Re: [OAUTH-WG] Session cookies in OAuth2 flow
Andrei Shakirin <ashakirin@talend.com> Fri, 25 April 2014 07:08 UTC
Return-Path: <ashakirin@talend.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 11A051A00E3 for <oauth@ietfa.amsl.com>; Fri, 25 Apr 2014 00:08:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.554
X-Spam-Level:
X-Spam-Status: No, score=0.554 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FRT_ADOBE2=2.455, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3SZXz64XVvbP for <oauth@ietfa.amsl.com>; Fri, 25 Apr 2014 00:08:17 -0700 (PDT)
Received: from mxout.myoutlookonline.com (mxout.myoutlookonline.com [74.201.97.201]) by ietfa.amsl.com (Postfix) with ESMTP id 934A71A0127 for <oauth@ietf.org>; Fri, 25 Apr 2014 00:08:17 -0700 (PDT)
Received: from mxout.myoutlookonline.com (localhost [127.0.0.1]) by mxout.myoutlookonline.com (Postfix) with ESMTP id F13BD554824; Fri, 25 Apr 2014 03:08:11 -0400 (EDT)
X-Virus-Scanned: by SpamTitan at mail.lan
Received: from S10HUB001.SH10.lan (unknown [10.110.2.1]) by mxout.myoutlookonline.com (Postfix) with ESMTP id 4600955368A; Fri, 25 Apr 2014 03:08:11 -0400 (EDT)
Received: from S10BE002.SH10.lan ([::1]) by S10HUB001.SH10.lan ([::1]) with mapi id 14.01.0438.000; Fri, 25 Apr 2014 03:08:10 -0400
From: Andrei Shakirin <ashakirin@talend.com>
To: "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] Session cookies in OAuth2 flow
Thread-Index: Ac9f1m601wyijPx7QUKZAdgpumsSswAfcZMAAAAQz7A=
Date: Fri, 25 Apr 2014 07:08:10 +0000
Message-ID: <D225CD69196F3F4A9F4174B2FCA06F8811EC81D7@S10BE002.SH10.lan>
References: <D225CD69196F3F4A9F4174B2FCA06F8811EC7E92@S10BE002.SH10.lan> <8CE5B8B4-5CFB-4E1C-B1EC-06D2F0217ED8@adobe.com>
In-Reply-To: <8CE5B8B4-5CFB-4E1C-B1EC-06D2F0217ED8@adobe.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [95.91.233.170]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/oauth/5v78Ea_XdywqJWe4YFUZd7tibVQ
Subject: Re: [OAUTH-WG] Session cookies in OAuth2 flow
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Apr 2014 07:08:19 -0000
Hi Antonio, Thanks for your quick answer. Important for me is that OAuth2 doesn't force to store client or user-agent states in the authorization server, so authorization server can be stateless and is not obligated to introduce the sessions at all. Regards, Andrei. > -----Original Message----- > From: Antonio Sanso [mailto:asanso@adobe.com] > Sent: Freitag, 25. April 2014 09:02 > To: Andrei Shakirin > Cc: oauth@ietf.org > Subject: Re: [OAUTH-WG] Session cookies in OAuth2 flow > > hi Andrei, > > AFAIU session cookie management is beyond the scope of the OAuth2 > specification. > > regards > > antonio > > On Apr 24, 2014, at 6:39 PM, Andrei Shakirin <ashakirin@talend.com> wrote: > > > Hi, > > > > My name is Andrei Shakirin, I am working with OAuth2 implementation in > Apache CXF project. > > Could you please help me to verify my understanding regarding of using > session cookies in OAuth2 flow. > > OAuth2 specification mentions session cookies in: > > 1) Section 3.1. Authorization Endpoint as possible way to authenticate > resource owner against authorization server > > 2) Section 10.12. Cross-Site Request Forgery as possible attack where end- > user follows a malicious URI to a trusting server including a valid session cookie > > > > My current understanding is: > > a) using sessions between user-agent and authorization server is optional and > authorization server is not obligated to keep user state (in case if user-agent > provide authentication information with every request). > > b) in case if sessions are used (because of any reasons), authorization server > have to care about additional protection like hidden form fields in order to > uniquely identify the actual authorization request. > > > > Is this correct? > > > > Regards, > > Andrei. > > > > _______________________________________________ > > OAuth mailing list > > OAuth@ietf.org > > https://www.ietf.org/mailman/listinfo/oauth
- [OAUTH-WG] Session cookies in OAuth2 flow Andrei Shakirin
- Re: [OAUTH-WG] Session cookies in OAuth2 flow Antonio Sanso
- Re: [OAUTH-WG] Session cookies in OAuth2 flow Andrei Shakirin
- Re: [OAUTH-WG] Session cookies in OAuth2 flow John Bradley
- Re: [OAUTH-WG] Session cookies in OAuth2 flow Andrei Shakirin
- Re: [OAUTH-WG] Session cookies in OAuth2 flow John Bradley
- Re: [OAUTH-WG] Session cookies in OAuth2 flow Andrei Shakirin