Hi Denis, > On 22 May 2018, at 14:05, Denis <denis.i...@free.fr> wrote: > In particular, the text states: > > "Clients shall use PKCE [RFC7636] in order to (with the help of the > authorization server) detect and prevent attempts > to inject (replay) authorization codes into the authorization > response". > > This is incorrect, since RFC7636 should be used when the authorization code > is returned from the authorization endpoint > within a communication path that is not protected by Transport Layer Security > (TLS). > That is not really the full story as we've seen attacks where URLs that you would expect to be protected by TLS are vulnerable; one example is:
https://www.blackhat.com/docs/us-16/materials/us-16-Kotler-Crippling-HTTPS-With-Unholy-PAC.pdf IMHO it would be sane to use PKCE anywhere where a code is returned in the URL and there isn't another proof of possession / token binding mechanism in play. Joseph
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth