Hi Rifaat,

Am 14.02.22 um 22:26 schrieb Rifaat Shekh-Yusef:

As part of the preparation for the shepherd write-up, I reviewed the document and have the following comments:

https://www.ietf.org/archive/id/draft-ietf-oauth-security-topics-19.html <https://www.ietf.org/archive/id/draft-ietf-oauth-security-topics-19.html>



General comment

The document refers to a number of drafts that are not active anymore, e.g., token binding, pop key distribution, signing http requests, etc.

What is the reason behind including these in this document?

The reason is to provide a general idea of other approaches that have been conceived and to discuss various approaches to specific problems. It may be helpful to the reader to see that sometimes, a certain solution has been discussed already, even when it was not pursued further.


Section 4.5.4

I am not clear on how the attacker can do that. Let’s take the code_challenge example. Wouldn’t the AS be able to detect this attack because it gets the *code verifier* associated with the *original code challenge* from the Client?

Yes, but this can be circumvented if the attacker can modify the authorization request from the client to the AS before it reaches the AS. In this case, the attacker can define the code_challenge in the request such that it works with the code_verifier that will be sent later on.


Nits

Section 2.1, 3rd paragraph, 3rd sentence: “MAY rely the” to “, MAY rely on the”

Section 2.3, second paragraph: replace ietf-oauth-resource-indicators with RFC8707

Section 4.1.3. Last paragraph: replace the jwsreq and PAR draft references with rfc9101 and rfc9126 respectively.


Who might want to sweep through the document and update the various references, as there seem to be too many old references

Thanks, we will fix this for the next revision and update the references.

-Daniel

_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to