Hi Rifaat,
Am 14.02.22 um 22:26 schrieb Rifaat Shekh-Yusef:
As part of the preparation for the shepherd write-up, I reviewed the
document and have the following comments:
https://www.ietf.org/archive/id/draft-ietf-oauth-security-topics-19.html
<https://www.ietf.org/archive/id/draft-ietf-oauth-security-topics-19.html>
General comment
The document refers to a number of drafts that are not active anymore,
e.g., token binding, pop key distribution, signing http requests, etc.
What is the reason behind including these in this document?
The reason is to provide a general idea of other approaches that have
been conceived and to discuss various approaches to specific problems.
It may be helpful to the reader to see that sometimes, a certain
solution has been discussed already, even when it was not pursued further.
Section 4.5.4
I am not clear on how the attacker can do that. Let’s take the
code_challenge example. Wouldn’t the AS be able to detect this attack
because it gets the *code verifier* associated with the *original code
challenge* from the Client?
Yes, but this can be circumvented if the attacker can modify the
authorization request from the client to the AS before it reaches the
AS. In this case, the attacker can define the code_challenge in the
request such that it works with the code_verifier that will be sent
later on.
Nits
Section 2.1, 3rd paragraph, 3rd sentence: “MAY rely the” to “, MAY
rely on the”
Section 2.3, second paragraph: replace ietf-oauth-resource-indicators
with RFC8707
Section 4.1.3. Last paragraph: replace the jwsreq and PAR draft
references with rfc9101 and rfc9126 respectively.
Who might want to sweep through the document and update the various
references, as there seem to be too many old references
Thanks, we will fix this for the next revision and update the references.
-Daniel
_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth