On Mon, Apr 11, 2022 at 11:13 AM Daniel Fett <m...@danielfett.de> wrote:

> Hi Rifaat,
> Am 14.02.22 um 22:26 schrieb Rifaat Shekh-Yusef:
>
> As part of the preparation for the shepherd write-up, I reviewed the
> document and have the following comments:
>
> https://www.ietf.org/archive/id/draft-ietf-oauth-security-topics-19.html
>
>
> General comment
>
> The document refers to a number of drafts that are not active anymore,
> e.g., token binding, pop key distribution, signing http requests, etc.
>
> What is the reason behind including these in this document?
>
> The reason is to provide a general idea of other approaches that have been
> conceived and to discuss various approaches to specific problems. It may be
> helpful to the reader to see that sometimes, a certain solution has been
> discussed already, even when it was not pursued further.
>
>
> I agree that including these might be useful to some people. But as a
developer working on following this specification, this does not add much
value and just adds more noise to the document.
I think that all these, options considered but not pursued, could be
captured in an appendix at the end of the document and you could refer to
the appendix when needed.


> Section 4.5.4
>
> I am not clear on how the attacker can do that. Let’s take the
> code_challenge example. Wouldn’t the AS be able to detect this attack
> because it gets the *code verifier* associated with the *original code
> challenge* from the Client?
>
> Yes, but this can be circumvented if the attacker can modify the
> authorization request from the client to the AS before it reaches the AS.
> In this case, the attacker can define the code_challenge in the request
> such that it works with the code_verifier that will be sent later on.
>
>
> But such an attack is not a limitation of this specific case. If an
attacker is able to control the Client or mount a MITM attack between
the Client and the AS, then all bets are off.
I am looking at this from a developer perspective; what would a developer
need to do in this case?

Regards,
 Rifaat


> Nits
>
> Section 2.1, 3rd paragraph, 3rd sentence: “MAY rely the” to “, MAY rely on
> the”
>
> Section 2.3, second paragraph: replace ietf-oauth-resource-indicators with
> RFC8707
>
> Section 4.1.3. Last paragraph: replace the jwsreq and PAR draft references
> with rfc9101 and rfc9126 respectively.
>
> Who might want to sweep through the document and update the various
> references, as there seem to be too many old references
>
> Thanks, we will fix this for the next revision and update the references.
>
> -Daniel
>
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to