Something to consider in the new security text that’s just occurred to me: 

If an attacker gets their account tied to a user’s device, there’s a risk that 
the attacker would potentially be able to get that user’s information as input 
through the device. Setting aside the obvious alexa-style panopticon boxes for 
a minute, just think of a set-top box that allows you to enter your credit card 
information through the device itself. You’d then be buying your attacker the 
new season of Stargate, or whatever.

 — Justin

> On Mar 19, 2018, at 12:06 PM, William Denniss <wdenn...@google.com> wrote:
> 
> The update has been posted and is now available. 
> https://tools.ietf.org/html/draft-ietf-oauth-device-flow-08 
> <https://tools.ietf.org/html/draft-ietf-oauth-device-flow-08>
> 
> Thanks Scott for the feedback, and Justin for reviewing!
> 
> 
> On Thu, Mar 8, 2018 at 6:19 PM Justin Richer <jric...@mit.edu 
> <mailto:jric...@mit.edu>> wrote:
> +1
> 
>> On Mar 5, 2018, at 10:23 PM, William Denniss <wdenn...@google.com 
>> <mailto:wdenn...@google.com>> wrote:
>> 
>> Thanks again for the feedback Scott. I've staged an update here: 
>> https://github.com/WilliamDenniss/draft-ietf-oauth-device-flow/pull/6 
>> <https://github.com/WilliamDenniss/draft-ietf-oauth-device-flow/pull/6>
>> 
>> It expands on the brute force attack section to include some detail on this 
>> attack, as it is quite unique for OAuth brute-force attacks (since the 
>> victim actually ends up with the attacker's grant on the device, instead of 
>> the other way around – not that this is totally safe of course, it's just 
>> unique).  It also adds some further discussion around what factors need to 
>> be considered by authorization servers when creating the user code format.
>> 
>> I'll post this once my co-authors have reviewed, and the submission tool 
>> re-opens.
>> 
>> 
>> On Fri, Jan 5, 2018 at 10:56 AM Rifaat Shekh-Yusef <rifaat.i...@gmail.com 
>> <mailto:rifaat.i...@gmail.com>> wrote:
>> Hi Scott,
>> 
>> Sorry, I missed that last discussion that you had with William.
>> 
>> 
>> William,
>> 
>> Can you please update the document based on your last discussion with Scott?
>> I will then update the request for publication to use the new updated 
>> version.
>> 
>> Regards,
>>  Rifaat
>> 
>> 
>> 
>> On Fri, Jan 5, 2018 at 12:40 PM, Hollenbeck, Scott <shollenb...@verisign.com 
>> <mailto:shollenb...@verisign.com>> wrote:
>> > -----Original Message-----
>> > From: OAuth [mailto:oauth-boun...@ietf.org 
>> > <mailto:oauth-boun...@ietf.org>] On Behalf Of Rifaat Shekh-
>> > Yusef
>> > Sent: Friday, January 05, 2018 12:30 PM
>> > To: e...@rtfm.com <mailto:e...@rtfm.com>
>> > Cc: oauth@ietf.org <mailto:oauth@ietf.org>; iesg-secret...@ietf.org 
>> > <mailto:iesg-secret...@ietf.org>; oauth-cha...@ietf.org 
>> > <mailto:oauth-cha...@ietf.org>
>> > Subject: [EXTERNAL] [OAUTH-WG] Publication has been requested for draft-
>> > ietf-oauth-device-flow-07
>> >
>> > Rifaat Shekh-Yusef has requested publication of draft-ietf-oauth-device-
>> > flow-07 as Proposed Standard on behalf of the OAUTH working group.
>> >
>> > Please verify the document's state at
>> > https://datatracker.ietf.org/doc/draft-ietf-oauth-device-flow/ 
>> > <https://datatracker.ietf.org/doc/draft-ietf-oauth-device-flow/>
>> 
>> The document really should be updated to reflect the last call discussions 
>> prior to requesting publication for the -07 version that needs to be updated.
>> 
>> Scott
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth 
>> <https://www.ietf.org/mailman/listinfo/oauth>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth 
>> <https://www.ietf.org/mailman/listinfo/oauth>
> 

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to