Hey Mike, thanks for writing up the PR.
Generally speaking, I think it nicely and fairly unobtrusively introduces
the ability for servers to choose whether/when to use server-contributed
nonces to further constrain lifetimes of DPoP proof. I've been reluctant to
add something like this out of conc
Hi Mike, thanks for this writeup and bringing this attack surface to the
attention of the group! I would like to also discuss how this attack and
solution could be applied to the proposed HTTP Message Signatures based draft
for OAuth 2:
https://www.ietf.org/archive/id/draft-richer-oauth-httpsig
We all know that using proof-of-possession with issued tokens is a means of
rendering exfiltrated tokens useless to attackers. The DPoP was created as one
of the tools to prevent this. There's a huge amount of evidence of successful
token exfiltration attacks in the wild, some of which is refe