Hi, Hannes, and thanks for clearing this bit up.

>>    4) The attacker (via the installed app) is able to observe responses
>>       from the authorization endpoint.  As a more sophisticated attack
>>       scenario the attacker is also able to observe requests (in
>>       addition to responses) to the authorization endpoint.
..
> In this model the adversary will see response messages. However, it is
> possible for an attacker to also compromise the smart phone OS in such a
> way that he/she is also able to see the request as well as the
> responses. In such a "more sophisticated attack" the proposed mechanism
> does not help.

Ah, got it.  Then it would be good for (4) to say that, maybe just by
adding to the end, "This mechanism does not protect again the more
sophisticated attack."  Sound OK?

Barry

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to