My bad, sorry.

On Tue, Feb 4, 2014 at 8:58 AM, Phil Hunt <phil.h...@oracle.com> wrote:

> +1
>
> Phil
>
> > On Feb 4, 2014, at 8:33, John Bradley <ve7...@ve7jtb.com> wrote:
> >
> > The text in 10.16 is correct.
> >
> > This is a security consideration that has caused serious problems for
> Facebook and other implementers.
> >
> > In the Implicit flow there is no way for a client to know if a access
> token was issued to it or another client.
> >
> > The UA presenting the access token in an implicit flow may be the
> resource owner but may also be any other client that has ever received an
> access token for the resource.
> >
> > In the implicit flow the Authorization server knows what client it has
> issued a access token to via the registered redirect URI.
> >
> > The change doesn't reflect the intent of the security consideration.
> >
> > John B.
> >
> >
> >> On Feb 4, 2014, at 1:13 PM, RFC Errata System <
> rfc-edi...@rfc-editor.org> wrote:
> >>
> >> The following errata report has been submitted for RFC6749,
> >> "The OAuth 2.0 Authorization Framework".
> >>
> >> --------------------------------------
> >> You may review the report below and at:
> >> http://www.rfc-editor.org/errata_search.php?rfc=6749&eid=3880
> >>
> >> --------------------------------------
> >> Type: Technical
> >> Reported by: Eriksen Costa <eriksenco...@gmail.com>
> >>
> >> Section: 10.16
> >>
> >> Original Text
> >> -------------
> >> For public clients using implicit flows, this specification does not
> >> provide any method for the client to determine what client an access
> >> token was issued to.
> >>
> >> Corrected Text
> >> --------------
> >> For public clients using implicit flows, this specification does not
> >> provide any method for the authorization server to determine what
> >> client an access token was issued to.
> >>
> >> Notes
> >> -----
> >> A client can only know about tokens issued to it and not for other
> clients.
> >>
> >> Instructions:
> >> -------------
> >> This errata is currently posted as "Reported". If necessary, please
> >> use "Reply All" to discuss whether it should be verified or
> >> rejected. When a decision is reached, the verifying party (IESG)
> >> can log in to change the status and edit the report, if necessary.
> >>
> >> --------------------------------------
> >> RFC6749 (draft-ietf-oauth-v2-31)
> >> --------------------------------------
> >> Title               : The OAuth 2.0 Authorization Framework
> >> Publication Date    : October 2012
> >> Author(s)           : D. Hardt, Ed.
> >> Category            : PROPOSED STANDARD
> >> Source              : Web Authorization Protocol
> >> Area                : Security
> >> Stream              : IETF
> >> Verifying Party     : IESG
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to