Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-security-topics-09.txt

2018-11-15 Thread Torsten Lodderstedt
Hi, here is the respective text proposal for section 2.1. (Note: we also refactored the text in order to disentangle CSRF/replay and mix-up detection). Clients MUST prevent CSRF and ensure that each authorization response is only accepted once. One-time use CSRF tokens carried in the state

Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-security-topics-09.txt

2018-11-14 Thread Daniel Fett
Am 13.11.18 um 17:29 schrieb Brian Campbell: > > > Does this "MUST be single-use” not effectively already require > the code is invalidated after first use? If so why downgrade this > to a “SHOULD”? > > You are right. My feeling is single use can turn out to be a > really hard t

Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-security-topics-09.txt

2018-11-13 Thread Brian Campbell
> > Does this "MUST be single-use” not effectively already require the code > is invalidated after first use? If so why downgrade this to a “SHOULD”? > > You are right. My feeling is single use can turn out to be a really hard > to implement requirement. That’s why I would like to relax it. Given w

Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-security-topics-09.txt

2018-11-13 Thread Torsten Lodderstedt
Hi Joseph, > Am 09.11.2018 um 18:27 schrieb Joseph Heenan : > > Hi Torsten, > > A few comments having just read this afresh: > > 2.1: 'Clients SHALL avoid’ - is that normatively different to ’SHOULD’ given > it appears to be permitted? SHALL is equivalent to MUST, changed it into SHOULD for

Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-security-topics-09.txt

2018-11-09 Thread Joseph Heenan
Hi Torsten, A few comments having just read this afresh: 2.1: 'Clients SHALL avoid’ - is that normatively different to ’SHOULD’ given it appears to be permitted? I find it a little hard to understand exactly what "avoid any redirects or forwards which can be parameterized by URI query paramete

Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-security-topics-09.txt

2018-11-09 Thread Torsten Lodderstedt
Hi all, the new revision incorporates the recommendation to use more secure grant types instead of implicit we agreed to add during the WG session on Monday. It also has more text around justifications for our recommendation. Especially, there is a new section 3.6 on access token injection.

[OAUTH-WG] I-D Action: draft-ietf-oauth-security-topics-09.txt

2018-11-09 Thread internet-drafts
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Web Authorization Protocol WG of the IETF. Title : OAuth 2.0 Security Best Current Practice Authors : Torsten Lodderstedt J