Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DPoP #32

Closed
criztovyl opened this issue Feb 14, 2024 · 2 comments
Closed

DPoP #32

criztovyl opened this issue Feb 14, 2024 · 2 comments

Comments

@criztovyl
Copy link

The application can use DPoP to ensure its access tokens are bound to non-exportable key linked to the browser.

this reads strange, not sure, but is there an "a" or "s" missing?

[...] bound to a non-exportable key linked to the browser.

[...] bound to non-exportable keys linked to the browser.

The application can use DPoP to ensure its access tokens are bound to non-exportable key held by the browser. In that case, it becomes significantly harder for the attacker to abuse stolen access tokens. More specifically, with DPoP, the attacker can only abuse stolen application tokens by carrying out an online attack, where the proofs are calculated in the user's browser. This attack is described in detail in section 11.4 of the {{DPoP}} specification. Additionally, when the attacker obtains a fresh set of tokens, as described in {{payload-new-flow}}, they can set up DPoP for these tokens using an attacker-controlled key pair. In that case, the attacker is again free to abuse this newly obtained access token without restrictions.

@aaronpk
Copy link
Member

aaronpk commented Feb 17, 2024

Good catch, thanks

@aaronpk
Copy link
Member

aaronpk commented Feb 17, 2024

Fixed in c593337

@aaronpk aaronpk closed this as completed Feb 17, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants