-
Notifications
You must be signed in to change notification settings - Fork 1.4k
Make RFC 9207 issuer validation (OAuth mixup attack prevention) mandatory #1721
Description
The "OAuth Mixup Attack" is described in RFC 9207. Briefly, an OAuth client which connects to multiple OAuth provider (e.g. indicated by multiple MCP Servers) can become confused about which response comes from which OAuth provider, and thereby send an access token from one OAuth provider to another. RFC 9207 mitigates this attack by introducing an issuer ("iss") response parameter alongside OAuth responses to enable clients to prevent such mixups. OAuth 2.1 incorporates RFC 9207 as optional.
Ask: make the OAuth mixup mitigation mandatory in the MCP Specification.
Rationale: Most MCP clients will permit connecting to multiple MCP servers, with multiple OAuth providers. Popular in-market MCP clients make no attempt to require MCP servers to use a single OAuth provider. The use of multiple OAuth providers is uncommon in the wider OAuth ecosystem (which perhaps justifies the optional support in OAuth 2.1). However, the use of multiple OAuth providers is extremely common in the MCP subset of the OAuth ecosystem. This MCP, should make mitigating attacks against OAuth clients that use multiple OAuth providers mandatory.