Re: [OAUTH-WG] URGENT: WPAD attack exposes URL contents even overHTTPS

2016-07-26 Thread tors...@lodderstedt.net
+1 I also think PKCE is currently the simplest way to protect OAuth clients from injection. Sent by MailWise – See your emails as clean, short chats. Originalnachricht Betreff: Re: [OAUTH-WG] URGENT: WPAD attack exposes URL contents even overHTTPS Von: William Denniss An:

Re: [OAUTH-WG] State Leakage Attack

2016-04-24 Thread tors...@lodderstedt.net
lue, and b) the >client didn't invalidate the value after first use in step 1. > > >> Am 23.04.2016 um 15:53 schrieb Thomas Broyer: >> >> >> >> On Sat, Apr 23, 2016 at 12:57 PM Torsten Lodderstedt < >> tors...@lodderstedt.net> wrote: >> &

Re: [OAUTH-WG] State Leakage Attack

2016-04-22 Thread tors...@lodderstedt.net
Hi Daniel, how is the attackers supposed to utilise the leaked state value? I would assume the legit client binds it to a certain user agent, e.g. via the session context, which is not available to the attacker. best regards, Torsten. Originalnachricht Betreff: Re: [OAUTH-WG]

Re: [OAUTH-WG] Meeting Minutes

2016-04-19 Thread tors...@lodderstedt.net
Different people, different perceptions :-) But anyway, the discussion on the list has already started, right? Originalnachricht Betreff: Re: [OAUTH-WG] Meeting Minutes Von: Hannes Tschofenig An: Brian Campbell ,Torsten Lodderstedt Cc: oauth@ietf.org >Hi Torsten, > >On 04/19

Re: [OAUTH-WG] OAuth 2.1

2016-04-07 Thread tors...@lodderstedt.net
And what about code injection and open redirectors? I think we already have a lot of deployment experience that should be used to evolve the spec. Sent by MailWise – See your emails as clean, short chats. Originalnachricht Betreff: Re: [OAUTH-WG] OAuth 2.1 Von: "Phil Hunt (IDM)

Re: [OAUTH-WG] Fwd: New Version Notification for draft-campbell-oauth-resource-indicators-01.txt

2016-04-05 Thread tors...@lodderstedt.net
Hi Brian, I assume resource server ids or URIs to be a names namespace for scope values or that scope values are be bound to certain resource servers. It seems you have less coupling in mind? Best regards, Torsten. Sent by MailWise – See your emails as clean, short chats. Originalnac

Re: [OAUTH-WG] OAuth 2.0 Discovery Location

2016-02-27 Thread tors...@lodderstedt.net
+1 Sent by MailWise – See your emails as clean, short chats. Originalnachricht Betreff: Re: [OAUTH-WG] OAuth 2.0 Discovery Location Von: Justin Richer An: George Fletcher Cc: "" >+1 for “OAuth 2.0 Authorization Server Discovery” > > — Justin > >> On Feb 25, 2016, at 2:20 PM,

Re: [OAUTH-WG] Authentication Method Reference Values: Call for Adoption Finalized

2016-02-14 Thread tors...@lodderstedt.net
Cc: <mailto:oauth@ietf.org> >> Subject: Re: [OAUTH-WG] Authentication Method Reference Values: >> Call for Adoption Finalized >> >> Can we just do that, then? Seems to be the easiest way to address >> various needs and concerns. >> >> —

Re: [OAUTH-WG] Authentication Method Reference Values: Call for Adoption Finalized

2016-02-13 Thread tors...@lodderstedt.net
even for values >first defined in non-RFC specifications. This specification is one example of >doing this. > > -- Mike > >From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of >tors...@lodderstedt.net >Sent: Satur

Re: [OAUTH-WG] Authentication Method Reference Values: Call for Adoption Finalized

2016-02-13 Thread tors...@lodderstedt.net
ethod Reference Values: Call for Adoption Finalized Von: John Bradley An: tors...@lodderstedt.net Cc: roland.hedb...@umu.se,oauth@ietf.org >This is not a issue between oauth and OIDC. > >This has to do with the registry for JWT being in OAuth. Many protocols that >use JWT are going to

Re: [OAUTH-WG] Authentication Method Reference Values: Call for Adoption Finalized

2016-02-13 Thread tors...@lodderstedt.net
I basically support adoption of this document. Asserting authentication methods in access tokens (in this case in JWTS format) is reasonable. We use it to pass information about the authentication performed prior issuing an access token to the _resource_ server. What worries me is the back and