Can you explain how SSLstrip could be used to defeat the OAuth flows? Isn't it dependent on web pages with non-HTTPs links?

Which step in the OAuth exchanges would be vulnerable?

BTW, there is a threats analysis document that discusses a variety of attacks and countermeasures -

http://datatracker.ietf.org/doc/rfc6819/


There are two efforts at signed token types: MAC which is still a possibility if we wake up and do it, and the "Holder Of Key" type tokens.

There are a lot of folks that agree with you.

------------------------------------------------------------------------
*From:* L. Preston Sego III <lpse...@gmail.com>
*To:* oauth@ietf.org
*Sent:* Friday, February 1, 2013 7:37 AM
*Subject:* [OAUTH-WG] I'm concerned about how the sniffability of oauth2 requests

In an oauth2 request, the access token is passed along in the header, with nothing else.

As I understand it, oauth2 was designed to be simple for everyone to use. And while, that's true, I don't really like how all of the security is reliant on SSL.

what if an attack can strip away SSL using a tool such as sslstrip (or whatever else would be more suitable for modern https)? They would be able to see the access token and start forging whatever request he or she wants to.

Why not do some sort of RSA-type public-private key thing like back in Oauth1, where there is verification of the payload on each request? Just use a better algorithm?

_______________________________________________
OAuth mailing list
OAuth@ietf.org <mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth




_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to