Dear all,

I have a few comments about the leakage of access tokens and the underlying assumptions:

Section 2, A5 should be clarified:

"a resource server can be compromised by an attacker": Is the assumption that the attacker cannot get access to the resources stored at the compromised RS (or only parts of it)? Otherwise, the attacker does not need to get an AT anymore. A more differentiated view on RS compromisation is already given in Section 4.8.2, but this is not reflected in A5.

Also, A5 states that "an access token may be sent to an attacker-controlled resource server due to a misconfiguration," which does not require the compromisation of an honest RS.

Perhaps one could be more generic here and just say that the AT leaks to the attacker. However, a misconfigured RS endpoint not only gets the request to this endpoint (containing an AT) but can also respond and provide the RO with wrong resources. At the same time, if, say, the RO thinks that she is connected to her cloud storage, the attacker would get access to all uploaded data.

Is this really what A5 should express, or is the primary focus on the leakage of the AT?

Also, for this or the next version of this document, the Cuckoo's Token attack (see Section IV-A of http://arxiv.org/abs/1901.11520/ ), should be addressed. We also discussed this issue extensively at the last OSW in Stuttgart.

Typo: Section 3.5: MTLS -> mTLS

Best regards
Pedram Hosseyni

--
Pedram Hosseyni, M.Sc.
Room V38 2.438
Institute of Information Security - SEC
Universität Stuttgart
Universitätsstraße 38
D-70569 Stuttgart
Germany
Phone: +49 711 685 88454
https://sec.uni-stuttgart.de

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to