Skip to content

Commit 6f1a4e7

Browse files
authored
Merge pull request #91 from oauthstuff/danielfett/mikes-feedback
Incorporate SECDIR feedback
2 parents 30b8524 + 323c463 commit 6f1a4e7

File tree

7 files changed

+98
-119
lines changed

7 files changed

+98
-119
lines changed

A01_introduction.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,8 @@ challenges can be observed:
2222
creating new challenges with respect to security. Those challenges go beyond
2323
the original scope of [@!RFC6749], [@!RFC6750], and [@!RFC6819].
2424

25-
OAuth initially assumed static relationships between client,
26-
authorization server, and resource servers. The URLs of the servers were
25+
OAuth initially assumed static relationships between clients,
26+
authorization servers, and resource servers. The URLs of the servers were
2727
known to the client at deployment time and built an anchor for the
2828
trust relationships among those parties. The validation of whether the
2929
client is talking to a legitimate server was based on TLS server
@@ -56,8 +56,8 @@ compatible with the new requirements and following the best practices described
5656
this document may break interoperability. Nonetheless, it is RECOMMENDED that
5757
implementers upgrade their implementations and ecosystems as soon as feasible.
5858

59-
OAuth 2.1, under developement as [@I-D.ietf-oauth-v2-1], will incorporate the
60-
security recommendations of this document.
59+
OAuth 2.1, under developement as [@I-D.ietf-oauth-v2-1], will incorporate
60+
security recommendations from this document.
6161

6262
## Structure
6363

A02_recommendations.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
# Best Practices {#recommendations}
22

33
This section describes the core set of security mechanisms and measures the
4-
OAuth working group considers best practices at the time of writing. Details
4+
OAuth working group considers to be best practices at the time of writing. Details
55
about these security mechanisms and measures (including detailed attack
66
descriptions) and requirements for less commonly used options are provided in
77
(#attacks_and_mitigations).
@@ -10,13 +10,13 @@ descriptions) and requirements for less commonly used options are provided in
1010

1111
When comparing client redirect URIs against pre-registered URIs, authorization
1212
servers MUST utilize exact string matching except for port numbers in
13-
`localhost` redirection URIs of native apps, see (#iuv_countermeasures). This
13+
`localhost` redirection URIs of native apps (see #iuv_countermeasures). This
1414
measure contributes to the prevention of leakage of authorization codes and
1515
access tokens (see (#insufficient_uri_validation)). It can also help to detect
1616
mix-up attacks (see (#mix_up)).
1717

1818
Clients and authorization servers MUST NOT expose URLs that forward the user's browser to
19-
arbitrary URIs obtained from a query parameter (open redirector) as
19+
arbitrary URIs obtained from a query parameter (open redirectors) as
2020
described in (#open_redirection). Open redirectors can enable
2121
exfiltration of authorization codes and access tokens.
2222

@@ -122,10 +122,10 @@ access tokens in the authorization response, unless access token injection
122122
in the authorization response is prevented and the aforementioned token leakage
123123
vectors are mitigated.
124124

125-
Clients SHOULD instead use the response type "code" (aka authorization
125+
Clients SHOULD instead use the response type `code` (i.e., authorization
126126
code grant type) as specified in (#ac) or any other response type that
127127
causes the authorization server to issue access tokens in the token
128-
response, such as the "code id\_token" response type. This allows the
128+
response, such as the `code id_token` response type. This allows the
129129
authorization server to detect replay attempts by attackers and
130130
generally reduces the attack surface since access tokens are not
131131
exposed in URLs. It also allows the authorization server to
@@ -251,5 +251,5 @@ To support browser-based clients, endpoints directly accessed by such clients
251251
including the Token Endpoint, Authorization Server Metadata Endpoint, `jwks_uri`
252252
Endpoint, and the Dynamic Client Registration Endpoint MAY support the use of
253253
Cross-Origin Resource Sharing (CORS, [@WHATWG.CORS]). However, CORS MUST NOT be
254-
supported at the Authorization Endpoint as the client does not access this
255-
endpoint directly, instead, the client redirects the user agent to it.
254+
supported at the Authorization Endpoint, as the client does not access this
255+
endpoint directly; instead, the client redirects the user agent to it.

A03_security-model.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ include new types of attackers and to define the attacker model more clearly.
1010

1111
The goal of this document is to ensure that the authorization of a resource
1212
owner (with a user agent) at an authorization server and the subsequent usage of
13-
the access token at a resource server is protected, as good as practically
13+
the access token at a resource server is protected, as well as practically
1414
possible, at least against the following attackers:
1515

1616
* (A1) Web Attackers that can set up and operate an arbitrary number of
@@ -81,7 +81,7 @@ attackers are relevant in particular:
8181
example, a resource server can be compromised by an attacker, an
8282
access token may be sent to an attacker-controlled resource server
8383
due to a misconfiguration, or a resource owner is social-engineered into
84-
using an attacker-controlled resource server. See also (#comp_res_server).
84+
using an attacker-controlled resource server. Also see (#comp_res_server).
8585

8686
(A3), (A4) and (A5) typically occur together with either (A1) or (A2).
8787
Attackers can collaborate to reach a common goal.

0 commit comments

Comments
 (0)