Hi Joseph,

Among these 39 slides, to which attack(s) are you referring ?

I wrote:"It is quite hard to understand under which /context(s) /and conditions OAuth 2.0 could be safely used".

For each counter-measure, it would be useful to explain under which context(s) or under which assumptions
it should be used.

Denis

Hi Denis,

On 22 May 2018, at 14:05, Denis <denis.i...@free.fr <mailto:denis.i...@free.fr>> wrote:

In particular, the text states:

       "Clients shall use PKCE [RFC7636] in order to (with the help of the authorization server) detect and prevent attempts         to inject (replay) authorization codes into the authorization response".

This is incorrect, since RFC7636 should be used when the authorization code is returned from the authorization endpoint within a communication path that is _not protected_ by Transport Layer Security (TLS).

That is not really the full story as we've seen attacks where URLs that you would expect to be protected by TLS are vulnerable; one example is:

https://www.blackhat.com/docs/us-16/materials/us-16-Kotler-Crippling-HTTPS-With-Unholy-PAC.pdf

IMHO it would be sane to use PKCE anywhere where a code is returned in the URL and there isn't another proof of possession / token binding mechanism in play.

Joseph


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to