-
Notifications
You must be signed in to change notification settings - Fork 13
Description
Apologies if there has already been discussion on this point, but looking through the security considerations at
Lines 529 to 530 in 808daa3
| <section class="informative"> | |
| <h1>Security Considerations</h1> |
... means a callback from the SIOP-enabled digital wallet to a URL in the RP -- but in a different user agent session than the one that kicked off the request. (In other words, the kick-off happened in a desktop user agent session, and the redirect happens on mobile.) In this case, isn't there potential for a session fixation attack? For instance, an attacker could trick a victim into authenticating for the attacker's session (and all the victim sees is "Please sign in to [service you trust and use]", which could be well-timed to avoid suspicion). At that point, the nonce in the SIOP response id_token would tie back to the attacker's session.
It's entirely possible I'm missing something already in the spec that would mitigate this concern! I'd appreciate any advice.
