Thanks for your feedback, Mike! I have two questions below:

Am 20.11.19 um 04:40 schrieb Mike Jones:
>
> I did a complete read of draft-ietf-oauth-security-topics-13
> <https://tools.ietf.org/html/draft-ietf-oauth-security-topics-13>.  My
> review comments follow, divided into substantive and editorial sections.
>
>  
>
> SUBSTANTIVE
>
>  
>
> 3.1.2. Implicit Grant – The statement “no viable mechanism exists to
> cryptographically bind access tokens issued in the authorization
> response to a certain client” isn’t actually true.  Please describe
> how the OpenID Connect ID Token achieves this for the “id_token token”
> and “code id_token token” response types via the “at_hash” claim in
> this paragraph, and appropriately qualify the unconditional statement
> cited.

How does the at_hash in the ID token bind the token to the client? I do
see that the client would not accept a token issued for another client.
What is discussed here, however, is that a malicious resource server
could use the token at another resource server. This is not prevented,
or is it?


> 4.8.1.3. Audience Restricted Access Tokens, next to last paragraph –
> When you list MTLS, also please state that the MTLS key can be used as
> a correlation handle, since it is the same for connections to all sites.
>
Wouldn't it be up to the client to use or not use the same key for
multiple sites? Also, what would be the impact of correlation here?


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to