Can anyone provide insight about what protection PKCE adds for browser
based apps using the authorization code flow? The PKCE intro says that the
specification is designed to mitigate an attack where:

> the attacker intercepts the authorization code returned from the
authorization endpoint within a communication path not protected by
Transport Layer Security (TLS), such as inter-application communication
within the client's operating system

... but for a browser based client, I'm not clear on why this is important.
(I agree PKCE doesn't hurt, of course, but I'm trying to understand whether
there is a specific advantage.)

Thanks for any perspective that,

Josh


On Sep 19, 2017 21:11, "Nov Matake" <mat...@gmail.com> wrote:

> you have redirect uri restriction there.
>
> nov
>
> > On Sep 20, 2017, at 9:44, Bill Burke <bbu...@redhat.com> wrote:
> >
> > Cookies are vulnerable to CXRF.
> >
> >> On Tue, Sep 19, 2017 at 7:48 PM, nov matake <mat...@gmail.com> wrote:
> >> Why not using http-only cookies instead of refresh tokens?
> >> If the app can interact with AuthZ server through a hidden iframe with
> >> prompt=none param, you shouldn’t need refresh tokens.
> >>
> >> If your SAP is running on a different domain with the backend server,
> >> Safari’s Intelligent Tracking Prevention will break the hidden iframe
> way
> >> though.
> >>
> >> On Sep 20, 2017, at 7:32, John Bradley <ve7...@ve7jtb.com> wrote:
> >>
> >> Right,  Refresh token is bearer for native apps, that is why we came up
> with
> >> PKCE to protect code.
> >>
> >> For Angular the code flow with PKCE is probably better than the token
> >> response type.
> >>
> >> However with bearer tokens it is still riskier than code with a
> confidential
> >> client so the AS should take that into account and not allow refresh
> tokens
> >> to live forever.
> >>
> >> One future way to protect refresh tokens and perhaps Access tokens is
> to use
> >> token binding to bind the tokens to the user agent.   You could do that
> now
> >> for refresh tokens in Edge (Chrome has TB off by default still).
> >>
> >> I think more work needs to be done to come up with a best practice for
> SPA.
> >>
> >> John B.
> >>
> >> On Sep 19, 2017, at 7:02 PM, Adam Lewis <adam.lewis@motorolasolutions.
> com>
> >> wrote:
> >>
> >> Only for confidential clients.  No authentication is required for public
> >> clients.
> >>
> >> On Tue, Sep 19, 2017 at 4:47 PM, Phil Hunt (IDM) <phil.h...@oracle.com>
> >> wrote:
> >>>
> >>> Except a refresh token is not purely bearer. The client is required to
> >>> authenticate to use it.
> >>>
> >>> Phil
> >>>
> >>>> On Sep 19, 2017, at 2:33 PM, Bill Burke <bbu...@redhat.com> wrote:
> >>>>
> >>>> I'd be curious to the response to this too.
> >>>>
> >>>> Seems to me that refresh token has the same possible security risks in
> >>>> an Angular app as an access token, except the refresh token is valid
> >>>> longer....Still, if you did the implicit flow, you'd have to have
> >>>> longer access token timeouts as it would be really annoying for the
> >>>> user to have to login again and again in a long session with your
> >>>> Angular app.
> >>>>
> >>>> We have a javascript adapter that does Authz Code Flow with PKCE for
> >>>> our Angular app.  It also does CORS checks on the code to token XHR
> >>>> request just in case on the IDP side.
> >>>>
> >>>>> On Tue, Sep 19, 2017 at 9:27 AM, Stefan Büringer <
> sbuerin...@gmail.com>
> >>>>> wrote:
> >>>>> Hi,
> >>>>>
> >>>>> there were some discussions in January regarding recommendations for
> >>>>> browser-based apps
> >>>>> (https://www.ietf.org/mail-archive/web/oauth/current/msg16874.html).
> >>>>>
> >>>>> I'd just like to ask if the Authorization Code Flow with PKCE is a
> >>>>> valid
> >>>>> option for Single-Page-Applications (in our case Angular), because
> >>>>> Implicit
> >>>>> Flow cannot be used in our scenario.
> >>>>>
> >>>>> Authorization Code Flow with PKCE eliminates the necessity for client
> >>>>> secrets, but our concern is that exposing the refresh token to the
> SPA
> >>>>> might
> >>>>> be a security risk, compared to the Implicit Flow were no refresh
> token
> >>>>> is
> >>>>> exposed.
> >>>>>
> >>>>> What's your take on this?
> >>>>>
> >>>>> Kind regards,
> >>>>> Stefan Büringer
> >>>>>
> >>>>> P.S. I couldn't find that much on the internet regarding
> Authorization
> >>>>> Code
> >>>>> Flow with PKCE in SPAs, if you have some recommendations for good
> blog
> >>>>> posts
> >>>>> I would be grateful.
> >>>>>
> >>>>> _______________________________________________
> >>>>> OAuth mailing list
> >>>>> OAuth@ietf.org
> >>>>> https://www.ietf.org/mailman/listinfo/oauth
> >>>>>
> >>>>
> >>>>
> >>>>
> >>>> --
> >>>> Bill Burke
> >>>> Red Hat
> >>>>
> >>>> _______________________________________________
> >>>> OAuth mailing list
> >>>> OAuth@ietf.org
> >>>> https://www.ietf.org/mailman/listinfo/oauth
> >>>
> >>> _______________________________________________
> >>> OAuth mailing list
> >>> OAuth@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/oauth
> >>
> >>
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
> >>
> >>
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
> >>
> >>
> >>
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
> >>
> >
> >
> >
> > --
> > Bill Burke
> > Red Hat
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to