Re: [OAUTH-WG] Recommendations for browser-based apps

2017-09-19 Thread Josh Mandel
Can anyone provide insight about what protection PKCE adds for browser based apps using the authorization code flow? The PKCE intro says that the specification is designed to mitigate an attack where: > the attacker intercepts the authorization code returned from the authorization endpoint within

Re: [OAUTH-WG] Redirection in authorization code flow: GET vs POST

2017-08-11 Thread Josh Mandel
Fixing my "with this technique" url: it should have been https://gist.github.com/jmandel/4704d1efed8578a67a6f9b600ffd0c63 . On Fri, Aug 11, 2017 at 4:00 PM, Josh Mandel wrote: > Hi All, > > I've just encountered a server that performs a redirect (back to the > clie

[OAUTH-WG] Redirection in authorization code flow: GET vs POST

2017-08-11 Thread Josh Mandel
Hi All, I've just encountered a server that performs a redirect (back to the client's redirect_uri) via POST instead of GET. This was surprising behavior to me and broke my client implementation — but citing chapter and verse, the server developer pointed out that https://tools.ietf.org/html/rfc67

Re: [OAUTH-WG] Google's use of Implicit Grant Flow

2017-02-16 Thread Josh Mandel
We've taken a similar approach for SMART Health IT [1], using the code flow for public clients to support in-browser apps, and <1h token lifetime. (We also allow these public clients to request a limited-duration refresh token by asking for an "online_access" scope; these refresh tokens stop workin

Re: [OAUTH-WG] Security concern for URI fragment as Implicit grant

2016-07-01 Thread Josh Mandel
d is more work. > It also may give the server a false sense of security. > > John B. > > On Jul 1, 2016, at 5:52 PM, Josh Mandel wrote: > > I think the confusion here is that I'm not using HEART's OAuth profiles :-) > > I'm using the SMART profiles, where

Re: [OAUTH-WG] Security concern for URI fragment as Implicit grant

2016-07-01 Thread Josh Mandel
quite sure what you are doing. > > Perhaps Justin has a better answer. > > John B. > > > On Jul 1, 2016, at 5:33 PM, Josh Mandel wrote: > > John, > > I appreciate your response. I'm hoping you can clarify why you say that > "HTTP POST... won't wo

Re: [OAUTH-WG] Security concern for URI fragment as Implicit grant

2016-07-01 Thread Josh Mandel
Java Script API approach. > > John B. > > > On Jul 1, 2016, at 5:16 PM, Josh Mandel wrote: > > Thanks Justin, > > To clarify: John's comment and my question were about POST. (I do > understand the behavior of HTTP POST and of window.postMessage; these are >

Re: [OAUTH-WG] Security concern for URI fragment as Implicit grant

2016-07-01 Thread Josh Mandel
h an AJAX call. What is wrong with > this? > > > ------ > *From:* Justin Richer > *To:* Josh Mandel > *Cc:* Oleg Gryb ; "" ; > Liyu Yi > *Sent:* Friday, July 1, 2016 2:00 PM > > *Subject:* Re: [OAUTH-WG] Security concern for URI fragmen

Re: [OAUTH-WG] Security concern for URI fragment as Implicit grant

2016-07-01 Thread Josh Mandel
John, Could you clarify what you mean by "POST doesn't really work"? Do you just mean that CORS support (e.g., http://caniuse.com/#feat=cors) isn't universal, or something more? On Fri, Jul 1, 2016 at 4:51 PM, John Bradley wrote: > Yes but POST doesn't really work for in browser apps. > > If it

[OAUTH-WG] OAuth server with a static web frontend?

2016-04-02 Thread Josh Mandel
Hi all, I'm exploring the idea of an OAuth server comprising two separate components: * Static *frontend* web app that handles all UI functionality * Headless *backend* that never returns HTML These two components would communicate via some well-defined internal protocol. For example, the fron

Re: [OAUTH-WG] Call for Adoption: OAuth 2.0 Mix-Up Mitigation

2016-01-21 Thread Josh Mandel
> Your way also works. It is just the reverse of my proposal. The difference > being that my proposal does not need any coding on the server but just > configuration, and it can return more metadata if needed. > > Cheers, > > Nat > > 2016年1月21日(木) 23:04 Josh Mandel : >

Re: [OAUTH-WG] Call for Adoption: OAuth 2.0 Mix-Up Mitigation

2016-01-21 Thread Josh Mandel
Apologies if this is the wrong forum for my comment (and please direct me to the appropriate place in that case), but I have two questions about the propose mitigation (and the thinking behind it) that I think the write-up could address: 1. Could the writeup clarify whether/how the primary "mixup"

Re: [OAUTH-WG] Getting a username from an access id in oauth2

2015-04-09 Thread Josh Mandel
Hi Brian, In general, OAuth 2.0 is an authorization framework; as such it doesn't directly describe authentication claims like "who is the current user?" or "what is this user's e-mail address". OAuth 2.0 can be used as the basis for authentication protocols like OpenID Connect [1], which you may

Re: [OAUTH-WG] Standard URL parameter for mitigating RFC6819's threat 4.6.4?

