I’m not sure I understand why this is an OAuth protocol problem? If you are starting with a false client with a false registration, everything down stream is likely invalid.
This seems like a registration curation (whitelisting) problem. This is a bit like saying, how can I prove that the application on this jail-broken phone is legitimate? Phil @independentid www.independentid.com phil.h...@oracle.com On Sep 15, 2014, at 1:52 PM, Antonio Sanso <asa...@adobe.com> wrote: > The problem is that a malicious client can register a malicious redirect uri > and https://tools.ietf.org/html/rfc6749#section-4.1.2.1 does the rest (as > previously discussed) > > regards > > antonio > > On Sep 15, 2014, at 10:43 PM, Phil Hunt <phil.h...@oracle.com> wrote: > >> If a server accepts a URL from a client to be used as a redirect that the >> server doesn’t recognize or is not registered, that is an open redirect. >> >> The specification does no allow open-redirects, it considers this a >> mis-configuration. >> >> Take a look at sections 3.1.2.2 and 10.15 of RFC6749. >> >> Phil >> >> @independentid >> www.independentid.com >> phil.h...@oracle.com >> >> >> >> On Sep 15, 2014, at 1:00 PM, John Bradley <ve7...@ve7jtb.com> wrote: >> >>> There may be a problem with semantics in this discussion. >>> >>> There is a redirect performed by athe authorization endpoint to a fixed uri >>> that is pre registered with the authorization server without user >>> prompting. >>> >>> That probably doesn't fit the strict definition of a open redirector. >>> >>> It may however create similar security issues in situations with relatively >>> open registration of clients. >>> >>> The largest issues are that the browser might leak information across the >>> redirect in the fragment or referrer. That has been used in attacks >>> against Facebook in the past. >>> >>> This is no where near the end of the world, however we need to look at the >>> security considerations and see if we can provide better advice to >>> implementors. In some cases returning a error to the browser may be best. >>> >>> I don't think we need to go so far as not returning any error to the client >>> under any circumstance. >>> >>> John B. >>> >>> Sent from my iPhone >>> >>>> On Sep 15, 2014, at 4:41 PM, Phil Hunt <phil.h...@oracle.com> wrote: >>>> >>>> Simply not true. >>>> >>>> Phil >>>> >>>> @independentid >>>> www.independentid.com >>>> phil.h...@oracle.com >>>> >>>> >>>> >>>>> On Sep 15, 2014, at 12:10 PM, Antonio Sanso <asa...@adobe.com> wrote: >>>>> >>>>> hi *, >>>>> >>>>> my understanding is that there is a rough consensus that if an OAuth >>>>> Provider follows rfc6749 verbatim will end up having an open redirector. >>>>> My next question would be now, is there anything we can do to raise some >>>>> awareness about this issue? >>>>> >>>>> regards >>>>> >>>>> antonio >>>>> >>>>>> On Sep 4, 2014, at 3:15 PM, Hans Zandbelt <hzandb...@pingidentity.com> >>>>>> wrote: >>>>>> >>>>>> I am convinced about the issue in the use case Antonio provided but I >>>>>> hope not to close the door on returning errors to known and trusted >>>>>> clients. Not sure anymore if that's possible though because the >>>>>> distinction can't be "registered"... >>>>>> >>>>>> Hans. >>>>>> >>>>>>> On 9/4/14, 3:01 PM, Antonio Sanso wrote: >>>>>>> hi Bill >>>>>>>> On Sep 4, 2014, at 2:52 PM, Bill Burke <bbu...