Skip to content

Commit 3efb187

Browse files
authored
Merge pull request #79 from oauth-wg/PieterKas-patch-25
Added distinction between "proximity enforced and proximity-less" (see issue #45 )
2 parents 239c3a3 + 97e72a1 commit 3efb187

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

draft-ietf-oauth-cross-device-security.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -477,7 +477,7 @@ A number of protocols that enable cross-device flows that are susceptible to Cro
477477
It is recommended that one or more of the mitigations are applied whenever implementing a cross-device flow. Every mitigation provides an additional layer of security that makes it harder to initiate the attack, disrupts attacks in progress or reduces the impact of a successful attack.
478478

479479
### Establish Proximity
480-
The unauthenticated channel between the Initiating Device and Authorization Device allows attackers to obtain a QR code or user code in one location and display in another location. Establishing proximity between the location of the Initiating Device and the Authorization Device limits an attacker's ability to launch attacks by sending the user or QR codes to large numbers of users across the globe. There are a couple of ways to establish proximity:
480+
The unauthenticated channel between the Initiating Device and Authorization Device allows attackers to obtain a QR code or user code in one location and display it in another location. Consequently, proximity-enforced cross-device flows are more resistant to Cross-Device Consent Phishing attacks than proximity-less cross-device flows. Establishing proximity between the location of the Initiating Device and the Authorization Device limits an attacker's ability to launch attacks by sending the user or QR codes to large numbers of users that are geographically distributed. There are a couple of ways to establish proximity:
481481

482482
- Physical connectivity: This is a good indicator of proximity, but requires specific ports, cables and hardware and may be challenging from a user experience perspective or may not be possible in certain settings (e.g., when USB ports are blocked or removed for security purposes). Physical connectivity may be better suited to dedicated hardware like FIDO devices that can be used with protocols that are resistant to the exploits described in this document.
483483

@@ -681,7 +681,8 @@ The authors would like to thank Tim Cappalli, Nick Ludwig, Adrian Frei, Nikhil R
681681
* Adopted consistent use of hyphenation in using "cross-device"
682682
* Consistent use of "Authorization Device"
683683
* Update Reference to Secure Signals Framework to reflect name change from Secure Signals and Events
684-
684+
* Described difference between proximity enforced and proximity-less cross-device flows
685+
* General editorial pass
685686

686687
-01
687688

0 commit comments

Comments
 (0)