Correct me if i'm wrong, this case is handled by the nonce and time-stamp
values ?


On 6 July 2011 22:31, Justin Richer <jric...@mitre.org> wrote:

> You can still use the access code (web server) flow within a JavaScript
> application, just without a reliable client secret. The point of the
> "implicit" flow was to save a roundtrip to the server for light clients
> with limited lifespans, and it's a tradeoff between security, ease of
> implementation, and performance.
>
>  -- Justin
>
> On Wed, 2011-07-06 at 16:08 -0400, Kushal Dave wrote:
> > Hello!
> >
> >
> > Foursquare recently encountered a scary example of a client
> > accidentally leaking user tokens as part of the implicit grant flow.
> > It turns out the official "Tweet this" button provided by twitter
> > grabs the URL, including fragment, at the time of page load, before
> > the client's Javascript has had a chance to elide the access_token
> > hash value. And it's easy to imagine lots of other sharing and
> > analytics tools could be similarly aggressive in transmitting hash
> > values outside of the page.
> >
> >
> > We've thought a lot about what to do about this, short of disabling
> > the flow entirely. One thing that seems viable is to make the "access
> > token" in this flow actually a one-time use token. The requesting page
> > would then make a JSONP request exchanging the one-time use token for
> > a permanent token that is never visible in the URL. Has this come up?
> > Have you had any feedback from other implementors?
> >
> >
> > We're not excited about such a blatant deviation from the spec, but
> > we're not sure what else to do.
> >
> >
> > Cheers,
> > Kushal
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to