> -----Original Message-----
> From: Niv Steingarten [mailto:nivst...@gmail.com]
> Sent: Thursday, August 18, 2011 11:08 AM
> To: Eran Hammer-Lahav
> Cc: Torsten Lodderstedt; oauth@ietf.org
> Subject: Re: [OAUTH-WG] Draft 20 last call comment (Resource Owner
> Impersonation)
> 
> On Thu, Aug 18, 2011 at 20:31, Eran Hammer-Lahav <e...@hueniverse.com>
> wrote:
> >
> >
> >> -----Original Message-----
> >> From: Niv Steingarten [mailto:nivst...@gmail.com]
> >> Sent: Thursday, August 18, 2011 10:16 AM
> >> To: Eran Hammer-Lahav
> >> Cc: Torsten Lodderstedt; oauth@ietf.org
> >> Subject: Re: [OAUTH-WG] Draft 20 last call comment (Resource Owner
> >> Impersonation)
> >>
> > Can you provide another example with the same level of detail as you
> provided below?
> 
> The malicious client sends a request to the authorization endpoint with the
> appropriate parameters, and in return receives the markup of the web-page
> which should be displayed to the user in order to get consent. In addition,
> since the request is launched not via a sandboxed user-agent, the client also
> has access to any 'Set-Cookie'
> HTTP headers.
> 
> Instead of displaying the page to the user, the client extracts the web-form
> data (including the hidden nonce/token) which would be submitted when
> 'Allow' is clicked. It then forges the appropriate POST request with the
> cookies, form data and referrer, and dispatches it,

SCENE MISSING [1]

> to finally receive an access token/authorization code in the redirection.

You skipped the best part!

What do you mean by "dispatches it"? How is the resource owner tricked or 
abused to grant authorization unknowingly? I understand how your proposal 
"fixes" the first half, but not what kind of attack is happening in the second 
half.

EHL

[1] http://www.ibras.dk/montypython/episode34.htm

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to