Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-28 Thread Yannick Majoros
https://datatracker.ietf.org/doc/html/draft-ietf-oauth-browser-based-apps#name-reducing-the-impact-of-toke > > Aaron > > > On Mon, Aug 28, 2023 at 8:51 AM Yannick Majoros wrote: > >> An XSS compromise would allow an attacker to call the resource server >> from

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-28 Thread Yannick Majoros
t; attacker’s authorization code is being returned. >> >> >> But don't trust me on my words: what about demonstrating our claims with >> actual code, and as such create a shorter, simpler, but more constructive >> discussion? >> >> >> I don’t underst

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-28 Thread Yannick Majoros
gt;> This obviously doesn't apply to everyone, but it's still common enough to >> be significant. This is briefly mentioned in the security considerations >> already: >> https://datatracker.ietf.org/doc/html/draft-ietf-oauth-browser-based-apps#name-reducing-the-i

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-28 Thread Yannick Majoros
; attacker to access far more data than the browser app alone, and for a > longer period of time. > > The difference between these threats is extremely significant. > > Aaron > > On Mon, Aug 28, 2023 at 8:14 AM Yannick Majoros wrote: > >> My last comment was rather ironi

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-28 Thread Yannick Majoros
ll of this is quite inconvenient, especially if one is > heavily invested in running browser-only OAuth clients. Unfortunately, it > is the nature of web-based applications, and doing so requires a complete > picture of the security implications. That’s exactly what we are working on > with the specification. > > > Kind regards > > Philippe > > > — > *Pragmatic Web Security* > *Security for developers* > https://pragmaticwebsecurity.com/ > ___ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth > > -- Yannick Majoros Valuya sprl ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-28 Thread Yannick Majoros
; worker. > > > Once again, I refer back to the start of my mail: *it is not about > protecting existing tokens (scenario 1)**, *it is all about preventing > the attacker from running a new flow (Scenario 2). > > > I understand that all of this is quite inconvenient, especially

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-28 Thread Yannick Majoros
f >security measures based on a risk assessment. In some cases their >conclusion might be that a browser based app is not secure enough for > their responsibilities. > > > S > > søn. 27. aug. 2023 kl. 18:41 skrev Yannick Majoros : > >> Yes, but this is

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-27 Thread Yannick Majoros
t code running unaltered. ..tom > > > On Sun, Aug 27, 2023 at 5:25 AM Yannick Majoros wrote: > >> Thanks for taking the time to respond and for the constructive feedback. >> >> Still, there is some initial incorrect point that makes the rest of the >>

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-27 Thread Yannick Majoros
iframe src points to the authorize endpoint >- The AS redirects the frame to the application’s callback with the >authorization code as a query parameter >- The attacker can monitor the iframe for a URL that contains the >authorization code, stop the frame from loadi

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-25 Thread Yannick Majoros
Hi everyone, The document is about "OAuth 2.0 for Browser-Based Apps". Its abstract further explains that it "details the security considerations and best practices that must be taken into account when developing browser-based applications that use OAuth 2.0.". As such, detailing security conside

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-13 Thread Yannick Majoros
using-service-worker-as-an-auth-relay-5abc402878dd >> >> > The tokens are obtained from the main application. I quote: > *getAuthTokenHeader > method will communicate with js executed in a page to get current token * > > https://about.grabyo.com/service-workers-jwt-tokens/ >> >> > No mention of how tokens end up in the worker. > > ___ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth > -- Yannick Majoros Valuya sprl ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] redirect uri and portals

2023-03-07 Thread Yannick Majoros
> > > Am 07.03.2023 um 14:25 schrieb Yannick Majoros: > > One possible solution: Store the redirect information in a signed JWT and > place the JWT in the state parameter. I don't think this is written > somewhere in the security BCP but I think this is a solutions used

Re: [OAUTH-WG] redirect uri and portals

2023-03-07 Thread Yannick Majoros
> of the legitimate site is shown. The user might not recognize the redirect > to a different domain and ends up using the phishing website of an attacker. > > > Best regards, > Karsten > > > On 06.03.2023 23:34, Yannick Majoros wrote: > > Hi Rodrigo, > &g

Re: [OAUTH-WG] redirect uri and portals

2023-03-06 Thread Yannick Majoros
read entire document, but, especially, about your > questions, you may understand the threats about wildcards URL validation in > section 4.1.1. > > This document also addresses some state threats and best practices. > > Rodrigo Speller > > > Em seg., 6 de mar. de 2023

Re: [OAUTH-WG] redirect uri and portals

2023-03-06 Thread Yannick Majoros
er open redirector to accomplish an account > takeover. It's worth reading the writeup if you're curious about the > implications of wildcard redirects within and outside of OAuth. > > > https://salt.security/blog/traveling-with-oauth-account-takeover-on-booking-com > > Aaron &

Re: [OAUTH-WG] redirect uri and portals

2023-03-06 Thread Yannick Majoros
V. > > On Mon, Mar 6, 2023 at 09:12 Yannick Majoros wrote: > >> *This message originated outside your organization.* >> >> -- >> >> Hello, >> >> From my understanding, OAuth 2 as well as 2.1 do not allow for wildcards >&g

[OAUTH-WG] redirect uri and portals

2023-03-06 Thread Yannick Majoros
l restrict reuse of the authorization code anyway What are your thoughts on how to implement that quite common feature? Best regards, -- Yannick Majoros Valuya sprl ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] WebApp BCP thoughts

2022-09-23 Thread Yannick Majoros
Hello Dominick and everyone, I contributed to the latest drafts. I do share some concerns about the organization of the document, which can be improved. OTOH, some care has been put in the latest drafts about consistency (naming patterns and parts of systems in a similar way through all parts of t

Re: [OAUTH-WG] questions around OAuth 2.0 for Browser-Based Apps

2022-06-16 Thread Yannick Majoros
py to set up some time to talk offline about how to make > that happen. > > Aaron > > > On Wed, Jun 15, 2022 at 4:08 AM Yannick Majoros wrote: > >> Hello, >> >> >>Best practices according to whom? >> >> >This list, and documents such as:

Re: [OAUTH-WG] questions around OAuth 2.0 for Browser-Based Apps

2022-06-15 Thread Yannick Majoros
ation? Would it be useful to list and detail some attacks that are not documented in the *OAuth 2.0 Security Best Current Practice* document? Would submitting a new draft for frontends be a good idea? Best regards, Yannick Majoros Le mer. 15 juin 2022 à 04:11, Dick Hardt a écrit : > > > B

Re: [OAUTH-WG] questions around OAuth 2.0 for Browser-Based Apps

2022-06-14 Thread Yannick Majoros
f a follow-up or addendum to rfc-6749? Thanks, Yannick Le sam. 11 juin 2022 à 20:55, Yannick Majoros a écrit : > >> There is a lot of debate around the question. Are these really security > best practices? > >The intent of this draft is to document the best practices today. If

Re: [OAUTH-WG] questions around OAuth 2.0 for Browser-Based Apps

2022-06-11 Thread Yannick Majoros
> The assumption is that you would also protect against CSRF attacks > like any typical web application. > > > What if the backend is stateless and so doesn't have any session > > You would need to use an encrypted session cookie to avoid storing > server-side state, b

[OAUTH-WG] questions around OAuth 2.0 for Browser-Based Apps

2022-06-10 Thread Yannick Majoros
raf)? Best regards. Yannick Majoros Valuya sprl ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth