The discussion during the interim wasn't really about replay protection but
rather about precomputation and exfiltration.  Something like a server
contributed nonce can potentially work to address both though so discussing
such things gets fuzzy quickly.

The approach to reply protection in DPoP is a bit different than what
ACME's done. It's arguably somewhat less robust but I think it is
appreciably simpler and is appropriately so because the replay of a DPoP
proof itself isn't of primary interest. To the extent possible/reasonable,
simplicity was and still is a goal of the DPoP design.



On Tue, Mar 16, 2021 at 5:21 PM Benjamin Kaduk <ka...@mit.edu> wrote:

> On Tue, Mar 16, 2021 at 05:45:46PM -0400, Rifaat Shekh-Yusef wrote:
> > Brian,
> >
> > For a nonce-based replay protection you. might want to look at the ACME
> > protocol here:
> > https://tools.ietf.org/html/rfc8555#section-6.5
>
> Yes, that one is really solid for the sort of thing it does, and I find
> myself recommending it over and over again.
> Of course, that workflow is not universally applicable, so sometimes it's
> not the right thing to do (and I don't remember enough about DPoP to say if
> it works there).
>
> -Ben
>

-- 
_CONFIDENTIALITY NOTICE: This email may contain confidential and privileged 
material for the sole use of the intended recipient(s). Any review, use, 
distribution or disclosure by others is strictly prohibited.  If you have 
received this communication in error, please notify the sender immediately 
by e-mail and delete the message and any file attachments from your 
computer. Thank you._
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to