@redhat.com> wrote: >>>>>>>> >>>>>>>> FWIW, Antonio convinced me and I'm going to change this in our IDM >>>>>>>> project. Thanks Antonio. What convinced me was that the user is >>>>>>>> probably expecting a login screen. Since there is this expectation, >>>>>>>> it might make it a little easier for the attacker to convince the user >>>>>>>> that a spoofed login screen is real. I know this issue can only >>>>>>>> happen with unrestricted registration, but, IMO, this proposed change >>>>>>>> doesn't really have much of an effect on usability and is even >>>>>>>> backward compatible with the current RFC. >>>>>>>> >>>>>>>> Wouldn't it better though to never do a redirect on an invalid request >>>>>>>> and just display an error page? >>>>>>> >>>>>>> thanks for sharing your thoughts :). Display an error 400 is what >>>>>>> Google does :) >>>>>>> >>>>>>> regards >>>>>>> >>>>>>> antonio >>>>>>> >>>>>>>> >>>>>>>>> On 9/4/2014 3:50 AM, Antonio Sanso wrote: >>>>>>>>> Hi Hans, >>>>>>>>> >>>>>>>>> I really fail to see how this can be addressed at registration time >>>>>>>>> for cases where registration is unrestricted (namely all the big >>>>>>>>> Providers) >>>>>>>>> >>>>>>>>> regards >>>>>>>>> >>>>>>>>> antonio >>>>>>>>> >>>>>>>>>> On Sep 4, 2014, at 9:47 AM, Hans Zandbelt >>>>>>>>>> <hzandb...@pingidentity.com> wrote: >>>>>>>>>> >>>>>>>>>> Classifying like this must also mean that consent should not be >>>>>>>>>> stored until the client is considered (admin) trusted, and admin >>>>>>>>>> policy would interfere with user policy. >>>>>>>>>> >>>>>>>>>> IMHO the security consideration would apply only to dynamically >>>>>>>>>> registered clients where registration is unrestricted; any other >>>>>>>>>> form would involve some form of admin/user approval at registration >>>>>>>>>> time, overcoming the concern at authorization time: there's no >>>>>>>>>> auto-redirect flow possible for unknown clients. >>>>>>>>>> >>>>>>>>>> Hans. >>>>>>>>>> >>>>>>>>>>> On 9/4/14, 9:04 AM, Richer, Justin P. wrote: >>>>>>>>>>> I think this advice isn't a bad idea, though it's of course up to >>>>>>>>>>> the AS >>>>>>>>>>> what an "untrusted" client really is. In practice, this is something >>>>>>>>>>> that was registered by a non-sysadmin type person, either a >>>>>>>>>>> dynamically >>>>>>>>>>> registered client or something available through self-service >>>>>>>>>>> registration of some type. It's also reasonable that a client, even >>>>>>>>>>> dynamically registered, would be considered "trusted" if enough >>>>>>>>>>> time has >>>>>>>>>>> passed and enough users have used it without things blowing up. >>>>>>>>>>> >>>>>>>>>>> -- Justin >>>>>>>>>>> >>>>>>>>>>> On Sep 4, 2014, at 1:26 AM, Antonio Sanso <asa...@adobe.com >>>>>>>>>>> <mailto:asa...@adobe.com>> wrote: >>>>>>>>>>> >>>>>>>>>>>> hi again *, >>>>>>>>>>>> >>>>>>>>>>>> after thinking a bit further IMHO an alternative for the untrusted >>>>>>>>>>>> clients can also be to always present the consent screen (at least >>>>>>>>>>>> once) before any redirect. >>>>>>>>>>>> Namely all providers I have seen show the consent screen if all the >>>>>>>>>>>> request parameters are correct and if the user accepts the redirect >>>>>>>>>>>> happens. >>>>>>>>>>>> If one of the parameter (with the exclusion of the client id and >>>>>>>>>>>> redirect uri that are handled differently as for spec) is wrong >>>>>>>>>>>> though >>>>>>>>>>>> the redirect happens without the consent screen being shown.. >>>>>>>>>>>> >>>>>>>>>>>> WDYT? >>>>>>>>>>>> >>>>>>>>>>>> regards >>>>>>>>>>>> >>>>>>>>>>>> antonio >>>>>>>>>>>> >>>>>>>>>>>> On Sep 3, 2014, at 7:54 PM, Antonio Sanso <asa...@adobe.com >>>>>>>>>>>> <mailto:asa...@adobe.com>> wrote: >>>>>>>>>>>> >>>>>>>>>>>>> Well, >>>>>>>>>>>>> I do not know if this is only dynamic registration... >>>>>>>>>>>>> let’s talk about real use cases, namely e.g. Google , Facebook , >>>>>>>>>>>>> etc.. is that dynamic client registration? I do not know… :) >>>>>>>>>>>>> >>>>>>>>>>>>> Said that what the other guys think? :) >>>>>>>>>>>>> Would this deserve some “spec adjustment” ? I mean there is a >>>>>>>>>>>>> reason >>>>>>>>>>>>> if Google is by choice “violating” the spec right? (I assume to >>>>>>>>>>>>> avoid >>>>>>>>>>>>> open redirect…) >>>>>>>>>>>>> But other implementers do follow the spec hence they have this >>>>>>>>>>>>> open >>>>>>>>>>>>> redirector… and this is not nice IMHO... >>>>>>>>>>>>> >>>>>>>>>>>>> >>>>>>>>>>>>> On Sep 3, 2014, at 7:40 PM, Hans Zandbelt >>>>>>>>>>>>> <hzandb...@pingidentity.com >>>>>>>>>>>>> <mailto:hzandb...@pingidentity.com>> wrote: >>>>>>>>>>>>> >>>>>>>>>>>>>>> On 9/3/14, 7:14 PM, Antonio Sanso wrote: >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> On Sep 3, 2014, at 7:10 PM, Hans Zandbelt >>>>>>>>>>>>>>> <hzandb...@pingidentity.com >>>>>>>>>>>>>>> <mailto:hzandb...@pingidentity.com>> wrote: >>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> Is your concern clients that were registered using dynamic >>>>>>>>>>>>>>>> client >>>>>>>>>>>>>>>> registration? >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> yes >>>>>>>>>>>>>> >>>>>>>>>>>>>> I think your issue is then with the trust model of dynamic client >>>>>>>>>>>>>> registration; that is left out of scope of the dynreg spec (and >>>>>>>>>>>>>> the >>>>>>>>>>>>>> concept is not even part of the core spec), but unless you want >>>>>>>>>>>>>> everything to be open (which typically would not be the case), >>>>>>>>>>>>>> then >>>>>>>>>>>>>> it would involve approval somewhere in the process before the >>>>>>>>>>>>>> client >>>>>>>>>>>>>> is registered. Without dynamic client registration that approval >>>>>>>>>>>>>> is >>>>>>>>>>>>>> admin based or resource owner based, depending on use case. >>>>>>>>>>>>>> >>>>>>>>>>>>>>>> Otherwise the positive case is returning a response to a valid >>>>>>>>>>>>>>>> URL >>>>>>>>>>>>>>>> that belongs to a client that was registered explicitly by the >>>>>>>>>>>>>>>> resource owner >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> well AFAIK the resource owner doesn’t register clients… >>>>>>>>>>>>>> >>>>>>>>>>>>>> roles can collapse in use cases especially when using dynamic >>>>>>>>>>>>>> client >>>>>>>>>>>>>> registration >>>>>>>>>>>>>> >>>>>>>>>>>>>>>> and the negative case is returning an error to that same URL. >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> the difference is the consent screen… in the positive case you >>>>>>>>>>>>>>> need >>>>>>>>>>>>>>> to approve an app.. for the error case no approval is needed,,, >>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> I fail to see the open redirect. >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> why? >>>>>>>>>>>>>> >>>>>>>>>>>>>> because the client and thus the fixed URL are explicitly >>>>>>>>>>>>>> approved at >>>>>>>>>>>>>> some point >>>>>>>>>>>>>> >>>>>>>>>>>>>> Hans. >>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> Hans. >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> On 9/3/14, 6:56 PM, Antonio Sanso wrote: >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> On Sep 3, 2014, at 6:51 PM, Hans Zandbelt >>>>>>>>>>>>>>>>> <hzandb...@pingidentity.com >>>>>>>>>>>>>>>>> <mailto:hzandb...@pingidentity.com> >>>>>>>>>>>>>>>>> <mailto:hzandb...