In an oauth2 request, the access token is passed along in the header, with
nothing else.

As I understand it, oauth2 was designed to be simple for everyone to use.
And while, that's true, I don't really like how all of the security is
reliant on SSL.

what if an attack can strip away SSL using a tool such as sslstrip (or
whatever else would be more suitable for modern https)? They would be able
to see the access token and start forging whatever request he or she wants
to.

Why not do some sort of RSA-type public-private key thing like back in
Oauth1, where there is verification of the payload on each request? Just
use a better algorithm?
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to