Skip to content

Security considerations when jumping from desktop RP to mobile wallet #3

@jmandel

Description

@jmandel

Apologies if there has already been discussion on this point, but looking through the security considerations at

did-siop/docs/index.html

Lines 529 to 530 in 808daa3

<section class="informative">
<h1>Security Considerations</h1>
I don't see notes specific to the workflow where an RP interaction begins on desktop, and moves over to a SIOP-enabled digital wallet on mobile (e.g, when the user scans a QR code displayed on the desktop screen). When this redirect happens, my understanding is that the following "callback" step of the protocol:

image

... means a callback from the SIOP-enabled digital wallet to a URL in the RP -- but in a different user agent session than the one that kicked off the request. (In other words, the kick-off happened in a desktop user agent session, and the redirect happens on mobile.) In this case, isn't there potential for a session fixation attack? For instance, an attacker could trick a victim into authenticating for the attacker's session (and all the victim sees is "Please sign in to [service you trust and use]", which could be well-timed to avoid suspicion). At that point, the nonce in the SIOP response id_token would tie back to the attacker's session.

It's entirely possible I'm missing something already in the spec that would mitigate this concern! I'd appreciate any advice.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions