Yes, but a redirect to a registered redirect_uri may still leak information in the referrer or fragment.
That is the point Antonio is trying to make. It is not a open redirect but might be used as part of an attack on someone. John B. Sent from my iPhone > On Sep 15, 2014, at 5:43 PM, Phil Hunt <phil.h...@oracle.com> wrote: > > If a server accepts a URL from a client to be used as a redirect that the > server doesn’t recognize or is not registered, that is an open redirect. > > The specification does no allow open-redirects, it considers this a > mis-configuration. > > Take a look at sections 3.1.2.2 and 10.15 of RFC6749. > > Phil > > @independentid > www.independentid.com > phil.h...@oracle.com > > > >> On Sep 15, 2014, at 1:00 PM, John Bradley <ve7...@ve7jtb.com> wrote: >> >> There may be a problem with semantics in this discussion. >> >> There is a redirect performed by athe authorization endpoint to a fixed uri >> that is pre registered with the authorization server without user prompting. >> >> That probably doesn't fit the strict definition of a open redirector. >> >> It may however create similar security issues in situations with relatively >> open registration of clients. >> >> The largest issues are that the browser might leak information across the >> redirect in the fragment or referrer. That has been used in attacks against >> Facebook in the past. >> >> This is no where near the end of the world, however we need to look at the >> security considerations and see if we can provide better advice to >> implementors. In some cases returning a error to the browser may be best. >> >> I don't think we need to go so far as not returning any error to the client >> under any circumstance. >> >> John B. >> >> Sent from my iPhone >> >>> On Sep 15, 2014, at 4:41 PM, Phil Hunt <phil.h...@oracle.com> wrote: >>> >>> Simply not true. >>> >>> Phil >>> >>> @independentid >>> www.independentid.com >>> phil.h...@oracle.com >>> >>> >>> >>>> On Sep 15, 2014, at 12:10 PM, Antonio Sanso <asa...@adobe.com> wrote: >>>> >>>> hi *, >>>> >>>> my understanding is that there is a rough consensus that if an OAuth >>>> Provider follows rfc6749 verbatim will end up having an open redirector. >>>> My next question would be now, is there anything we can do to raise some >>>> awareness about this issue? >>>> >>>> regards >>>> >>>> antonio >>>> >>>>> On Sep 4, 2014, at 3:15 PM, Hans Zandbelt <hzandb...@pingidentity.com> >>>>> wrote: >>>>> >>>>> I am convinced about the issue in the use case Antonio provided but I >>>>> hope not to close the door on returning errors to known and trusted >>>>> clients. Not sure anymore if that's possible though because the >>>>> distinction can't be "registered"... >>>>> >>>>> Hans. >>>>> >>>>>>> On 9/4/14, 3:01 PM, Antonio Sanso wrote: >>>>>>> hi Bill >>>>>>> On Sep 4, 2014, at 2:52 PM, Bill Burke <bbu...@redhat.com> wrote: >>>>>>> >>>>>>> FWIW, Antonio convinced me and I'm going to change this in our IDM >>>>>>> project. Thanks Antonio. What convinced me was that the user is >>>>>>> probably expecting a login screen. Since there is this expectation, it >>>>>>> might make it a little easier for the attacker to convince the user >>>>>>> that a spoofed login screen is real. I know this issue can only happen >>>>>>> with unrestricted registration, but, IMO, this proposed change doesn't >>>>>>> really have much of an effect on usability and is even backward >>>>>>> compatible with the current RFC. >>>>>>> >>>>>>> Wouldn't it better though to never do a redirect on an invalid request >>>>>>> and just display an error page? >>>>>> >>>>>> thanks for sharing your thoughts :). Display an error 400 is what Google >>>>>> does :) >>>>>> >>>>>> regards >>>>>> >>>>>> antonio >>>>>> >>>>>>> >>>>>>>> On 9/4/2014 3:50 AM, Antonio Sanso wrote: >>>>>>>> Hi Hans, >>>>>>>> >>>>>>>> I really fail to see how this can be addressed at registration time >>>>>>>> for cases where registration is unrestricted (namely all the big >>>>>>>> Providers) >>>>>>>> >>>>>>>> regards >>>>>>>> >>>>>>>> antonio >>>>>>>> >>>>>>>>> On Sep 4, 2014, at 9:47 AM, Hans Zandbelt >>>>>>>>> <hzandb...@pingidentity.com> wrote: >>>>>>>>> >>>>>>>>> Classifying like this must also mean that consent should not be >>>>>>>>> stored until the client is considered (admin) trusted, and admin >>>>>>>>> policy would interfere with user policy. >>>>>>>>> >>>>>>>>> IMHO the security consideration would apply only to dynamically >>>>>>>>> registered clients where registration is unrestricted; any other form >>>>>>>>> would involve some form of admin/user approval at registration time, >>>>>>>>> overcoming the concern at authorization time: there's no >>>>>>>>> auto-redirect flow possible for unknown clients. >>>>>>>>> >>>>>>>>> Hans. >>>>>>>>> >>>>>>>>>> On 9/4/14, 9:04 AM, Richer, Justin P. wrote: >>>>>>>>>> I think this advice isn't a bad idea, though it's of course up to >>>>>>>>>> the AS >>>>>>>>>> what an "untrusted" client really is. In practice, this is something >>>>>>>>>> that was registered by a non-sysadmin type person, either a >>>>>>>>>> dynamically >>>>>>>>>> registered client or something available through self-service >>>>>>>>>> registration of some type. It's also reasonable that a client, even >>>>>>>>>> dynamically registered, would be considered "trusted" if enough time >>>>>>>>>> has >>>>>>>>>> passed and enough users have used it without things blowing up. >>>>>>>>>> >>>>>>>>>> -- Justin >>>>>>>>>> >>>>>>>>>> On Sep 4, 2014, at 1:26 AM, Antonio Sanso <asa...@adobe.com >>>>>>>>>> <mailto:asa...@adobe.com>> wrote: >>>>>>>>>> >>>>>>>>>>> hi again *, >>>>>>>>>>> >>>>>>>>>>> after thinking a bit further IMHO an alternative for the untrusted >>>>>>>>>>> clients can also be to always present the consent screen (at least >>>>>>>>>>> once) before any redirect. >>>>>>>>>>> Namely all providers I have seen show the consent screen if all the >>>>>>>>>>> request parameters are correct and if the user accepts the redirect >>>>>>>>>>> happens. >>>>>>>>>>> If one of the parameter (with the exclusion of the client id and >>>>>>>>>>> redirect uri that are handled differently as for spec) is wrong >>>>>>>>>>> though >>>>>>>>>>> the redirect happens without the consent screen being shown.. >>>>>>>>>>> >>>>>>>>>>> WDYT? >>>>>>>>>>> >>>>>>>>>>> regards >>>>>>>>>>> >>>>>>>>>>> antonio >>>>>>>>>>> >>>>>>>>>>> On Sep 3, 2014, at 7:54 PM, Antonio Sanso <asa...@adobe.com >>>>>>>>>>> <mailto:asa...