oauth@ietf.org)" 
>>> <oauth@ietf.org>
>>> Subject: Re: [OAUTH-WG] Auth Code Swap Attack
>>> 
>>>> +1 (to putting more detail in the Threat Model document)
>>>> 
>>>> Yes, this is another CSRF attack (hence the change to 10.2). 
>>>> 
>>>> What is *new* is this is an attack on the client application rather than 
>>>> the resource server. As such, I agree this new attack vector is well 
>>>> deserving of wider review and discussion before finalizing the draft.
>>>> 
>>>> Phil
>>>> 
>>>> @independentid
>>>> www.independentid.com
>>>> phil.h...@oracle.com
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> On 2011-08-12, at 11:58 PM, Torsten Lodderstedt wrote:
>>>> 
>>>>> 
>>>>> 
>>>>> Am 12.08.2011 23:52, schrieb Eran Hammer-Lahav:
>>>>>> This is really just a flavor of CSRF attacks. I have no objections to 
>>>>>> better documenting it (though I feel the current text is already 
>>>>>> sufficient), but we can't realistically expect to identify and close 
>>>>>> every possible browser-based attack. A new one is invented every other 
>>>>>> week.
>>>>>> 
>>>>>> The problem with this text is that developers who do no understand CSRF 
>>>>>> attacks are not likely to implement it correctly with this information. 
>>>>>> Those who understand it do not need the extra verbiage which is more 
>>>>>> confusing than helpful.
>>>>> 
>>>>> We are constantly facing the fact that a comprehensive description of 
>>>>> security threats needs more space than we have in the core draft. That's 
>>>>> the reason why the security document has 63 pages and that's also the 
>>>>> reason why we decided to let the core spec refer to this document for 
>>>>> in-depth explanations. This holds true for this threat as well.
>>>>> 
>>>>> regards,
>>>>> Torsten. 
>>>>> 
>>>>>> 
>>>>>> As for the new requirements, they are insufficient to actually 
>>>>>> accomplish what the authors propose without additional requirements on 
>>>>>> state local storage and verification to complete the flow. Also, the 
>>>>>> proposed text needs clarifications as noted below.
>>>>>> 
>>>>>> 
>>>>>> From: Anthony Nadalin <tony...@microsoft.com>
>>>>>> Date: Fri, 12 Aug 2011 12:06:36 -0700
>>>>>> To: "OAuth WG (oauth@ietf.org)" <oauth@ietf.org>
>>>>>> Subject: [OAUTH-WG] Auth Code Swap Attack
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>>> Recommended Changes to draft-ietf-oauth-v2
>>>>>>>  
>>>>>>> In section 4, request options (e.g. 4.1.1) featuring "state" should 
>>>>>>> change from:
>>>>>>>  
>>>>>>> state
>>>>>>> OPTIONAL. An opaque value used by the client to maintain state between 
>>>>>>> the request and callback. The authorization server includes this value 
>>>>>>> when redirecting the user-agent back to the client.
>>>>>>>  
>>>>>>> to:
>>>>>>>  
>>>>>>> state
>>>>>>> REQUIRED. An opaque value used by the client to maintain state between 
>>>>>>> the request and callback. The authorization server includes this value 
>>>>>>> when redirecting the user-agent back to the client. The encoded value 
>>>>>>> SHOULD enable the client application to determine the user-context that 
>>>>>>> was active at the time of the  request (see section 10.12). The value 
>>>>>>> MUST NOT be guessable or predictable, and MUST be kept                  
>>>>>>>    confidential.
>>>>>>>  
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to