Oh, I see where you are heading. We potentially can cut some bells and whistles 
out of the current text.

> Am 19.11.2019 um 18:06 schrieb Hans Zandbelt <hans.zandb...@zmartzone.eu>:
> 
> 
> How about:
> 
> - don't use the Implicit or Resource Owner Password Credentials  grant types
> - perform exact matching of redirect URIs and make then Client/AS specific
> - use PKCE
> 
> Hans.
> 
>> On Tue, Nov 19, 2019 at 5:58 PM Torsten Lodderstedt 
>> <tors...@lodderstedt.net> wrote:
>> 
>> 
>> > On 19. Nov 2019, at 17:10, Hans Zandbelt <hans.zandb...@zmartzone.eu> 
>> > wrote:
>> > 
>> > 
>> > 
>> > On Tue, Nov 19, 2019 at 10:38 AM Torsten Lodderstedt 
>> > <tors...@lodderstedt.net> wrote:
>> > Hi Hans, 
>> > 
>> > > On 18. Nov 2019, at 04:11, Hans Zandbelt <hans.zandb...@zmartzone.eu> 
>> > > wrote:
>> > > 
>> > > Hi,
>> > > 
>> > > Please find my feedback from page 21 onwards below.
>> > > 
>> > > Hans.
>> > > 
>> > > Overall I would argue there's room for a very concise guidance section 
>> > > that says: do this, don't do that, without explanation, just as a 
>> > > reference for developers; the current text provides in depth analysis 
>> > > but that is perhaps not suitable for developers who just want to know 
>> > > what to do (or not to do) and don't really care about the 
>> > > background/reasoning
>> > 
>> > While section 4 gives the raw security threat analysis, we tried to 
>> > summarise the actionable guidance in section 3. What do you miss there?
>> > 
>> > I'd rather see it even shorter and more concise, but I guess you're right, 
>> > it is there
>> 
>> Do you want to suggest some text?
>> 
>> >  
>> > > 
>> > > P21
>> > > first bullet
>> > > "the client has bound this data to this particular instance." -> 
>> > > particular instance of what?
>> > 
>> > This bullet refers to the note above. 
>> > 
>> > "Note: this check could also detect attempts to inject a code which
>> >    had been obtained from another instance of the same client on another
>> >    device, if certain conditions are fulfilled:"
>> > 
>> > ok, I see
>> >  
>> > > 
>> > > 3rd paragraph:
>> > > "call to the tokens endpoint." -> "call to the token endpoint."
>> > 
>> > Fixed 
>> > 
>> > > 
>> > > last paragraph could forward point to the next section by adding 
>> > > something like
>> > > "using one of the mechanisms described in the next section."
>> > 
>> > Incorporated 
>> > 
>> > > 
>> > > P22
>> > > 3rd paragraph:
>> > > is the token binding guidance still accurate? it seems to be 
>> > > overestimating the adoption 
>> > 
>> > You mean this statement? 
>> > 
>> > "Token binding is
>> >       promising as a secure and convenient mechanism (due to its browser
>> >       integration).  As a challenge, it requires broad browser support
>> >       and use with native apps is still under discussion.”
>> > 
>> > yeah, but after re-reading I guess this actually spells out the adoption 
>> > conditions, so it is fine
>> > 
>> > Hans.
>> >  
>> > 
>> > Thanks,
>> > Torsten. 
>> > 
>> > > 
>> > > -- 
>> > > hans.zandb...@zmartzone.eu
>> > > ZmartZone IAM - www.zmartzone.eu
>> > > _______________________________________________
>> > > OAuth mailing list
>> > > OAuth@ietf.org
>> > > https://www.ietf.org/mailman/listinfo/oauth
>> > 
>> > 
>> > 
>> > -- 
>> > hans.zandb...@zmartzone.eu
>> > ZmartZone IAM - www.zmartzone.eu
>> 
> 
> 
> -- 
> hans.zandb...@zmartzone.eu
> ZmartZone IAM - www.zmartzone.eu

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to