@adobe.com>> wrote: >>>>>>>>>>> >>>>>>>>>>>> Well, >>>>>>>>>>>> I do not know if this is only dynamic registration... >>>>>>>>>>>> let’s talk about real use cases, namely e.g. Google , Facebook , >>>>>>>>>>>> etc.. is that dynamic client registration? I do not know… :) >>>>>>>>>>>> >>>>>>>>>>>> Said that what the other guys think? :) >>>>>>>>>>>> Would this deserve some “spec adjustment” ? I mean there is a >>>>>>>>>>>> reason >>>>>>>>>>>> if Google is by choice “violating” the spec right? (I assume to >>>>>>>>>>>> avoid >>>>>>>>>>>> open redirect…) >>>>>>>>>>>> But other implementers do follow the spec hence they have this open >>>>>>>>>>>> redirector… and this is not nice IMHO... >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> On Sep 3, 2014, at 7:40 PM, Hans Zandbelt >>>>>>>>>>>> <hzandb...@pingidentity.com >>>>>>>>>>>> <mailto:hzandb...@pingidentity.com>> wrote: >>>>>>>>>>>> >>>>>>>>>>>>>> On 9/3/14, 7:14 PM, Antonio Sanso wrote: >>>>>>>>>>>>>> >>>>>>>>>>>>>> On Sep 3, 2014, at 7:10 PM, Hans Zandbelt >>>>>>>>>>>>>> <hzandb...@pingidentity.com <mailto:hzandb...@pingidentity.com>> >>>>>>>>>>>>>> wrote: >>>>>>>>>>>>>> >>>>>>>>>>>>>>> Is your concern clients that were registered using dynamic >>>>>>>>>>>>>>> client >>>>>>>>>>>>>>> registration? >>>>>>>>>>>>>> >>>>>>>>>>>>>> yes >>>>>>>>>>>>> >>>>>>>>>>>>> I think your issue is then with the trust model of dynamic client >>>>>>>>>>>>> registration; that is left out of scope of the dynreg spec (and >>>>>>>>>>>>> the >>>>>>>>>>>>> concept is not even part of the core spec), but unless you want >>>>>>>>>>>>> everything to be open (which typically would not be the case), >>>>>>>>>>>>> then >>>>>>>>>>>>> it would involve approval somewhere in the process before the >>>>>>>>>>>>> client >>>>>>>>>>>>> is registered. Without dynamic client registration that approval >>>>>>>>>>>>> is >>>>>>>>>>>>> admin based or resource owner based, depending on use case. >>>>>>>>>>>>> >>>>>>>>>>>>>>> Otherwise the positive case is returning a response to a valid >>>>>>>>>>>>>>> URL >>>>>>>>>>>>>>> that belongs to a client that was registered explicitly by the >>>>>>>>>>>>>>> resource owner >>>>>>>>>>>>>> >>>>>>>>>>>>>> well AFAIK the resource owner doesn’t register clients… >>>>>>>>>>>>> >>>>>>>>>>>>> roles can collapse in use cases especially when using dynamic >>>>>>>>>>>>> client >>>>>>>>>>>>> registration >>>>>>>>>>>>> >>>>>>>>>>>>>>> and the negative case is returning an error to that same URL. >>>>>>>>>>>>>> >>>>>>>>>>>>>> the difference is the consent screen… in the positive case you >>>>>>>>>>>>>> need >>>>>>>>>>>>>> to approve an app.. for the error case no approval is needed,,, >>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> I fail to see the open redirect. >>>>>>>>>>>>>> >>>>>>>>>>>>>> why? >>>>>>>>>>>>> >>>>>>>>>>>>> because the client and thus the fixed URL are explicitly approved >>>>>>>>>>>>> at >>>>>>>>>>>>> some point >>>>>>>>>>>>> >>>>>>>>>>>>> Hans. >>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> Hans. >>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> On 9/3/14, 6:56 PM, Antonio Sanso wrote: >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> On Sep 3, 2014, at 6:51 PM, Hans Zandbelt >>>>>>>>>>>>>>>> <hzandb...@pingidentity.com <mailto:hzandb...@pingidentity.com> >>>>>>>>>>>>>>>> <mailto:hzandb...@pingidentity.com>> wrote: >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> Let me try and approach this from a different angle: why >>>>>>>>>>>>>>>>> would you >>>>>>>>>>>>>>>>> call it an open redirect when an invalid scope is provided and >>>>>>>>>>>>>>>>> call it >>>>>>>>>>>>>>>>> correct protocol behavior (hopefully) when a valid scope is >>>>>>>>>>>>>>>>> provided? >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> as specified below in the positive case (namely when the >>>>>>>>>>>>>>>> correct >>>>>>>>>>>>>>>> scope >>>>>>>>>>>>>>>> is provided) the resource owner MUST approve the app via the >>>>>>>>>>>>>>>> consent >>>>>>>>>>>>>>>> screen (at least once). >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> Hans. >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> On 9/3/14, 6:46 PM, Antonio Sanso wrote: >>>>>>>>>>>>>>>>>> hi John, >>>>>>>>>>>>>>>>>> On Sep 3, 2014, at 6:14 PM, John Bradley <ve7...@ve7jtb.com >>>>>>>>>>>>>>>>>> <mailto:ve7...@ve7jtb.com> >>>>>>>>>>>>>>>>>> <mailto:ve7...@ve7jtb.com> >>>>>>>>>>>>>>>>>> <mailto:ve7...@ve7jtb.com>> wrote: >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> In the example the redirect_uri is vlid for the attacker. >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> The issue is that the AS may be allowing client >>>>>>>>>>>>>>>>>>> registrations with >>>>>>>>>>>>>>>>>>> arbitrary redirect_uri. >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> In the spec it is unspecified how a AS validates that a >>>>>>>>>>>>>>>>>>> client >>>>>>>>>>>>>>>>>>> controls the redirect_uri it is registering. >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> I think that if anything it may be the registration step >>>>>>>>>>>>>>>>>>> that >>>>>>>>>>>>>>>>>>> needs >>>>>>>>>>>>>>>>>>> the security consideration. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> (this is the first time :p) but I do disagree with you. It >>>>>>>>>>>>>>>>>> would be >>>>>>>>>>>>>>>>>> pretty unpractical to block this at registration time…. >>>>>>>>>>>>>>>>>> IMHO the best approach is the one taken from Google, namely >>>>>>>>>>>>>>>>>> returning >>>>>>>>>>>>>>>>>> 400 with the cause of the error.. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> *400.* That’s an error. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> *Error: invalid_scope* >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Some requested scopes were invalid. {invalid=[l]} >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> said that I hope you all agree this is an issue in the spec >>>>>>>>>>>>>>>>>> so >>>>>>>>>>>>>>>>>> far…. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> regards >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> antonio >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> John B. >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> On Sep 3, 2014, at 12:10 PM, Bill Burke <bbu...@redhat.com >>>>>>>>>>>>>>>>>>> <mailto:bbu...@redhat.com> >>>>>>>>>>>>>>>>>>> <mailto:bbu...@redhat.com> >>>>>>>>>>>>>>>>>>> <mailto:bbu...@redhat.com>> wrote: >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>> I don't understand. The redirect uri has to be valid in >>>>>>>>>>>>>>>>>>>> order for a >>>>>>>>>>>>>>>>>>>> redirect to happen. The spec explicitly states this. >>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>> On 9/3/2014 11:43 AM, Antonio Sanso wrote: >>>>>>>>>>>>>>>>>>>>> hi *, >>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>> IMHO providers that strictly follow rfc6749 are vulnerable >>>>>>>>>>>>>>>>>>>>> to open >>>>>>>>>>>>>>>>>>>>> redirect. >>>>>>>>>>>>>>>>>>>>> Let me explain, reading [0] >>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>> If the request fails due to a missing, invalid, or >>>>>>>>>>>>>>>>>>>>> mismatching >>>>>>>>>>>>>>>>>>>>> redirection URI, or if the client identifier is missing or >>>>>>>>>>>>>>>>>>>>> invalid, >>>>>>>>>>>>>>>>>>>>> the