+1  :-)

> 22 jan 2016 kl. 20:05 skrev George Fletcher <gffle...@aol.com>:
> 
> Isn't that your department Paul? I have high expectations!
> 
> On 1/22/16 2:00 PM, Paul Madsen wrote:
>> tshirt or it didnt happen
>> 
>> On 1/22/16 1:57 PM, John Bradley wrote:
>>> Now that we have a cool name all we need is a logo for the attack and per 
>>> haps an anime character, and we are done with all the hard work:)
>>> 
>>> John B.
>>>> On Jan 22, 2016, at 2:54 PM, David Waite <da...@alkaline-solutions.com> 
>>>> wrote:
>>>> 
>>>> It’s pronounced FronkenSTEEN-ian.
>>>> 
>>>> -DW
>>>> 
>>>>> On Jan 22, 2016, at 10:02 AM, George Fletcher <gffle...@aol.com> wrote:
>>>>> 
>>>>> "Frankensteinian Amalgamation" -- David Waite
>>>>> 
>>>>> I like it! :)
>>>>> 
>>>>> On 1/22/16 8:11 AM, William Denniss wrote:
>>>>>> +1 ;)
>>>>>> On Fri, Jan 22, 2016 at 8:45 PM John Bradley <ve7...@ve7jtb.com> wrote:
>>>>>> Perhaps Frankenstein response is a better name than cut and paste attack.
>>>>>> 
>>>>>> John B.
>>>>>> 
>>>>>> On Jan 22, 2016 1:22 AM, "David Waite" <da...@alkaline-solutions.com> 
>>>>>> wrote:
>>>>>>> On Jan 21, 2016, at 2:50 PM, John Bradley <ve7...@ve7jtb.com> wrote:
>>>>>>> 
>>>>>>> In that case you probably would put a hash of the state in the code to 
>>>>>>> manage size.  The alg would be up to the AS, as long as it used the 
>>>>>>> same hash both places it would work.
>>>>>> Yes, true.
>>>>>>> 
>>>>>>> Sending the state to the token endpoint is like having nonce and c_hash 
>>>>>>> in the id_token, it binds the issued code to the browser instance.
>>>>>> I think I understand what you are saying. Someone won’t be able to 
>>>>>> frankenstein up a state and a token from two different responses from an 
>>>>>> AS, and have a client successfully fetch an access token based on the 
>>>>>> amalgamation.
>>>>>> 
>>>>>>> This protects against codes that leak via redirect uri pattern 
>>>>>>> matching. failures etc.  It prevents an attacker from being able to 
>>>>>>> replay a code from a different browser.
>>>>>> Yes, if a party intercepts the redirect_url, or the AS fails to enforce 
>>>>>> one time use (which even for a compliant implementation could just mean 
>>>>>> the attacker was faster than the state propagated within the AS)
>>>>>> 
>>>>>> Makes sense. Thanks John.
>>>>>> 
>>>>>> -DW
>>>>>> 
>>>>>>> If the client implements the other mitigations on the authorization 
>>>>>>> endpoint, then it wouldn't be leaking the code via the token endpoint.
>>>>>>> 
>>>>>>> The two mitigations are for different attacks, however some of the 
>>>>>>> attacks combined both vulnerabilities.
>>>>>>> 
>>>>>>> Sending the iss and client_id is enough to stop the confused client 
>>>>>>> attacks, but sending state on its own would not have stopped all of 
>>>>>>> them.
>>>>>>> 
>>>>>>> We discussed having them in separate drafts, and may still do that.   
>>>>>>> However for discussion having them in one document is I think better in 
>>>>>>> the short run.
>>>>>>> 
>>>>>>> John B.
>>>>>>> 
>>>>>>>> On Jan 21, 2016, at 4:48 PM, David Waite 
>>>>>>>> <da...@alkaline-solutions.com> wrote:
>>>>>>>> 
>>>>>>>> Question:
>>>>>>>> 
>>>>>>>> I understand how “iss" helps mitigate this attack (client knows 
>>>>>>>> response was from the appropriate issuer and not an attack where the 
>>>>>>>> request was answered by another issuer).
>>>>>>>> 
>>>>>>>> However, how does passing “state” on the authorization_code grant 
>>>>>>>> token request help once you have the above in place? Is this against 
>>>>>>>> some alternate flow of this attack I don’t see, or is it meant to 
>>>>>>>> mitigate some entirely separate attack?
>>>>>>>> 
>>>>>>>> If one is attempting to work statelessly (e.g. your “state” parameter 
>>>>>>>> is actual state and not just a randomly generated value), a client 
>>>>>>>> would have always needed some way to differentiate which issuer the 
>>>>>>>> authorization_code                                                     
>>>>>>>>       grant token request would be sent to.
>>>>>>>> 
>>>>>>>> However, if an AS was treating “code” as a token (for instance, 
>>>>>>>> encoding: client, user, consent time and approved                      
>>>>>>>>                                      scopes), the AS now has to 
>>>>>>>> include the client’s state as well. This would effectively double 
>>>>>>>> (likely more with encoding) the state sent in the authorization 
>>>>>>>> response back to the client redirect URL, adding more pressure against 
>>>>>>>> maximum URL sizes.
>>>>>>>> 
>>>>>>>> -DW
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>> 
>>>>>> 
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> 
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>> 
>>>>> --
>>>>> Chief Architect
>>>>> Identity Services Engineering     Work:
>>>>> george.fletc...@teamaol.com
>>>>> 
>>>>> AOL Inc.                          AIM:  gffletch
>>>>> Mobile: +1-703-462-3494           Twitter:
>>>>> http://twitter.com/gffletch
>>>>> 
>>>>> Office: +1-703-265-2544           Photos:
>>>>> http://georgefletcher.photography
>>>> 
>>> 
>>> 
>>> 
>>> _______________________________________________
>>> OAuth mailing list
>>> 
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>> 
>> 
>> 
>> _______________________________________________
>> OAuth mailing list
>> 
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> 
> --
> Chief Architect
> Identity Services Engineering     Work:
> george.fletc...@teamaol.com
> 
> AOL Inc.                          AIM:  gffletch
> Mobile: +1-703-462-3494           Twitter:
> http://twitter.com/gffletch
> 
> Office: +1-703-265-2544           Photos:
> http://georgefletcher.photography
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to