I see. That's like double cut-n-paste.

I tried to capture this case of used-to-be-good AS turning Compromised AS
(Log leaking AS) in a sequence diagram: http://j.mp/1QtDeKD

Given this, just relying on not using random AS is not good enough. You
would probably require AS w/ISMS with the policy of not logging un-masked
credentials and has strict access control on the log ;-)

Nat

2016年1月28日(木) 9:38 Hans Zandbelt <hzandb...@pingidentity.com>:

> indeed, if the attacker is able to phish the user, he can put up a
> script that first triggers the authorization request to the compromised
> AS (i.e. the AS at which he has access to the logs and gathers the state
> value from) through the Client, and subsequently trigger the redirect to
> the good AS using an auto-refresh of that same phishing page (with the
> stolen state value); no need to control the authorization endpoint of
> the compromised AS itself
>
> Hans.
>
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to