[OAUTH-WG] Re: PAR and client authentication

2024-11-29 Thread Benjamin Häublein
: Benjamin Häublein Cc: oauth@ietf.org Betreff: Re: [OAUTH-WG] PAR and client authentication Hi, I can’t see how client authentication prevents request tampering. Best, Nikos On 29 Nov 2024, at 2:55 PM, Benjamin Häublein mailto:benjamin.haeubl...@cirosec.de>> wrote: Hi, the goal of PAR

[OAUTH-WG] Re: PAR and client authentication

2024-11-29 Thread Benjamin Häublein
Hi, the goal of PAR is to protect the parameters of the authorization request from tampering. If there is no authentication of the client anybody could push an authorization request, and nothing would be gained. Thus, client authentication is required. Best regards, Benjamin Von: Nikos Fotiou

Re: [OAUTH-WG] Edge case in RFC 7636, Server Verifies code_verifier facilitates Login-CSRF

2022-01-05 Thread Benjamin Häublein
ve client. To reach such a state, an attacker could trick the user into starting the authorization grant but clicking the malicious link before the authorization response is sent. Best Regards, Benjamin Häublein Senior Consultant cirosec GmbH Ferdinand-Braun-Strasse 4 74074 Heilbronn Germany Phone

Re: [OAUTH-WG] Edge case in RFC 7636, Server Verifies code_verifier facilitates Login-CSRF

2022-01-05 Thread Benjamin Häublein
‘code_verifier’ for the original authorization request. When the AS behaves as described the client has no way to know that an attacker has interfered. Best Regards, Benjamin Häublein Von: George Fletcher Gesendet: Dienstag, 4. Januar 2022 14:51 An: Benjamin Häublein ; oauth@ietf.org Be

[OAUTH-WG] Edge case in RFC 7636, Server Verifies code_verifier facilitates Login-CSRF

2022-01-04 Thread Benjamin Häublein
elies on PKCE for CSRF protection must always include a code_verifier parameter in the token request (even if no code_verifier is present on the client side). Best regards, Benjamin Häublein Senior Consultant cirosec GmbH Ferdinand-Braun-Strasse 4 74074 Heilbronn Germany Phone: +49 (7131) 5