Re: [OAUTH-WG] state parameter and XSRF detection

2011-07-10 Thread Eran Hammer-Lahav
> -Original Message- > From: Torsten Lodderstedt [mailto:tors...@lodderstedt.net] > Sent: Sunday, July 10, 2011 2:17 AM > Eran Hammer-Lahav schrieb: > > >The security of the protocol relies fully (implicit grant) or partially > >(authorization code) on the validation of the redirection

Re: [OAUTH-WG] state parameter and XSRF detection

2011-07-10 Thread Torsten Lodderstedt
ppy to add this to the security document. regards, Torsten. > >If I had it my way, the specification would ban any type of dynamic >redirection URI (other than selecting one out of multiple fully >specified options). But this proposal was rejected (for no good >reasons, just peo

Re: [OAUTH-WG] state parameter and XSRF detection

2011-07-08 Thread Eran Hammer-Lahav
...@lodderstedt.net] Sent: Friday, July 08, 2011 1:23 AM To: Eran Hammer-Lahav; OAuth WG Subject: RE: [OAUTH-WG] state parameter and XSRF detection Hi Eran, including dynamic values within redirect uris is standard practice today and is allowed by the spec's text so far. I don't mind to

Re: [OAUTH-WG] state parameter and XSRF detection

2011-07-08 Thread Torsten Lodderstedt
Hi Eran, including dynamic values within redirect uris is standard practice today and is allowed by the spec's text so far. I don't mind to change it but the restricted behavior you prefer is a significant protocol change. Moreover, I would like to understand the threat you have in mind and inc

Re: [OAUTH-WG] state parameter and XSRF detection

2011-07-07 Thread Eran Hammer-Lahav
Allowing any flexibly in the redirection URI is a bad thing and the latest draft (pre -17) clearly states that. The main fear is that by allowing the query to be changed dynamically, attackers can find open redirector loopholes to abuse. I really wanted to make registration of the absolute URI a

Re: [OAUTH-WG] state parameter and XSRF detection

2011-06-27 Thread Shane B Weeden
Sounds reasonable - subject to the content of the validation rules for a registered redirect URI (section 10.11 TBD). The security considerations doc (or section 10.13 of the spec itself which is TBD) should make it clear that the state parameter must be provided by the client to prevent CSRF again

Re: [OAUTH-WG] state parameter and XSRF detection

2011-06-27 Thread Marius Scurtescu
On Mon, Jun 27, 2011 at 2:22 PM, Torsten Lodderstedt wrote: > Hi all, > > while working on a new revision of the OAuth security document, a question > arose I would like to clarify on the list. > > The "state" parameter is supposed to be used to link a certain authorization > request and response.