Re: [OAUTH-WG] open redirect in rfc6749

2014-09-16 Thread Hans Zandbelt
+1, Antonio and John convinced me that this is not limited to a registration curation problem although that is where the problems starts as Phil points out (and as much as I'd like it to stay there). There are and will be consumer OPs (like Google) that have no means to do whitelisting yet hav

Re: [OAUTH-WG] open redirect in rfc6749

2014-09-16 Thread Sergey Beryozkin
Hi I wonder, when we have a situation where any client, the malicious clients, or good clients, all of them can easily register and provide bad redirect URIs, intentionally or unintentionally, then does it imply there's serious a weakness present somewhere else, in the registration process for ex

Re: [OAUTH-WG] open redirect in rfc6749

2014-09-16 Thread Antonio Sanso
hi Sergey On Sep 16, 2014, at 10:44 AM, Sergey Beryozkin mailto:sberyoz...@gmail.com>> wrote: Hi I wonder, when we have a situation where any client, the malicious clients, or good clients, all of them can easily register and provide bad redirect URIs, intentionally or unintentionally, then doe

Re: [OAUTH-WG] open redirect in rfc6749

2014-09-16 Thread Antonio Sanso
hi Phil. On Sep 15, 2014, at 11:21 PM, Phil Hunt mailto:phil.h...@oracle.com>> wrote: So, let’s say you have a client that has “obtained” a client Id from a legit registered client. How does the malicious client exploit the previously registered URL if the server only redirects to that URL? T

Re: [OAUTH-WG] open redirect in rfc6749

2014-09-16 Thread Antonio Sanso
Hi John, agree that there are at two different things (as you pointed out below) where we could spend some word and provide some advice. To summarize: - one is the 'open redirect’ issue (net of semantic :), pointed by me, where nothing is leaked - one is the leakage, pointed by John Those t

Re: [OAUTH-WG] open redirect in rfc6749

2014-09-16 Thread Sergey Beryozkin
Hi Antonio On 16/09/14 09:52, Antonio Sanso wrote: hi Sergey On Sep 16, 2014, at 10:44 AM, Sergey Beryozkin mailto:sberyoz...@gmail.com>> wrote: Hi I wonder, when we have a situation where any client, the malicious clients, or good clients, all of them can easily register and provide bad redi

Re: [OAUTH-WG] open redirect in rfc6749

2014-09-16 Thread Bill Burke
I'll reiterate what convinced me if it helps. The danger was a matter of expectations. In Antonio's scenario, the user is more likely to be expecting a login screen and thus more likely to be fooled by a login-screen spoof. Antonio's suggested changes don't break any compatibility either, it

Re: [OAUTH-WG] [jose] alternative term to "plaintext" for the "none" alg (was Re: Review of: draft-ietf-oauth-json-web-token)

2014-09-16 Thread Richard Barnes
I will re-iterate here my strong preference that an "unsecured" or "plaintext" JWS object be syntactically distinct from a real JWS object. E.g. by having two dot-separated components instead of three. Beyond that, seems like just shuffling deck chairs. On Mon, Sep 8, 2014 at 12:10 PM, Brian Camp