2015-03-16 Thread Josh Mandel
the attacker using that > and passing in https://attacker.com as the desired RS and audience? > > Phil > > @independentid > www.independentid.com > phil.h...@oracle.com > > On Mar 16, 2015, at 11:12 AM, Josh Mandel wrote: > > Hi Phil, > > It might help me if you spelled ou

Re: [OAUTH-WG] Standard URL parameter for mitigating RFC6819's threat 4.6.4?

2015-03-16 Thread Josh Mandel
e this helps. It seems to me, a phishing link could tell your > app to launch and pass in any RS value could it not? > > Phil > > @independentid > www.independentid.com > phil.h...@oracle.com > > On Mar 16, 2015, at 10:47 AM, Josh Mandel wrote: > > Hi Torsten,

Re: [OAUTH-WG] Standard URL parameter for mitigating RFC6819's threat 4.6.4?

2015-03-16 Thread Josh Mandel
t probably won't stop >> the majority of possible AT leaks. >> >> John B. >> >> >> On Mar 15, 2015, at 2:18 PM, Torsten Lodderstedt >> wrote: >> >> Hi Josh, >> >> I'm not aware of a common practice to use such a parameter.

[OAUTH-WG] Standard URL parameter for mitigating RFC6819's threat 4.6.4?

2015-03-03 Thread Josh Mandel
Hi All, In section 4.6.4 ("Threat: Access Token Phishing by Counterfeit Resource Server"), RFC6819 describes a threat where a counterfeit resource server tricks a client into obtaining and sharing an access token from a legitimate authorization server. One of the proposed mitigations involves: "te

Re: [OAUTH-WG] Confusion on Implicit Grant flow

2015-02-06 Thread Josh Mandel
Hi Adam, I'm not 100% sure what you're envisioning as an alternative to the implicit flow, but if I'm reading between the lines of your question correctly, there are two key parts to the answer, because the implicit flow is designed to accomplish two key goals (vs. the authorization code grant):

Re: [OAUTH-WG] Client ID,Client SECRET?.

2014-10-22 Thread Josh Mandel
You'll want to follow Vimeo's instructions -- probably be visiting https://developer.vimeo.com/api and clicking "register your app". If you have any questions, you'll want to visit http://developer.vimeo.com/help . This mailing list is not affiliated with Vimeo, and we can't help you register with

[OAUTH-WG] Security considerations in draft-sakimura-oauth-tcse-03

2014-05-14 Thread Josh Mandel
Forgive me if this is well-trodden territory, but I would have expected the security considerations in this proposal to include a note to the effect of: "In a scenario where a mobile client is contending with malicious apps on the same device that listen on the same custom URL scheme, it's importa

Re: [OAUTH-WG] draft-hunt-oauth-client-association-00

2013-11-01 Thread Josh Mandel
Hi Justin, Well, I spent ~20min to read over this pair of drafts (association + software_statement). I have to say that in isolation, I find this approach quite reasonable. In particular: 1. This approach does *not* require both a bearer token and software_statement for the registration step. The

Re: [OAUTH-WG] Dynamic Client Registration Conference Call: Thu 22 Aug, 2pm PDT

2013-08-20 Thread Josh Mandel
dependentid > www.independentid.com > phil.h...@oracle.com > > > > > > > > On 2013-08-20, at 8:30 AM, Josh Mandel wrote: > > The group may be interested in bits of the following classification that > we put together for BlueButton+: > http://blue-button.github.io/

Re: [OAUTH-WG] Dynamic Client Registration Conference Call: Thu 22 Aug, 2pm PDT

2013-08-20 Thread Josh Mandel
The group may be interested in bits of the following classification that we put together for BlueButton+: http://blue-button.github.io/blue-button-plus-pull/#client-types Here, we classified apps according to 1. whether they can protect a `client_secret` and 2. whether they can protect a `regist

Re: [OAUTH-WG] A Proposal for Dynamic Registration

2013-08-08 Thread Josh Mandel
> not everyone who's doing OAuth-protected APIs is doing SCIM +1. (I'd wager very few have even heard of it.) > People are already implementing the spec that we have, and will continue > to do so even if the IETF drops it. +1. ___ OAuth mailing list

Re: [OAUTH-WG] Implicit clients in Dynamic Registration

2013-05-24 Thread Josh Mandel
on the AS starts to care is way outside of the spec. > > -- Justin > > On May 24, 2013, at 4:21 PM, Josh Mandel > wrote: > > I think this discussion mixes two separable questions: > > 1. Should dyn-reg support client-side browser-based apps (which need > client_id

Re: [OAUTH-WG] Implicit clients in Dynamic Registration

2013-05-24 Thread Josh Mandel
I think this discussion mixes two separable questions: 1. Should dyn-reg support client-side browser-based apps (which need client_ids for each AS they talk to, even if they only talk briefly and then throw the credentials away)? 2. Which authorization flows are available to clients? I have exa

Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-10.txt

2013-05-07 Thread Josh Mandel
As I understand it (corrections welcome!) rfc6749 says that public clients: 1. are defined functionally, as clients "incapable of maintaining the confidentiality of their credentials" [section 2.1] 2. "MAY establish a client authentication method" if the server allows. e.g. client password auth