Right, but PKCE doesn’t stop an attack when the malicious app initiates the 
authorization flow. 

> On 17 Mar 2021, at 08:04, SOMMER, DOMINIK <dominik.som...@milesandmore.com> 
> wrote:
> 
> 
> I’d throw in PKCE as a means of assuring that the client who made the user 
> follow the auth flow in the first place, is apparently the only one able to 
> “redeem” the auth code returned to the redirect_uri.
>  
>  
> Von: OAuth <oauth-boun...@ietf.org> Im Auftrag von Om
> Gesendet: Mittwoch, 17. März 2021 06:17
> An: Neil Madden <neil.mad...@forgerock.com>
> Cc: Vittorio Bertocci <vittorio.bertocci=40auth0....@dmarc.ietf.org>; oauth 
> <oauth@ietf.org>; Warren Parad <wparad=40rhosys...@dmarc.ietf.org>
> Betreff: Re: [OAUTH-WG] Security of OAuth on Andriod [Was: Re: Token 
> Mediating and session Information Backend For Frontend (TMI BFF)]
>  
> If I read this correctly, 
> https://tools.ietf.org/html/draft-ietf-oauth-v2-1-01#section-10 the 2.1 draft 
> already addresses this under best practices.
>  
> On Mon, Mar 15, 2021 at 3:31 PM Neil Madden <neil.mad...@forgerock.com> wrote:
> I want to come back to this topic as a new thread.
>  
> As I understand things, the difference on Android is that any app can claim 
> to be a generic web browser and so claim to handle all URIs. Whereas on iOS 
> only specifically vetted apps can claim to be web browsers. Is that correct?
>  
> If so, this does seem like a quite large hole in security of OAuth on 
> Android. Should we be considering a new draft recommending alternative 
> measures (such as attestation) on Android? Presumably the same issue is also 
> true on most desktop OS?
>  
> — Neil
> 
> 
> On 23 Feb 2021, at 15:20, George Fletcher <gffle...@aol.com> wrote:
>  
> Unfortunately, in the mobile app world this isn't sufficient. On iOS using 
> Universal Links will bind the https redirect_url to your app in a secure way 
> but it doesn't work the same way on Android with App Links. There is still a 
> problem with "mobile app impersonation". If you have an app that you want to 
> ensure is "your" app then the most secure way is to look at "app 
> attestation". This is however, way off topic for this thread :)
> 
> On 2/14/21 9:28 AM, Neil Madden wrote:
> Public clients are implicitly authenticated by their ownership of the 
> registered redirect_uri. This why it’s important to use a redirect_uri for 
> which ownership can be reasonably established, such as HTTPS endpoints with 
> exact URI matching. 
>  
> There are more things that can go wrong with that (see the security BCP), but 
> it can be made reasonably secure. 
>  
> — Neil
>  
> On 14 Feb 2021, at 13:48, Stoycho Sleptsov <stoycho.slept...@gmail.com> wrote:
>  
> 
> I would like to add my reasons about the "Why are developers creating BFF for 
> their frontends to communicate with an AS",
> with the objective to verify if they are valid.
>  
> I need the client app. to be authenticated at the AS (to determine if it is a 
> first-party app., for example).
> If we decide to implement our client as a frontend SPA , then we have no 
> other option except through a BFF, as PKCE does not help for authentication.
>  
> Or is it considered a bad practice to do that?
>  
> Regards,
> Stoycho.
> 
> Sitz der Gesellschaft / Corporate Headquarters: Miles & More GmbH, Frankfurt 
> am Main, Registereintragung / Registration: Amtsgericht Frankfurt am Main HRB 
> 116409
> Geschaeftsfuehrung / Management Board: Sebastian Riedle, Dr. Oliver Schmitt
> 
> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>  
>  
> 
> ForgeRock values your Privacy_______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> 
> 
> --
> - Regards,
> Omkar Khair
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

-- 
ForgeRock values your Privacy <https://www.forgerock.com/your-privacy>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to