hi John,

if you remember I even proposed something along those lines in Darmstadt and it 
was deemed (with reason) as not enough good protection since the attacker can 
use a proxy….

regards

antonio

On Jan 27, 2016, at 2:30 PM, John Bradley <ve7...@ve7jtb.com> wrote:

> It think requiring a common authority segment for the authorization endpoint 
> and the token endpoint might work in common cases, but there are legitimate 
> cases where the URI of the Authorization endpoint might be a alias in the 
> case of multi tenants, all using a common token endpoint.    
> 
> The larger problem would be the RS, it is not uncommon to have the AS and RS 
> in different domains,  so with bearer tokens unless you make the same 
> authority restriction for RS then you are not really stoping the attacker.   
> They can get the AT by impersonating the RS.
> 
> I think trying to enforce a common origin policy over OAuth would be a bad 
> direction to go.
> 
> I understand that it seems like a easy fix on the surface, and it works for 
> most of the things people are using OAuth for today, but would be quite 
> limiting over the long term.
> 
> John B.
>> On Jan 27, 2016, at 7:31 AM, sakim...@gmail.com wrote:
>> 
>> Hi Hans,
>> 
>> Sorry, I mixed up the IdP mix-up attack and the code phishing attack.
>> 
>> Mandating the Authorization and Token Endpoint being in the same
>> authority would solve the later without changing the wire protocol.
>> 
>> For AS mix-up attack, mandating the client to change the redirection endpoint
>> per AS would solve the problem without change the wire protocol.
>> 
>> If these are not possible, then we would have to look at changing the
>> wire protocol. The solution that solves the both cases must
>> provide the token endpoint URI authoritatively, which means
>> you have to mandate some variation of discovery mandatory.
>> 
>> Nat
>> 
>> 
>> At 2016-01-27 17:01  Hans Zandbelt wrote:
>>> I don't see how that can deal with the specific form of the attack
>>> where the Client would have sent the authorization request to the
>>> legitimate authorization endpoint of a compromised AS and believes it
>>> gets the response from that, where in fact it was redirected away to
>>> the good AS.
>>> IOW, I don't think this is so much about mixing up endpoints where to
>>> send stuff to, but mixing up the entity/endpoint from which the Client
>>> believes the response was received. That may just be terminology
>>> though.
>>> Bottom line as far as I see is that a wire protocol element in the
>>> response is needed to tell the Client who issued it, regardless of how
>>> the Client deals with configuration of the AS information.
>>> Hans.
>>> On 1/27/16 1:31 AM, Nat Sakimura wrote:
>>>> So, is there a lot of cases that the authority section of the Good AS's
>>>> Authorization Endpoint and the Token Endpoints are different?
>>>> If not, then requiring that they are the same seems to virtually remove
>>>> the attack surface for the mix-up related attacks. It does not introduce
>>>> new parameter nor discovery. If it can be done, it probably is not worth
>>>> adding a new wire protocol element to mitigate the mix-up variants.
>> 
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to