authorization server SHOULD inform the resource owner >>>>>>>>>>>>>>>>>>>>> of the >>>>>>>>>>>>>>>>>>>>> error and MUST NOT automatically redirect the user-agent >>>>>>>>>>>>>>>>>>>>> to the >>>>>>>>>>>>>>>>>>>>> invalid redirection URI. >>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>> If the resource owner denies the access request or if the >>>>>>>>>>>>>>>>>>>>> request >>>>>>>>>>>>>>>>>>>>> fails for reasons other than a missing or invalid >>>>>>>>>>>>>>>>>>>>> redirection URI, >>>>>>>>>>>>>>>>>>>>> the authorization server informs the client by adding the >>>>>>>>>>>>>>>>>>>>> following >>>>>>>>>>>>>>>>>>>>> parameters to the query component of the redirection URI >>>>>>>>>>>>>>>>>>>>> using the >>>>>>>>>>>>>>>>>>>>> "application/x-www-form-urlencoded" format, perAppendix B >>>>>>>>>>>>>>>>>>>>> <https://tools.ietf.org/html/rfc6749#appendix-B>: >>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>> Now let’s assume this. >>>>>>>>>>>>>>>>>>>>> I am registering a new client to thevictim.com >>>>>>>>>>>>>>>>>>>>> <http://thevictim.com/> >>>>>>>>>>>>>>>>>>>>> <http://victim.com/><http://victim.com >>>>>>>>>>>>>>>>>>>>> <http://victim.com/> >>>>>>>>>>>>>>>>>>>>> <http://victim.com/>> >>>>>>>>>>>>>>>>>>>>> <http://victim.com <http://victim.com/> >>>>>>>>>>>>>>>>>>>>> <http://victim.com/>> >>>>>>>>>>>>>>>>>>>>> provider. >>>>>>>>>>>>>>>>>>>>> I register redirect uriattacker.com >>>>>>>>>>>>>>>>>>>>> <http://uriattacker.com/> >>>>>>>>>>>>>>>>>>>>> <http://attacker.com/><http://attacker.com >>>>>>>>>>>>>>>>>>>>> <http://attacker.com/> <http://attacker.com/>> >>>>>>>>>>>>>>>>>>>>> <http://attacker.com <http://attacker.com/> >>>>>>>>>>>>>>>>>>>>> <http://attacker.com/>>. >>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>> According to [0] if I pass e.g. the wrong scope I am >>>>>>>>>>>>>>>>>>>>> redirected >>>>>>>>>>>>>>>>>>>>> back to >>>>>>>>>>>>>>>>>>>>> attacker.com <http://attacker.com/> >>>>>>>>>>>>>>>>>>>>> <http://attacker.com/><http://attacker.com >>>>>>>>>>>>>>>>>>>>> <http://attacker.com/> >>>>>>>>>>>>>>>>>>>>> <http://attacker.com/>> <http://attacker.com >>>>>>>>>>>>>>>>>>>>> <http://attacker.com/> <http://attacker.com/>>. >>>>>>>>>>>>>>>>>>>>> Namely I prepare a url that is in this form: >>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>> http://victim.com/authorize?response_type=code&client_id=bc88FitX1298KPj2WS259BBMa9_KCfL3&scope=WRONG_SCOPE&redirect_uri=http://attacker.com >>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>> and this is works as an open redirector. >>>>>>>>>>>>>>>>>>>>> Of course in the positive case if all the parameters are >>>>>>>>>>>>>>>>>>>>> fine this >>>>>>>>>>>>>>>>>>>>> doesn’t apply since the resource owner MUST approve the >>>>>>>>>>>>>>>>>>>>> app >>>>>>>>>>>>>>>>>>>>> via the >>>>>>>>>>>>>>>>>>>>> consent screen (at least once). >>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>> A solution would be to return error 400 rather than >>>>>>>>>>>>>>>>>>>>> redirect >>>>>>>>>>>>>>>>>>>>> to the >>>>>>>>>>>>>>>>>>>>> redirect URI (as some provider e.g. Google do) >>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>> WDYT? >>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>> regards >>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>> antonio >>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>> [0] https://tools.ietf.org/html/rfc6749#section-4.1.2.1 >>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>> _______________________________________________ >>>>>>>>>>>>>>>>>>>>> OAuth mailing list >>>>>>>>>>>>>>>>>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org> >>>>>>>>>>>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>> -- >>>>>>>>>>>>>>>>>>>> Bill Burke >>>>>>>>>>>>>>>>>>>> JBoss, a division of Red Hat >>>>>>>>>>>>>>>>>>>> http://bill.burkecentral.com >>>>>>>>>>>>>>>>>>>> <http://bill.burkecentral.com/> >>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>> _______________________________________________ >>>>>>>>>>>>>>>>>>>> OAuth mailing list >>>>>>>>>>>>>>>>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org> >>>>>>>>>>>>>>>>>>>> <mailto:OAuth@ietf.org> >>>>>>>>>>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> _______________________________________________ >>>>>>>>>>>>>>>>>>> OAuth mailing list >>>>>>>>>>>>>>>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org> >>>>>>>>>>>>>>>>>>> <mailto:OAuth@ietf.org><mailto:OAuth@ietf.org> >>>>>>>>>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> _______________________________________________ >>>>>>>>>>>>>>>>>> OAuth mailing list >>>>>>>>>>>>>>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org> >>>>>>>>>>>>>>>>>> <mailto:OAuth@ietf.org> >>>>>>>>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> -- >>>>>>>>>>>>>>>>> Hans Zandbelt | Sr. Technical Architect >>>>>>>>>>>>>>>>> hzandb...@pingidentity.com <mailto:hzandb...@pingidentity.com> >>>>>>>>>>>>>>>>> <mailto:hzandb...@pingidentity.com>| Ping >>>>>>>>>>>>>>>>> Identity >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> -- >>>>>>>>>>>>>>> Hans Zandbelt | Sr. Technical Architect >>>>>>>>>>>>>>> hzandb...@pingidentity.com <mailto:hzandb...@pingidentity.com> | >>>>>>>>>>>>>>> Ping Identity >>>>>>>>>>>>> >>>>>>>>>>>>> -- >>>>>>>>>>>>> Hans Zandbelt | Sr. Technical Architect >>>>>>>>>>>>> hzandb...@pingidentity.com <mailto:hzandb...@pingidentity.com>| >>>>>>>>>>>>> Ping >>>>>>>>>>>>> Identity >>>>>>>>>>> >>>>>>>>>>> _______________________________________________ >>>>>>>>>>> OAuth mailing list >>>>>>>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org> >>>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>>>>>> >>>>>>>>> -- >>>>>>>>> Hans Zandbelt | Sr. Technical Architect >>>>>>>>> hzandb...@pingidentity.com | Ping Identity >>>>>>>> >>>>>>>> _______________________________________________ >>>>>>>> OAuth mailing list >>>>>>>> OAuth@ietf.org >>>>>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>>>> >>>>>>> -- >>>>>>> Bill Burke >>>>>>> JBoss, a division of Red Hat >>>>>>> http://bill.burkecentral.com >>>>>>> >>>>>>> _______________________________________________ >>>>>>> OAuth mailing list >>>>>>> OAuth@ietf.org >>>>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>>> >>>>>> _______________________________________________ >>>>>> OAuth mailing list >>>>>> OAuth@ietf.org >>>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>> >>>>> -- >>>>> Hans Zandbelt | Sr. Technical Architect >>>>> hzandb...@pingidentity.com | Ping Identity >>>> >>>> _______________________________________________ >>>> OAuth mailing list >>>> OAuth@ietf.org >>>> https://www.ietf.org/mailman/listinfo/oauth >>> >>> _______________________________________________ >>> OAuth mailing list >>> OAuth@ietf.org >>> https://www.ietf.org/mailman/listinfo/oauth >
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth