Re: [OAUTH-WG] Multi-AS State Re-Use

2016-05-11 Thread Jim Manico
> > > > > *From:*OAuth [mailto:oauth-boun...@ietf.org > <mailto:oauth-boun...@ietf.org>] *On Behalf Of *Nat Sakimura > > *Sent:* Monday, May 9, 2016 7:34 PM > > *To:* Guido Schmitz <mailto:g.schm...@gtr

Re: [OAUTH-WG] Multi-AS State Re-Use

2016-05-11 Thread Nat Sakimura
t; > > > > *From:*OAuth [mailto:oauth-boun...@ietf.org] *On Behalf Of *Nat Sakimura > > *Sent:* Monday, May 9, 2016 7:34 PM > > *To:* Guido Schmitz ; oauth@ietf.org > > *Subject:* Re: [OAUTH-WG] Multi-AS State Re-Use > > > > > > > > As far as I am

Re: [OAUTH-WG] Multi-AS State Re-Use

2016-05-10 Thread Daniel Fett
ject:* Re: [OAUTH-WG] Multi-AS State Re-Use > > > > As far as I am aware of, state was meant to be nonce. Replay possibility > etc. were known. It is probably a bad documentation that every reviewers > missed because they were assuming it. -- Informationssicherheit und Krypto

Re: [OAUTH-WG] Multi-AS State Re-Use

2016-05-10 Thread Anthony Nadalin
-AS State Re-Use As far as I am aware of, state was meant to be nonce. Replay possibility etc. were known. It is probably a bad documentation that every reviewers missed because they were assuming it. Best, Nat On Mon, May 9, 2016 at 20:14 Guido Schmitz mailto:g.schm...@gtrs.de>> wrote:

Re: [OAUTH-WG] Multi-AS State Re-Use

2016-05-09 Thread Nat Sakimura
As far as I am aware of, state was meant to be nonce. Replay possibility etc. were known. It is probably a bad documentation that every reviewers missed because they were assuming it. Best, Nat On Mon, May 9, 2016 at 20:14 Guido Schmitz wrote: > Hi all, > > can anybody confirm that this is a ne

Re: [OAUTH-WG] Multi-AS State Re-Use

2016-05-09 Thread Guido Schmitz
Hi all, can anybody confirm that this is a new / undocumented attack? Cheers, Guido, Daniel, and Ralf On 22.04.2016 16:23, Daniel Fett wrote: > Hi all, > > Besides the state leakage attack we found that another important fact > regarding state is underspecified: Each state value should only be

[OAUTH-WG] Multi-AS State Re-Use

2016-04-22 Thread Daniel Fett
Hi all, Besides the state leakage attack we found that another important fact regarding state is underspecified: Each state value should only be used for one run of the protocol, in particular, each AS should see a different state in multi-AS settings. Clients might be tempted to generate state on