[OAUTH-WG] Re: Browser-Based Applications - Document Shepherd Review

2024-12-17 Thread Rifaat Shekh-Yusef
Thanks Philippe! That's very helpful. I wonder if there is a way to somehow capture some of this explanation in the document to make sure implementers are clear on this issue? Otherwise, I am fine with your explanation. Regards, Rifaat On Tue, Dec 17, 2024 at 11:22 AM Philippe De Ryck < phil

[OAUTH-WG] Re: Browser-Based Applications - Document Shepherd Review

2024-12-17 Thread Philippe De Ryck
> On 17 Dec 2024, at 14:58, Rifaat Shekh-Yusef wrote: > > Thanks Philippe! > > Just to make sure I understand, with regards to the following statement: >> When the attacker manages to send such a malicious request without a >> preflight, the server would process it,... > > The server will proc

[OAUTH-WG] Re: Browser-Based Applications - Document Shepherd Review

2024-12-17 Thread Rifaat Shekh-Yusef
Thanks Philippe! Just to make sure I understand, with regards to the following statement: > When the attacker manages to send such a malicious request without a > preflight, the server would process it,... The server will process it because of a bug on the server? or will it always process such

[OAUTH-WG] Re: Browser-Based Applications - Document Shepherd Review

2024-12-16 Thread Philippe De Ryck
Hi Rifaat, Thank you for the detailed review comments. It took me a while to find some space in my schedule, but I’ve gone through them and addressed most of them in the document. There is one comment that I wanted to follow up here … > Section 6.1.3.3.2 > I might be missing something here: >