[OAUTH-WG] Murray Kucherawy's No Objection on draft-ietf-oauth-iss-auth-resp-03: (with COMMENT)

2021-12-01 Thread Murray Kucherawy via Datatracker
Murray Kucherawy has entered the following ballot position for draft-ietf-oauth-iss-auth-resp-03: No Objection When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please re

Re: [OAUTH-WG] [EXTERNAL] Re: dpop_jkt Authorization Request Parameter

2021-12-01 Thread Warren Parad
> > (e.g. one-time use in a certain timeframe etc). Sure but couldn't we just reduce the lifetime? Even if the token isn't one time use, surely the reuse time is trivially short which would prevent against exfiltration of the necessary security tokens to issue the attack? I feel like the simpler

Re: [OAUTH-WG] [EXTERNAL] Re: dpop_jkt Authorization Request Parameter

2021-12-01 Thread Pieter Kasselman
Hi Aaron, Neil Thanks for the questions. We agree that ideally authorization codes and PKCE proofs would never end up in log files and one-time use would be perfectly implemented. However, in practice these artefacts do find their way into log files in various places and one-time use may not a

Re: [OAUTH-WG] dpop_jkt Authorization Request Parameter

2021-12-01 Thread Daniel Fett
+1 to what Neil and Aaron said. dpop_jkt effectively creates a client authentication mechanism with an ad-hoc identifier for the client. I'm wondering if dynamic registration plus an asymmetric client authentication scheme doesn't already solve the problem. -Daniel Am 01.12.21 um 01:05 schrieb