This solves a real and common problem with public client implementations. I 
certainly would like to see it move forward.  Thanks for publishing it Nat.


Cheers,
Morteza

From: Nat Sakimura <sakim...@gmail.com<mailto:sakim...@gmail.com>>
Date: Tuesday, July 30, 2013 11:58 AM
To: oauth <oauth@ietf.org<mailto:oauth@ietf.org>>
Subject: [OAUTH-WG] Fwd: New Version Notification for 
draft-sakimura-oauth-tcse-00.txt

As some of you know, passing the authorization code securely to a native app on 
iOS platform is next to impossible. Malicious application may register the same 
custom scheme as the victim application and hope to obtain the code, whose 
success rate is rather high.

We have discussed about it during the OpenID Conenct Meeting at IETF 87 on 
Sunday, and over a lengthy thread on the OpenID AB/Connect work group list. I 
have captured the discussion in the form of I-D. It is pretty short and 
hopefully easy to read.

IMHO, although it came up as an issue in OpenID Connect, this is a quite useful 
extension to OAuth 2.0 in general.

Best,

Nat Sakimura

---------- Forwarded message ----------
From: <internet-dra...@ietf.org<mailto:internet-dra...@ietf.org>>
Date: 2013/7/30
Subject: New Version Notification for draft-sakimura-oauth-tcse-00.txt
To: Nat Sakimura <sakim...@gmail.com<mailto:sakim...@gmail.com>>, John Bradley 
<jbrad...@pingidentity.com<mailto:jbrad...@pingidentity.com>>, Naveen Agarwal 
<n...@google.com<mailto:n...@google.com>>



A new version of I-D, draft-sakimura-oauth-tcse-00.txt
has been successfully submitted by Nat Sakimura and posted to the
IETF repository.

Filename:        draft-sakimura-oauth-tcse
Revision:        00
Title:           OAuth Transient Client Secret Extension for Public Clients
Creation date:   2013-07-29
Group:           Individual Submission
Number of pages: 7
URL:             
http://www.ietf.org/internet-drafts/draft-sakimura-oauth-tcse-00.txt
Status:          http://datatracker.ietf.org/doc/draft-sakimura-oauth-tcse
Htmlized:        http://tools.ietf.org/html/draft-sakimura-oauth-tcse-00


Abstract:
   The OAuth 2.0 public client utilizing code flow is susceptible to the
   code interception attack.  This specification describe a mechanism
   that acts as a control against this threat.





Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at 
tools.ietf.org<http://tools.ietf.org>.

The IETF Secretariat




--
Nat Sakimura (=nat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to