Re: [OAUTH-WG] URGENT: WPAD attack exposes URL contents even overHTTPS

2016-07-28 Thread Justin Richer
t; > > That is probably the simplest mitigation against this for the code flow on > web servers and native apps. > > > > I will think about it overnight. > > > > John B. > > > > Sent from Mail <https://go.microsoft.com/fwlink/?LinkId=

Re: [OAUTH-WG] URGENT: WPAD attack exposes URL contents even overHTTPS

2016-07-27 Thread Brian Campbell
; >> +1 >> >> I also think PKCE is currently the simplest way to protect OAuth clients >> from injection. >> >> Sent by MailWise <http://www.mail-wise.com/installation/2> – See your >> emails as clean, short chats. >> >> >> Origi

Re: [OAUTH-WG] URGENT: WPAD attack exposes URL contents even overHTTPS

2016-07-27 Thread nov matake
ut it overnight. >> >> >> >> John B. >> >> >> >> Sent from Mail <https://go.microsoft.com/fwlink/?LinkId=550986> for >> Windows 10 >> >> >> >> *From: *ve7...@ve7jtb.com >> *Sent: *July 26, 2016 9:04 PM >

Re: [OAUTH-WG] URGENT: WPAD attack exposes URL contents even overHTTPS

2016-07-26 Thread tors...@lodderstedt.net
+1 I also think PKCE is currently the simplest way to protect OAuth clients from injection. Sent by MailWise – See your emails as clean, short chats. Originalnachricht Betreff: Re: [OAUTH-WG] URGENT: WPAD attack exposes URL contents even overHTTPS Von: William Denniss An

Re: [OAUTH-WG] URGENT: WPAD attack exposes URL contents even overHTTPS

2016-07-26 Thread ve7jtb
PS Using PKCE S256 would prevent this attack on web server clients, as long as the client uses a different PKCE vale for each request.Even if the attacker can observe both the request and response, they would not have the code_verifyer and if replaying the code to the client the client wil