Hi William,

On 22 May 2017, at 23:14, William Denniss <wdenn...@google.com> wrote:

>> Section 8.1 makes the statement that "Loopback IP based redirect URIs may
>> be susceptible to interception by other apps listening on the same
>> loopback interface." That's not how TCP listener sockets work: for any
>> given IP address, they guarantee single-process access to a port at any
>> one time. (Exceptions would include processes with root access, but an
>> attacking process with that level of access is going to be impossible to
>> defend against). While mostly harmless, the statement appears to be false
>> on its face, and should be removed or clarified.
> 
> Will be removed in the next update. Thank you.

Actually, I disagree with Adam on this, because what he says is OS specific. So 
I think the text is valuable and should stay.

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to