* I spoke with Hannes after the IETF meeting in Prague and he expressed the 
need to enhance our formal analysis (as presented at the OAuth Security 
Workshop) to verify whether it is necessary to demonstrate possession of the 
private key by the client to the authorization server.


* The analysis checked whether it was necessary for a proof of possession to be 
performed between the client and AS to ensure security. The result was that 
even without verification by the AS the client would not be able to access the 
resource from the RS without possessing the secret key associated to the token 
(assuming the check is done correctly by the RS).

Tamarin model for specific example with proofs available at : 
https://github.com/Yiergot/ACE-OAuth-FormalModel


IMPORTANT NOTICE: The contents of this email and any attachments are 
confidential and may also be privileged. If you are not the intended recipient, 
please notify the sender immediately and do not disclose the contents to any 
other person, use it for any purpose, or store or copy the information in any 
medium. Thank you.
_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to