Hi Mike,

I really like the new revision since it is much simpler :-)

My comments:

I'm fine with describing all mitigations we talked about in Darmstadt in one/this spec. But the state check at the tokens endpoint is supposed to be a mitigation against code injection/cut and paste attack, which is not directly related to IDP/AS mix up. So I would suggest to change the name of the spec, probably "OAuth security extensions"?

I think the code injection/cut and paste attack should be described more extensively in the introduction. It's important for the reader to understand, why this mitigation is defined at all. Moreover, I think the description of the mitigation is still incomplete/spread over the document. In order to detect code injection, the RP not only needs to send the state to the tokens endpoint, it also needs to (directly or indirectly) _bind_ the state to the particular user agent (session). Otherwise, the attacker can inject the state along with the solen code easily. I would suggest to merge

"To prevent replay of the state in another browser instance by an attacker, the state value MUST be tied to the browser instance in a way that cannot be forged by an attacker. Section 4 of [I‑D.bradley‑oauth‑jwt‑encoded‑state]
         provides several examples of how a client can accomplish this."

into section 5.

I thought we had discussed to also give implementors a guideline on using state to prevent CSRF as well? How will we take care of that topic?

kinds regards,
Torsten.


Am 21.01.2016 um 07:28 schrieb Mike Jones:

John Bradley and I collaborated to create the second OAuth 2.0 Mix-Up Mitigation draft. Changes were:

·Simplified by no longer specifying the signed JWT method for returning the mitigation information.

·Simplified by no longer depending upon publication of a discovery metadata document.

·Added the “state” token request parameter.

·Added examples.

·Added John Bradley as an editor.

The specification is available at:

·http://tools.ietf.org/html/draft-jones-oauth-mix-up-mitigation-01

An HTML-formatted version is also available at:

·http://self-issued.info/docs/draft-jones-oauth-mix-up-mitigation-01.html

-- Mike

P.S. This note was also posted athttp://self-issued.info/?p=1526 and as @selfissued <https://twitter.com/selfissued>.



_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to