In Connect, if RP verifies nonce value in ID Token issued from Token Endpoint, code cut & paste attack can be mitigated in "code" flow, not in "code id_token", can't it?
In pure OAuth2 senario, I also think PKCE would be the simplest solution. 2016-07-27 15:45 GMT+09:00 tors...@lodderstedt.net <tors...@lodderstedt.net> : > +1 > > I also think PKCE is currently the simplest way to protect OAuth clients > from injection. > > Sent by MailWise <http://www.mail-wise.com/installation/2> – See your > emails as clean, short chats. > > > -------- Originalnachricht -------- > Betreff: Re: [OAUTH-WG] URGENT: WPAD attack exposes URL contents even > overHTTPS > Von: William Denniss <wdenn...@google.com> > An: John Bradley <ve7...@ve7jtb.com> > Cc: Oauth Wrap Wg <oauth@ietf.org> > > > PKCE S256 was indeed designed to protect against eavesdropping of both the > authorization request & response. It was originally created for native > apps where URL leakage was deemed more likely (since it goes over > inter-process communication channels), perhaps the practice should be > expanded to all clients. > > On Tue, Jul 26, 2016 at 6:11 PM, <ve7...@ve7jtb.com> wrote: > >> PS Using PKCE S256 would prevent this attack on web server clients, as >> long as the client uses a different PKCE vale for each request. Even if >> the attacker can observe both the request and response, they would not have >> the code_verifyer and if replaying the code to the client the client will >> use the wrong verifier value to exchange the code and will get an error. >> >> >> >> That is probably the simplest mitigation against this for the code flow >> on web servers and native apps. >> >> >> >> I will think about it overnight. >> >> >> >> John B. >> >> >> >> Sent from Mail <https://go.microsoft.com/fwlink/?LinkId=550986> for >> Windows 10 >> >> >> >> *From: *ve7...@ve7jtb.com >> *Sent: *July 26, 2016 9:04 PM >> *To: *Dick Hardt <dick.ha...@gmail.com>; Oauth Wrap Wg <oauth@ietf.org> >> *Subject: *RE: [OAUTH-WG] URGENT: WPAD attack exposes URL contents even >> overHTTPS >> >> >> >> I need to think about it a bit, however off the top of my head based on >> the attack described the code flow should still be safe if the code is >> truly single use. (Some implementations fudge that) >> >> >> >> If the attacker can stop the browser from delivering the code to the >> client then the client would be susceptible to the cut and paste attack for >> injecting the code back into the client. >> >> >> >> The OpenID Connect “code id_token” flow is not vulnerable to this if the >> client is properly validating the id_token. >> >> >> >> I suspect that this would work against the implicit flow if the JS is >> sending the code back to its web server via a GET. >> >> That I think we recommend against doing, or should. >> >> >> >> The Token binding proposals would stop a leaked code from being used, but >> not from being stolen in this attack. >> >> >> >> The attack against a confidential client would be the cut and paste one >> that we have identified. Currently the only mitigation we have is “code >> id_token” so the blog post at. >> >> >> http://openid.net/2016/07/16/preventing-mix-up-attacks-with-openid-connect/ >> >> >> >> I the most relevant current advice. >> >> The thing to add is that the code leaked in this way should not be >> repayable at the client >> >> >> >> I don’t think that native apps are vulnerable to this if they are using >> custom scheme redirects. >> >> >> >> I don’t know what the risk is if they are using loopback or claimed URI. >> It may be that a browser might leak them in the same way. >> >> That would need to be tested. >> >> >> >> John B. >> >> >> >> >> >> Sent from Mail <https://go.microsoft.com/fwlink/?LinkId=550986> for >> Windows 10 >> >> >> >> *From: *Dick Hardt <dick.ha...@gmail.com> >> *Sent: *July 26, 2016 8:15 PM >> *To: *Oauth Wrap Wg <oauth@ietf.org> >> *Subject: *[OAUTH-WG] URGENT: WPAD attack exposes URL contents even over >> HTTPS >> >> >> >> >> http://arstechnica.com/security/2016/07/new-attack-that-cripples-https-crypto-works-on-macs-windows-and-linux/ >> >> >> >> Access tokens included as a URL query parameter when accessing a resource >> are susceptible to this attack. >> >> >> >> Authorization codes are also visible. From what I know, we have not >> depended on the confidentiality of the authorization code. >> >> >> >> What are the best current practices that we can point people towards to >> ensure they are not susceptible to this attack? >> >> >> >> -- Dick >> >> Subscribe to the HARDTWARE <http://hardtware.com/> mail list to learn >> about projects I am working on! >> >> >> >> >> >> _______________________________________________ >> OAuth mailing list >> OAuth@ietf.org >> https://www.ietf.org/mailman/listinfo/oauth >> >> > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth > > -- nov matake
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth