On 25 Nov 2019, at 12:09, Torsten Lodderstedt <tors...@lodderstedt.net> wrote:
> 
> Hi Neil, 
> 
>> On 25. Nov 2019, at 12:38, Neil Madden <neil.mad...@forgerock.com> wrote:
>> 
>> But for web-based SPAs and so on, I'm not sure the cost/benefit trade off is 
>> really that good. The biggest threat for tokens being stolen/misused is 
>> still XSS, and DPoP does nothing to protect against that. It also doesn't 
>> protect against many other ways that tokens leak in browsers - e.g. if a 
>> token leaks in your browser history then the threat is that the attacker is 
>> physically using your device, in which case they also have access to your 
>> DPoP keys. In the cases like the Facebook breach, where highly automated 
>> mass compromise was achieved, I think we're lacking evidence that PoP would 
>> help there either.
>> 
>> The single most important thing we can do to protect web-based apps is to 
>> encourage the principle of least privilege. Every access token should be as 
>> tightly constrained as possible - in scope, in audience, and in expiry time. 
>> Ideally at the point of being issued ...
> 
> I tend to agree with your assessment. The simplest way with current OAuth is 
> use of code+pkce+refresh tokens, narrowly scoped access tokens, and resource 
> indicators to mint RS-specific, privilege restricted, short lived access 
> tokens. 
> 
> Do you think we should spell this out in the SPA BCP?

I think that would certainly be a great start.

-- Neil
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to