Skip to content

Make RFC 9207 issuer validation (OAuth mixup attack prevention) mandatory #1721

@will-bartlett

Description

@will-bartlett

The "OAuth Mixup Attack" is described in RFC 9207. Briefly, an OAuth client which connects to multiple OAuth provider (e.g. indicated by multiple MCP Servers) can become confused about which response comes from which OAuth provider, and thereby send an access token from one OAuth provider to another. RFC 9207 mitigates this attack by introducing an issuer ("iss") response parameter alongside OAuth responses to enable clients to prevent such mixups. OAuth 2.1 incorporates RFC 9207 as optional.

Ask: make the OAuth mixup mitigation mandatory in the MCP Specification.

Rationale: Most MCP clients will permit connecting to multiple MCP servers, with multiple OAuth providers. Popular in-market MCP clients make no attempt to require MCP servers to use a single OAuth provider. The use of multiple OAuth providers is uncommon in the wider OAuth ecosystem (which perhaps justifies the optional support in OAuth 2.1). However, the use of multiple OAuth providers is extremely common in the MCP subset of the OAuth ecosystem. This MCP, should make mitigating attacks against OAuth clients that use multiple OAuth providers mandatory.

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions