Re: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF

2011-03-29 Thread Manger, James H
>> OAuth issues security tokens without indicating where they can be safely >> used. While that fatal flaw remains, it is pointless to specify the use of >> the Origin header. > I don't think anything should be in the base as the different token profiles > can stipulate the audience. But t

Re: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF

2011-03-29 Thread Anthony Nadalin
. From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Manger, James H Sent: Sunday, March 27, 2011 7:42 PM To: Eran Hammer-Lahav; OAuth Mailing List Subject: Re: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF >> Q. Should an OAuth client app li

Re: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF

2011-03-27 Thread Manger, James H
>> Q. Should an OAuth client app list the authorization server in the Origin >> header of requests to resource servers? > Was there any conclusion? My conclusion is that the Origin request header is the right place to list the OAuth authorization server to combat login CSRF attacks against

Re: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF

2011-03-24 Thread Eran Hammer-Lahav
Was there any conclusion? EHL From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Manger, James H Sent: Thursday, February 24, 2011 4:09 PM To: OAuth Mailing List; web...@ietf.org Subject: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF Q. Should an

Re: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF

2011-03-01 Thread Francisco Corella
; Manger, James H Cc: Karen P. Lewison Subject: RE: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF   Hi James, I think I got it now.  Thanks for explaining it so patiently. The attack is only possible if there are multiple independent authorization servers that d

Re: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF

2011-02-28 Thread Manger, James H
: Francisco Corella [mailto:fcore...@pomcor.com] Sent: Tuesday, 1 March 2011 4:17 PM To: OAuth Mailing List; Manger, James H Cc: Karen P. Lewison Subject: RE: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF Hi James, I think I got it now. Thanks for explaining it so patien

Re: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF

2011-02-28 Thread Francisco Corella
k endpoint, the resource servers are Facebook endpoints, and the attack is not possible. Francisco --- On Tue, 3/1/11, Manger, James H wrote: From: Manger, James H Subject: RE: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF To: "fcore...@pomcor.com" , "OAut

Re: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF

2011-02-28 Thread Manger, James H
Francisco, >> A client that follows HTTP redirects (or Link: header or any >> other variety of hypertext) might get directed to an 2nd >> service while still using the token from the 1st service. > But why would a legitimate authorization server redirect the > client to an attacker's server?

Re: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF

2011-02-28 Thread Francisco Corella
Hi James, > A client that follows HTTP redirects (or Link: header or any > other variety of hypertext) might get directed to an 2nd > service while still using the token from the 1st service. But why would a legitimate authorization server redirect the client to an attacker's server? Francisco

Re: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF

2011-02-27 Thread Manger, James H
Hi Francisco, >> Q. Should an OAuth client app list the authorization server >> in the Origin header of requests to resource servers? >> >> In OAuth (delegation) flows a server dynamically issues >> credentials (such as a bearer token) to a client app to use >> in subsequent HTTP requests t

Re: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF

2011-02-27 Thread Manger, James H
Torsten Lodderstedt said: "I would expect the token to carry information about its issuer. Would this be sufficient in order to detect CSRF?" No. A Login CSRF attack involves a legitimate token (listing the legitimate issuer) that an attacker received being given to a victim client. The client

Re: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF

2011-02-26 Thread Torsten Lodderstedt
Hi James, I would expect the token to carry information about its issuer. Would this be sufficient in order to detect CSRF? regards, Torsten. Am 25.02.2011 01:08, schrieb Manger, James H: Q. Should an OAuth client app list the authorization server in the Origin header of requests to resour

Re: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF

2011-02-25 Thread Francisco Corella
a pre-session cookie and implementing a state parameter that is not even mentioned in the specification? Francisco --- On Sat, 2/26/11, Brian Eaton wrote: From: Brian Eaton Subject: Re: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF To: fcore...@pomcor.com Cc: "

Re: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF

2011-02-25 Thread Brian Eaton
I don't think the advice from the OAuth 1.0a spec is wrong: http://oauth.net/core/1.0a/#anchor38 "Cross-Site Request Forgery (CSRF) is a web-based attack whereby HTTP requests are transmitted from a user that the website trusts or has authenticated. CSRF attacks on OAuth approvals can allow an at

Re: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF

2011-02-25 Thread Francisco Corella
Hi James, You raise an interesting point.  I hadn't thought about the threat of Login CSRF. > Q. Should an OAuth client app list the authorization server > in the Origin header of requests to resource servers? > > In OAuth (delegation) flows a server dynamically issues > credentials (such as a b

[OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF

2011-02-24 Thread Manger, James H
Q. Should an OAuth client app list the authorization server in the Origin header of requests to resource servers? In OAuth (delegation) flows a server dynamically issues credentials (such as a bearer token) to a client app to use in subsequent HTTP requests to other servers. To combat login c