On 29/12/2014 20:13, Rémy Hubscher wrote:
    What I understood is that the public key is send only on the
    /authorization endpoint and kept for use on the /token

The spec returns the keys that was sent to /authorization.  If we're
tunneling them through, but we can't rely on them, why tunnel them at all?

I didn't get that. What cannot we rely on and what do you want to tunnel?

In the FxA database they are kA and wrap-kB that we derive to get
encrypted((kAr,kBr), DH(transactionPublicKey, tempPrivateKey)) that we
get back on /token with tempPublicKey.
And transactionPublicKey is sent on /authorization

My question is how do we makes sure that the server doesn't store/log
kAr and kBr before encryption?

Which server are you referring to here?

No server should be receiving plaintext kAr and kBr in the proposed flow. They are encrypted by client-side javascript from the content server, and received in this encrypted form by the relier, who can choose where and how to decrypt them.



  Ryan
_______________________________________________
Dev-fxacct mailing list
[email protected]
https://mail.mozilla.org/listinfo/dev-fxacct

Reply via email to