@pingidentity.com>> wrote: >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Let me try and approach this from a different angle: why >>>>>>>>>>>>>>>>>> would you >>>>>>>>>>>>>>>>>> call it an open redirect when an invalid scope is provided >>>>>>>>>>>>>>>>>> and >>>>>>>>>>>>>>>>>> call it >>>>>>>>>>>>>>>>>> correct protocol behavior (hopefully) when a valid scope is >>>>>>>>>>>>>>>>>> provided? >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> as specified below in the positive case (namely when the >>>>>>>>>>>>>>>>> correct >>>>>>>>>>>>>>>>> scope >>>>>>>>>>>>>>>>> is provided) the resource owner MUST approve the app via the >>>>>>>>>>>>>>>>> consent >>>>>>>>>>>>>>>>> screen (at least once). >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Hans. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> On 9/3/14, 6:46 PM, Antonio Sanso wrote: >>>>>>>>>>>>>>>>>>> hi John, >>>>>>>>>>>>>>>>>>> On Sep 3, 2014, at 6:14 PM, John Bradley <ve7...@ve7jtb.com >>>>>>>>>>>>>>>>>>> <mailto:ve7...@ve7jtb.com> >>>>>>>>>>>>>>>>>>> <mailto:ve7...@ve7jtb.com> >>>>>>>>>>>>>>>>>>> <mailto:ve7...@ve7jtb.com>> wrote: >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>> In the example the redirect_uri is vlid for the attacker. >>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>> The issue is that the AS may be allowing client >>>>>>>>>>>>>>>>>>>> registrations with >>>>>>>>>>>>>>>>>>>> arbitrary redirect_uri. >>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>> In the spec it is unspecified how a AS validates that a >>>>>>>>>>>>>>>>>>>> client >>>>>>>>>>>>>>>>>>>> controls the redirect_uri it is registering. >>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>> I think that if anything it may be the registration step >>>>>>>>>>>>>>>>>>>> that >>>>>>>>>>>>>>>>>>>> needs >>>>>>>>>>>>>>>>>>>> the security consideration. >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> (this is the first time :p) but I do disagree with you. It >>>>>>>>>>>>>>>>>>> would be >>>>>>>>>>>>>>>>>>> pretty unpractical to block this at registration time…. >>>>>>>>>>>>>>>>>>> IMHO the best approach is the one taken from Google, namely >>>>>>>>>>>>>>>>>>> returning >>>>>>>>>>>>>>>>>>> 400 with the cause of the error.. >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> *400.* That’s an error. >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> *Error: invalid_scope* >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> Some requested scopes were invalid. {invalid=[l]} >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> said that I hope you all agree this is an issue in the spec >>>>>>>>>>>>>>>>>>> so >>>>>>>>>>>>>>>>>>> far…. >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> regards >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> antonio >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>> John B. >>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>> On Sep 3, 2014, at 12:10 PM, Bill Burke <bbu...@redhat.com >>>>>>>>>>>>>>>>>>>> <mailto:bbu...@redhat.com> >>>>>>>>>>>>>>>>>>>> <mailto:bbu...@redhat.com> >>>>>>>>>>>>>>>>>>>> <mailto:bbu...@redhat.com>> wrote: >>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>> I don't understand. The redirect uri has to be valid in >>>>>>>>>>>>>>>>>>>>> order for a >>>>>>>>>>>>>>>>>>>>> redirect to happen. The spec explicitly states this. >>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> On 9/3/2014 11:43 AM, Antonio Sanso wrote: >>>>>>>>>>>>>>>>>>>>>> hi *, >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> IMHO providers that strictly follow rfc6749 are >>>>>>>>>>>>>>>>>>>>>> vulnerable >>>>>>>>>>>>>>>>>>>>>> to open >>>>>>>>>>>>>>>>>>>>>> redirect. >>>>>>>>>>>>>>>>>>>>>> Let me explain, reading [0] >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> If the request fails