-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
PKCE Chosen Challenge Attacks #41
Comments
basiert auf FAPI-Analyse der Uni Stuttgart - wird beim OSW noch mal diskutiert werden |
This can also be used against a confidential client and when JAR/JARM are used. There is currently no good defense if attacker A3 is active... |
The sequence diagram is very helpful! How is the code supposed to leak? |
See Attacker model A3: (A3) Attackers that can read, but not modify, the contents of the authorization response (i.e., the authorization response can leak to an attacker). |
Essentially you are saying client and do not fully implement the recommendations given in the BCP (redirect matching, AS binding, ...), right? What options for detection do we have? just the failed attempt to exchange the code? |
Something like that, or a leak on a proxy or in a mobile OS. Only good detection option I can come up with: The AS needs to decline Authz-Requests if they do not come from one of the clients URLs (by opportunistically checking Origin or Referer headers). This would, however, be a completely new concept. It would be similar to redirect URIs, including registering etc. |
I think refer headers are not a bad choice. Assuming the attacker does not control the victims device, they may at least function as a good hint that something is going wrong. |
Attacker chooses PKCE verifier and obtains code through leakage (referrer etc)
options:
The text was updated successfully, but these errors were encountered: