Hi Hans,

Am 11.11.19 um 10:57 schrieb Hans Zandbelt:
>
> P17
> About the description of the mixup attack: as long as the attacker is
> able to trigger a request (by having the user click a link) and read
> the query/POST parameters on the A-AS (perhaps from the logs) he can
> execute a mixup attack by starting from the A-AS rather than the H-AS
> (as demonstrated in the OAuth 2.0 security workshop in Darmstadt
> December 2016). Perhaps this can be made more explicit.

I'm not sure if I understand your comment correctly. By definition, the
attacker can always read the parameters from A-AS. The rest of the
attack is what is currently described as "Mix-Up Without Interception",
isn't it?

-Daniel

>
> -- 
> hans.zandb...@zmartzone.eu <mailto:hans.zandb...@zmartzone.eu>
> ZmartZone IAM - www.zmartzone.eu <http://www.zmartzone.eu>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to