I like it, but I think using "phishing attacks" is too limited.  I suggest 
changing "phishing attacks" to "by an attacker"



________________________________
From: Eran Hammer-Lahav <e...@hueniverse.com>
To: OAuth WG <oauth@ietf.org>
Sent: Tuesday, August 16, 2011 2:44 PM
Subject: [OAUTH-WG] Open redirector feedback (Yaron Goland)


Moved here to help discuss.
 
> 3.1.2.4.  Invalid Endpoint: Comment on “open redirector”: “How many people
> even know what the heck an open redirector is? I think we need a section in
> the security considerations section that defines what an open redirector is
> and why it’s bad. Alternatively a normative reference to a complete
> definition somewhere else is also fine.”
 
Added new section and reference to it:
 
10.15.  Open Redirectors
 
   The authorization server authorization endpoint and the client
   redirection endpoint can be improperly configured and operate as open
   redirectors.  An open redirector is an endpoint using a parameter to
   automatically redirect a user-agent to the location specified by the
   parameter value without any validation.
 
   Open redirectors can be used in phishing attacks to get end-users to
   visit malicious sites by making the URI's authority look like a
  familiar and trusted destination.  In addition, if the authorization
   server allows the client to register only part of the redirection
   URI, an attacker can use an open redirector operated by the client to
   construct a redirection URI that will pass the authorization server
   validation but will send the authorization code or access token to an
   endpoint under the control of the attacker.
 
 
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to