due to a missing, invalid, or >>>>>>>>>>>>>>>>>>>>>> mismatching >>>>>>>>>>>>>>>>>>>>>> redirection URI, or if the client identifier is missing >>>>>>>>>>>>>>>>>>>>>> or >>>>>>>>>>>>>>>>>>>>>> invalid, >>>>>>>>>>>>>>>>>>>>>> the authorization server SHOULD inform the resource >>>>>>>>>>>>>>>>>>>>>> owner of the >>>>>>>>>>>>>>>>>>>>>> error and MUST NOT automatically redirect the user-agent >>>>>>>>>>>>>>>>>>>>>> to the >>>>>>>>>>>>>>>>>>>>>> invalid redirection URI. >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> If the resource owner denies the access request or if the >>>>>>>>>>>>>>>>>>>>>> request >>>>>>>>>>>>>>>>>>>>>> fails for reasons other than a missing or invalid >>>>>>>>>>>>>>>>>>>>>> redirection URI, >>>>>>>>>>>>>>>>>>>>>> the authorization server informs the client by adding the >>>>>>>>>>>>>>>>>>>>>> following >>>>>>>>>>>>>>>>>>>>>> parameters to the query component of the redirection URI >>>>>>>>>>>>>>>>>>>>>> using the >>>>>>>>>>>>>>>>>>>>>> "application/x-www-form-urlencoded" format, perAppendix B >>>>>>>>>>>>>>>>>>>>>> <https://tools.ietf.org/html/rfc6749#appendix-B>: >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> Now let’s assume this. >>>>>>>>>>>>>>>>>>>>>> I am registering a new client to thevictim.com >>>>>>>>>>>>>>>>>>>>>> <http://thevictim.com/> >>>>>>>>>>>>>>>>>>>>>> <http://victim.com/><http://victim.com >>>>>>>>>>>>>>>>>>>>>> <http://victim.com/> >>>>>>>>>>>>>>>>>>>>>> <http://victim.com/>> >>>>>>>>>>>>>>>>>>>>>> <http://victim.com <http://victim.com/> >>>>>>>>>>>>>>>>>>>>>> <http://victim.com/>> >>>>>>>>>>>>>>>>>>>>>> provider. >>>>>>>>>>>>>>>>>>>>>> I register redirect uriattacker.com >>>>>>>>>>>>>>>>>>>>>> <http://uriattacker.com/> >>>>>>>>>>>>>>>>>>>>>> <http://attacker.com/><http://attacker.com >>>>>>>>>>>>>>>>>>>>>> <http://attacker.com/> <http://attacker.com/>> >>>>>>>>>>>>>>>>>>>>>> <http://attacker.com <http://attacker.com/> >>>>>>>>>>>>>>>>>>>>>> <http://attacker.com/>>. >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> According to [0] if I pass e.g. the wrong scope I am >>>>>>>>>>>>>>>>>>>>>> redirected >>>>>>>>>>>>>>>>>>>>>> back to >>>>>>>>>>>>>>>>>>>>>> attacker.com <http://attacker.com/> >>>>>>>>>>>>>>>>>>>>>> <http://attacker.com/><http://attacker.com >>>>>>>>>>>>>>>>>>>>>> <http://attacker.com/> >>>>>>>>>>>>>>>>>>>>>> <http://attacker.com/>> <http://attacker.com >>>>>>>>>>>>>>>>>>>>>> <http://attacker.com/> <http://attacker.com/>>. >>>>>>>>>>>>>>>>>>>>>> Namely I prepare a url that is in this form: >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> http://victim.com/authorize?response_type=code&client_id=bc88FitX1298KPj2WS259BBMa9_KCfL3&scope=WRONG_SCOPE&redirect_uri=http://attacker.com >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> and this is works as an open redirector. >>>>>>>>>>>>>>>>>>>>>> Of course in the positive case if all the parameters are >>>>>>>>>>>>>>>>>>>>>> fine this >>>>>>>>>>>>>>>>>>>>>> doesn’t apply since the resource owner MUST approve the >>>>>>>>>>>>>>>>>>>>>> app >>>>>>>>>>>>>>>>>>>>>> via the >>>>>>>>>>>>>>>>>>>>>> consent screen (at least once). >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> A solution would be to return error 400 rather than >>>>>>>>>>>>>>>>>>>>>> redirect >>>>>>>>>>>>>>>>>>>>>> to the >>>>>>>>>>>>>>>>>>>>>> redirect URI (as some provider e.g. Google do) >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> WDYT? >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> regards >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> antonio >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> [0] https://tools.ietf.org/html/rfc6749#section-4.1.2.1 >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> _______________________________________________ >>>>>>>>>>>>>>>>>>>>>> OAuth mailing list >>>>>>>>>>>>>>>>>>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org> >>>>>>>>>>>>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>> -- >>>>>>>>>>>>>>>>>>>>> Bill Burke >>>>>>>>>>>>>>>>>>>>> JBoss, a division of Red Hat >>>>>>>>>>>>>>>>>>>>> http://bill.burkecentral.com >>>>>>>>>>>>>>>>>>>>> <http://bill.burkecentral.com/> >>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>> _______________________________________________ >>>>>>>>>>>>>>>>>>>>> OAuth mailing list >>>>>>>>>>>>>>>>>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org> >>>>>>>>>>>>>>>>>>>>> <mailto:OAuth@ietf.org> >>>>>>>>>>>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>> _______________________________________________ >>>>>>>>>>>>>>>>>>>> OAuth mailing list >>>>>>>>>>>>>>>>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org> >>>>>>>>>>>>>>>>>>>> <mailto:OAuth@ietf.org><mailto:OAuth@ietf.org> >>>>>>>>>>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> _______________________________________________ >>>>>>>>>>>>>>>>>>> OAuth mailing list >>>>>>>>>>>>>>>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org> >>>>>>>>>>>>>>>>>>> <mailto:OAuth@ietf.org> >>>>>>>>>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> -- >>>>>>>>>>>>>>>>>> Hans Zandbelt | Sr. Technical Architect >>>>>>>>>>>>>>>>>> hzandb...@pingidentity.com >>>>>>>>>>>>>>>>>> <mailto:hzandb...@pingidentity.com> >>>>>>>>>>>>>>>>>> <mailto:hzandb...@pingidentity.com>| Ping >>>>>>>>>>>>>>>>>> Identity >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> -- >>>>>>>>>>>>>>>> Hans Zandbelt | Sr. Technical Architect >>>>>>>>>>>>>>>> hzandb...@pingidentity.com <mailto:hzandb...@pingidentity.com> >>>>>>>>>>>>>>>> | >>>>>>>>>>>>>>>> Ping Identity >>>>>>>>>>>>>> >>>>>>>>>>>>>> -- >>>>>>>>>>>>>> Hans Zandbelt | Sr. Technical Architect >>>>>>>>>>>>>> hzandb...@pingidentity.com <mailto:hzandb...@pingidentity.com>| >>>>>>>>>>>>>> Ping >>>>>>>>>>>>>> Identity >>>>>>>>>>>> >>>>>>>>>>>> _______________________________________________ >>>>>>>>>>>> OAuth mailing list >>>>>>>>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org> >>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>>>>>>> >>>>>>>>>> -- >>>>>>>>>> Hans Zandbelt | Sr. Technical Architect >>>>>>>>>> hzandb...@pingidentity.com | Ping Identity >>>>>>>>> >>>>>>>>> _______________________________________________ >>>>>>>>> OAuth mailing list >>>>>>>>> OAuth@ietf.org >>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>>>>> >>>>>>>> -- >>>>>>>> Bill Burke >>>>>>>> JBoss, a division of Red Hat >>>>>>>> http://bill.burkecentral.com >>>>>>>> >>>>>>>> _______________________________________________ >>>>>>>> OAuth mailing list >>>>>>>> OAuth@ietf.org >>>>>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>>>> >>>>>>> _______________________________________________ >>>>>>> OAuth mailing list >>>>>>> OAuth@ietf.org >>>>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>>> >>>>>> -- >>>>>> Hans Zandbelt | Sr. Technical Architect >>>>>> hzandb...@pingidentity.com | Ping Identity >>>>> >>>>> _______________________________________________ >>>>> OAuth mailing list >>>>> OAuth@ietf.org >>>>> https://www.ietf.org/mailman/listinfo/oauth >>>> >>>> _______________________________________________ >>>> OAuth mailing list >>>> OAuth@ietf.org >>>> https://www.ietf.org/mailman/listinfo/oauth >> > _______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth