Re: [OAUTH-WG] Caution about open redirectors using the state parameter

2020-04-22 Thread tt tt
Could you please delete my email stop sending emails On Wed, 22 Apr 2020 at 06:31, Daniel Fett wrote: > Am 22.04.20 um 15:14 schrieb Pieter Philippaerts: > > You could argue that it's already there. Section 4.7.1 says: > > > We also have Section 4.9 on open redirectors: > > https://tools.ietf.or

Re: [OAUTH-WG] Caution about open redirectors using the state parameter

2020-04-22 Thread Daniel Fett
Am 22.04.20 um 15:14 schrieb Pieter Philippaerts: > > You could argue that it's already there. Section 4.7.1 says: > > We also have Section 4.9 on open redirectors: https://tools.ietf.org/html/draft-ietf-oauth-security-topics-15#section-4.9 -Daniel __

Re: [OAUTH-WG] Caution about open redirectors using the state parameter

2020-04-22 Thread Pieter Philippaerts
half of Neil Madden Sent: Tuesday, April 21, 2020 23:35 To: George Fletcher Cc: Mike Jones; oauth@ietf.org Subject: Re: [OAUTH-WG] Caution about open redirectors using the state parameter I think the correct defence is to validate the URL (eg check against a whitelist) at the point you are going to re

Re: [OAUTH-WG] Caution about open redirectors using the state parameter

2020-04-21 Thread Neil Madden
I think the correct defence is to validate the URL (eg check against a whitelist) at the point you are going to redirect to it after the OAuth flow completes, rather than before you begin the OAuth flow. But this feels like generic web app security advice rather than anything specific to OAuth

Re: [OAUTH-WG] Caution about open redirectors using the state parameter

2020-04-21 Thread George Fletcher
+1 However, we should be careful how we prohibit it... because if the state value is actually signed, having the URL there isn't a problem as the attacker can not manipulate the value without breaking the signature. On 4/20/20 5:28 PM, Mike Jones wrote: I've seen several circumstances where

[OAUTH-WG] Caution about open redirectors using the state parameter

2020-04-20 Thread Mike Jones
I've seen several circumstances where "clever" clients implement an open redirector by encoding a URL to redirect to in the state parameter value. Attackers can then utilize this open redirector by choosing a state value. Can we please add an explicit prohibition of this practice in draft-ietf