Thanks Karsten! On Thu, Oct 7, 2021 at 1:21 AM Karsten Meyer zu Selhausen < karsten.meyerzuselhau...@hackmanit.de> wrote:
> Hi Rifaat, > > apologies for the delay. > > We published a new draft addressing your comments. > > We changed Section 2.4, paragraph 3 to: > > If clients interact with both authorization servers supporting this > specification and authorization servers not supporting this > specification, clients MUST store the information which authorization > server supports the iss parameter. Clients *MUST* reject authorization > responses without the iss parameter from authorization servers which > do support the parameter according to the client's configuration. > *Clients SHOULD discard authorization responses with the iss parameter > from authorization servers which do not indicate their support for > the parameter. However, there might be legitimate authorization > servers that provide the iss parameter without indicating their > support in their metadata. The decision of whether to accept such > responses is individual for every scenario and it is not in the scope > of this specification.* > > > Let us know if there is anything else we should work on. > > > Best regards, > Karsten > On 26.09.2021 00:04, Rifaat Shekh-Yusef wrote: > > Karsten, Daniel, > > Can you please address my comments in a new version of the draft to allow > me to progress it? > > Regards, > Rifaat > > > On Mon, Sep 6, 2021 at 6:50 AM Karsten Meyer zu Selhausen < > karsten.meyerzuselhau...@hackmanit.de> wrote: > >> Hi Rifaat, >> >> thank you for the shepherd's review. >> >> Those are valid comments. We will have a second look on this paragraph. >> >> Best regards, >> Karsten >> On 04.09.2021 16:20, Rifaat Shekh-Yusef wrote: >> >> Hi Karsten, Daniel, >> >> As the document shepherd, I have reviewed the document and I have the >> following comments on draft-ietf-oauth-iss-auth-resp-01 version: >> >> >> Section 2.4, paragraph 3, first sentence: >> >> "If clients interact with both authorization servers supporting this >> specification and authorization servers not supporting this >> specification, clients SHOULD store the information which >> authorization server supports the "iss" parameter." >> >> Why is this a SHOULD? >> >> >> "Clients MUST >> reject authorization responses without the "iss" parameter from >> authorization servers which do support the parameter according to the >> client's configuration." >> >> What should the client do when it receives a response with "iss" parameter >> from an authorization server that did not indicate its support for this >> parameter? >> >> >> Section 7 >> >> RFC6479 should be replaced with *RFC6749* >> >> >> Regards, >> Rifaat >> >> _______________________________________________ >> OAuth mailing listOAuth@ietf.orghttps://www.ietf.org/mailman/listinfo/oauth >> >> -- >> Karsten Meyer zu Selhausen >> Senior IT Security Consultant >> Phone: +49 (0)234 / 54456499 >> Web: https://hackmanit.de | IT Security Consulting, Penetration Testing, >> Security Training >> >> Is your OAuth or OpenID Connect application vulnerable to mix-up attacks? >> Find out more on our >> blog:https://www.hackmanit.de/en/blog-en/132-how-to-protect-your-oauth-client-against-mix-up-attacks >> >> Hackmanit GmbH >> Universitätsstraße 60 (Exzenterhaus) >> 44789 Bochum >> >> Registergericht: Amtsgericht Bochum, HRB 14896 >> Geschäftsführer: Prof. Dr. Jörg Schwenk, Prof. Dr. Juraj Somorovsky, Dr. >> Christian Mainka, Prof. Dr. Marcus Niemietz >> >> -- > Karsten Meyer zu Selhausen > Senior IT Security Consultant > Phone: +49 (0)234 / 54456499 > Web: https://hackmanit.de | IT Security Consulting, Penetration Testing, > Security Training > > Is your OAuth or OpenID Connect application vulnerable to mix-up attacks? > Find out more on our > blog:https://www.hackmanit.de/en/blog-en/132-how-to-protect-your-oauth-client-against-mix-up-attacks > > Hackmanit GmbH > Universitätsstraße 60 (Exzenterhaus) > 44789 Bochum > > Registergericht: Amtsgericht Bochum, HRB 14896 > Geschäftsführer: Prof. Dr. Jörg Schwenk, Prof. Dr. Juraj Somorovsky, Dr. > Christian Mainka, Prof. Dr. Marcus Niemietz > >
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth