> Hi Pedro,
> 
> Am 10.10.2012 16:25, schrieb Pedro Felix:
>> 1) Out-of-band code transmission
>> 
>> Currently Google OAuth2 implementation uses the special 
>> "urn:ietf:wg:oauth:2.0:oob" to signal the Authorization Endpoint to return 
>> an HTML page with the code, instead of a redirect. At first sight, it seems 
>> a good idea, however it isn't in the OAuth 2 RFC. 
>>   a) What is the reason for the absence in the spec? 
>>   b) Is there any security problem associated with this usage?
>> 
>> 2) Alternative "redirect_uri" schemes
>> 
>> I'm also considering the use of alternative schemes on the "redirect_uri". 
>> For instance, a client app could use the "mailto:"; scheme to instruct the 
>> Authorization Endpoint to send the code via email. I know that a naive 
>> implementation can be subject to fixation attacks, however
>>   a) Weren't these scenarios considered by the working group? 
>>   b) Is there a major security flaw on this usage?
> 
> What address should the authorization server send an e-mail to and how would 
> the app acquire this code?
> 
> regards,
> Torsten.
The email address would be in the redirect_uri; the code would be inserted into 
the client app explicitly by the user, after receiving it.

Thanks
Pedro


>> 
>> Thanks
>> Pedro
>> 
>> 
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> 
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to