I need to think about it a bit,  however off the top of my head based on the 
attack described the code flow should still be safe if the code is truly single 
use.   (Some implementations fudge that)

If the attacker can stop the browser from delivering the code to the client 
then the client would be susceptible to the cut and paste attack for injecting 
the code back into the client.  

The OpenID Connect “code id_token” flow is not vulnerable to this if the client 
is properly validating the id_token.

I suspect that this would work against the implicit flow if the JS is sending 
the code back to its web server via a GET.  
That I think we recommend against doing, or should.

The Token binding proposals would stop a leaked code from being used, but not 
from being stolen in this attack.

The attack against a confidential client would be the cut and paste one that we 
have identified.  Currently the only mitigation we have is “code id_token”  so 
the blog post at.
http://openid.net/2016/07/16/preventing-mix-up-attacks-with-openid-connect/

I the most relevant current advice.
The thing to add is that the code leaked in this way should not be repayable at 
the client 

I don’t think that native apps are vulnerable to this if they are using custom 
scheme redirects.  

I don’t know what the risk is if they are using loopback or claimed URI.  It 
may be that a browser might leak them in the same way. 
That would need to be tested.

John B.


Sent from Mail for Windows 10

From: Dick Hardt
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to