The client could just add another random string with every authorization 
request.

Regards,
Torsten.


Gesendet mit BlackBerry® Webmail von Telekom Deutschland  

-----Original Message-----
From: Francisco Corella <fcore...@pomcor.com>
Date: Tue, 4 Jan 2011 17:26:42 
To: Torsten Lodderstedt<tors...@lodderstedt.net>
Reply-To: fcore...@pomcor.com
Cc: <oauth@ietf.org>; Karen P. Lewison<kplewi...@pomcor.com>
Subject: Re: [OAUTH-WG] TLS is needed for redirecting back to the client

--- On Tue, 1/4/11, Torsten Lodderstedt <tors...@lodderstedt.net> wrote:
> the attack you described sounds very similar to session
> fixation attacks. TLS (more specifically server
> authentication) is one way to cope with spoofing in general
> (supposed the client has a reasonably CA policy). So it
> should do in this case, too.

Yes, TLS is the solution for both variants of the attack.

> Validation of the redirect_uri associated with a particular
> authorization code on the tokens endpoint is another way to
> detect/prevent such an attack. Supposed the attacker has to
> inject the tapped authorization code into the client
> application during a second authorization flow. If the
> client uses different redirect_uri's for every flow, the
> attempt to inject the code can be detected.

This I don't understand.  The redirect_uri is alwasy the
same...

Francisco




_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to