Definitely; thanks for raising that explicitly.

-Ben

On Fri, Jan 17, 2020 at 04:34:10PM +0000, Richard Backman, Annabelle wrote:
> We should not be prescriptive about how the AS recognizes request URIs from 
> itself. Trusted authority or custom URI scheme are fine as examples, but 
> ultimately this is an internal implementation of the AS. It could just as 
> easily be using data URIs containing a symmetrically encrypted database 
> record ID.
> 
> > On Jan 16, 2020, at 8:00 PM, Benjamin Kaduk <ka...@mit.edu> wrote:
> > 
> > On Thu, Jan 16, 2020 at 04:31:30PM +0000, Neil Madden wrote:
> >> The mitigations of 10.4.1 are related, but the section heading is about 
> >> (D)DoS attacks. I think this heading needs to be reworded to apply to SSRF 
> >> attacks too or else add another section with similar mitigations. 
> >> 
> >> Mitigation (a) is a bit vague as to what an "unexpected location" is. 
> >> Perhaps specific wording that it should be a URI that has been 
> >> pre-registered for the client (and validated at that time) or is otherwise 
> >> known to be safe (e.g., is a URI scheme controlled by the AS itself as 
> >> with PAR).
> > 
> > pedantic nit: "URI scheme" is probably not what we want, as the authority
> > component of the URI (per RFC 3986) seems more likely to match "controlled
> > by the AS itself"
> > 
> > -Ben
> > 
> >> In addition for this to be effective the AS should not follow redirects 
> >> when fetching the URI. It's not clear to me whether that is implied by 
> >> "not perform recursive GET" so it may be worth explicitly spelling that 
> >> out.
> >> 
> > 
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to