Re: [OAUTH-WG] Confusion on Implicit Grant flow

2015-02-10 Thread Sergey Beryozkin
Hi John On 09/02/15 22:59, John Bradley wrote: The security problem was people only doing host name matching on redirect_uri and attackers finding redirectors to use. That impacted all public clients not just implicit. Implicit took most of the heat because that was what Facebook was using, a

Re: [OAUTH-WG] Confusion on Implicit Grant flow

2015-02-10 Thread Brian Campbell
On Mon, Feb 9, 2015 at 3:59 PM, John Bradley wrote: > Connect has a response_mode that allows the response to be form encoded > rather than fragment. > I read RFC 5849 as only allowing code to be query encoded. The > response_mode was intended for the new response types we defined in > http://o

Re: [OAUTH-WG] Confusion on Implicit Grant flow

2015-02-10 Thread John Bradley
The issue is maintaining key material in the browser. Web Crypto will help with that , but is not deployed widely in browsers at the moment. Thinking about it a bit someone could make a more secure flow for JS clients using code and some Connect extensions now. If I were concerned about loggin

Re: [OAUTH-WG] Confusion on Implicit Grant flow

2015-02-10 Thread Bill Burke
On 2/10/2015 7:06 AM, Brian Campbell wrote: On Mon, Feb 9, 2015 at 3:59 PM, John Bradley mailto:ve7...@ve7jtb.com>> wrote: Connect has a response_mode that allows the response to be form encoded rather than fragment. I read RFC 5849 as only allowing code to be query encoded. Th

Re: [OAUTH-WG] Confusion on Implicit Grant flow

2015-02-10 Thread John Bradley
The code and implicit response_type are defined in RFC 6749. https://tools.ietf.org/html/rfc6749#section-4.1.2 https://tools.ietf.org/html/rfc6749#section-4.2.2 It describes one way to encode the response in each case with no mention of that being extended. In the text there is no normative M

Re: [OAUTH-WG] Confusion on Implicit Grant flow

2015-02-10 Thread Bill Burke
On 2/10/2015 8:15 AM, John Bradley wrote: The issue is maintaining key material in the browser. Web Crypto will help with that , but is not deployed widely in browsers at the moment. Thinking about it a bit someone could make a more secure flow for JS clients using code and some Connect ext

Re: [OAUTH-WG] Confusion on Implicit Grant flow

2015-02-10 Thread John Bradley
The nonce allows the client to insert a unique value into the id_token to associate it with a particular browser session(Think SAML RequstID). That is useful for web server based clients. It may or may not be useful in the JS case, as the client is the browser. While code can only be used o

Re: [OAUTH-WG] Confusion on Implicit Grant flow

2015-02-10 Thread Adam Lewis
Hi John, What do you mean by the app that is "already loaded and cached in the browser?" Where did this app come from initially? Is this what comes from the web-hosted client resource in step D/E of section 4.2? So the first time D/E *will* flow over the wire, and in all subsequent requests

[OAUTH-WG] code flow for browsers?

2015-02-10 Thread Bill Mills
Does https://tools.ietf.org/html/draft-ietf-oauth-spop-10 provide a way for us to replace the implicit flow with the code+proof key model?  Yes, Implicit saves a round trip.  This does deal nicely with some of the security concerns raised recently around how fragments are handled in the browser.

Re: [OAUTH-WG] Confusion on Implicit Grant flow

2015-02-10 Thread John Bradley
Inline > On Feb 10, 2015, at 1:12 PM, Adam Lewis > wrote: > > Hi John, > > What do you mean by the app that is “already loaded and cached in the > browser?” Where did this app come from initially? Is this what comes from > the web-hosted client resource in step D/E of section 4.2? So the

Re: [OAUTH-WG] Confusion on Implicit Grant flow

2015-02-10 Thread Prateek Mishra
We use a simpler flow that isn't as open-ended as the implicit flow. The JS client uses a XMLHttpRequest call to exchange the browser cookie for an access token to the desired resource (this can be modeled via the Assertion Framework specification, with the cookie acting as the authorization gr