Re: [OAUTH-WG] [EXTERNAL] Re: OAuth Redirection Attacks

2021-12-21 Thread Will Bartlett
k at scale (i.e. for broad rather than targeted attacks), but domains are cheap. I'd rather see standards try to fix this, than patch it with phishing filters. Thanks, Will From: OAuth On Behalf Of Brian Campbell Sent: Friday, December 17, 2021 1:44 PM To: Hans Zandbelt Cc: oauth Subject: Re: [

Re: [OAUTH-WG] [EXTERNAL] Re: OAuth Redirection Attacks

2021-12-19 Thread Torsten Lodderstedt
I think there are two options: 1) validation of the organization/person behind a certain client in order to be able to go after them in case of abuse 2) don’t redirect in an error condition However, even a successful OAuth process can result in a phishing attack. So I don‘t think (2) will help

Re: [OAUTH-WG] [EXTERNAL] Re: OAuth Redirection Attacks

2021-12-18 Thread Phillip Hunt
Agreed. Most of dyn reg cases we were thinking about occurred because there was a need to register each copy of the same client software. The software statement was intended to allow the registration endpoint recognize software and to fix things like endpoints. Automatic registration of

Re: [OAUTH-WG] [EXTERNAL] Re: OAuth Redirection Attacks

2021-12-18 Thread Warren Parad
I also 100% with the recommendation for phishing detectors treat all perceived OAuth links as malicious in emails. It actually isn't hard to know that there is a link embedded in a url query parameter. So I would just take the next step of treating all urls with urls as query parameters as

Re: [OAUTH-WG] [EXTERNAL] Re: OAuth Redirection Attacks

2021-12-18 Thread George Fletcher
Given the attack is based on a successfully registered callback URL that is malicious, we can also look to the Authorization Server to run more checks on the registered callback URLs (e.g. check against the "unsafe" URL list). Not a 100% solution by any means but could help with reduce the

Re: [OAUTH-WG] [EXTERNAL] Re: OAuth Redirection Attacks

2021-12-17 Thread David Waite
> On Dec 17, 2021, at 2:44 PM, Brian Campbell > wrote: > > Relax how aggressively OAuth demands that the AS automatically redirect in > error conditions. And either respond with a 400 directly (which just stops > things at that point) or provide a meaningful interstitial page to the user

Re: [OAUTH-WG] [EXTERNAL] Re: OAuth Redirection Attacks

2021-12-17 Thread Nov Matake
Phishing filters can simply handle all OAuth AuthZ request like URLs in emails malicious. > 2021/12/18 6:45、Brian Campbell > のメール: > >  > Yeah, I think it has been discussed before. And if I'm understanding > correctly, it is unfortunately a tricky area. It sounds like more or less the >

Re: [OAUTH-WG] [EXTERNAL] Re: OAuth Redirection Attacks

2021-12-17 Thread Brian Campbell
Yeah, I think it has been discussed before. And if I'm understanding correctly, it is unfortunately a tricky area. It sounds like more or less the same thing as "Abuse: The Authorization Server As Open Redirector"

Re: [OAUTH-WG] [EXTERNAL] Re: OAuth Redirection Attacks

2021-12-17 Thread Hans Zandbelt
AFAIK this topic has been discussed before, e.g.: https://mailarchive.ietf.org/arch/msg/oauth/gIuIrxeXudRBg8L6RYGDElxrc4s/ Hans. On Fri, Dec 17, 2021 at 9:44 PM Pieter Kasselman wrote: > The problem isn’t invalid URLs but malicious ones. Given a choice between > a sub-optimal user experience

Re: [OAUTH-WG] [EXTERNAL] Re: OAuth Redirection Attacks

2021-12-17 Thread Pieter Kasselman
The problem isn't invalid URLs but malicious ones. Given a choice between a sub-optimal user experience and a phished end-user, perhaps an option that allows the authorization server to handle the error, rather than redirecting can serve end-users better. But as Vittorio points, out, there are

Re: [OAUTH-WG] [EXTERNAL] Re: OAuth Redirection Attacks

2021-12-17 Thread Warren Parad
You want to redirect on some errors because the last thing an AS wants is to leave the user in the AS because the user can't do anything there and the AS can't do anything either. It's just bad UX. But if the redirect url isn't valid, this is absolutely the time that the AS should keep the user

Re: [OAUTH-WG] [EXTERNAL] Re: OAuth Redirection Attacks

2021-12-17 Thread Pieter Kasselman
Agreed that the attackers goal is to bypass phishing filters and they found a way to achieve this by using an IdP that adheres to the standards. I don't have the context for the design choice to redirect on an error condition, but am curious why the IdP should not be allowed to handle the error