Skip to content

Commit b37f62d

Browse files
authored
Merge pull request #145 from oauth-wg/PieterKas-patch-52
Removed use of etc.
2 parents ce6b297 + 1b650f3 commit b37f62d

File tree

1 file changed

+6
-5
lines changed

1 file changed

+6
-5
lines changed

draft-ietf-oauth-cross-device-security.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,7 @@ Cross-device flows allow a user to start a flow on one device (e.g., a smart TV)
140140

141141
These flows typically involve using a mobile phone to scan a QR code
142142
or enter a user code displayed on the first device (e.g., Smart
143-
TV, Kiosk, Personal Computer etc.).
143+
TV, Kiosk, Personal Computer or other electronic devices.).
144144

145145
## Cross-Device Authorization
146146
In a cross-device authorization flow, a user attempts to access a service on one device, referred to as the Consumption Device, (e.g., a smart TV) and then uses a second device, referred to as the Authorization Device (e.g., a smartphone), to authorize access to a resource (e.g., access to a streaming service) on
@@ -150,7 +150,7 @@ Cross-device authorization flows have several benefits, including:
150150

151151
- Authorization on devices with limited input capabilities: End-users can
152152
authorize devices with limited input capabilities to access content (e.g.,
153-
smart TVs, digital whiteboards, printers, etc).
153+
smart TVs, digital whiteboards, printers or similarly constrained devices).
154154
- Secure authentication on shared or public devices: End-users can perform
155155
authentication and authorization using a personally trusted device, without
156156
risk of disclosing their credentials to a public or shared device.
@@ -644,9 +644,9 @@ By issuing unique user or QR codes, an authorization server can detect if the sa
644644
**Limitations:** Maintaining a deny list of previously redeemed codes, even for a sliding window, may have an impact on the latency of globally distributed systems. One alternative is to segment user codes by geography or region and maintain local deny lists.
645645

646646
### Content Filtering
647-
Attackers exploit the unauthenticated channel by changing the context of the user code or QR code and then sending a message to a user (e-mail, text, instant messaging etc). By deploying content filtering (e.g., anti-spam filter), these messages can be blocked and prevented from reaching the end-users. It may be possible to fine-tune content filtering solutions to detect artefacts like QR codes or user codes that are included in a message that is sent to multiple recipients in the expectation that at least one of the recipients will be convinced by the message and grant authorization to access restricted resources.
647+
Attackers exploit the unauthenticated channel by changing the context of the user code or QR code and then sending a message to a user (e-mail, text messaging, instant messaging or other communication mechanisms). By deploying content filtering (e.g., anti-spam filter), these messages can be blocked and prevented from reaching the end-users. It may be possible to fine-tune content filtering solutions to detect artefacts like QR codes or user codes that are included in a message that is sent to multiple recipients in the expectation that at least one of the recipients will be convinced by the message and grant authorization to access restricted resources.
648648

649-
**Limitations:** Some scenarios may require legitimate re-transmission of user, QR and authorization data (e.g., retries). To prevent the disruption of legitimate scenarios, content filters may use a threshold and allow a limited number of messages with the same QR or user codes to be transmitted before interrupting the delivery of those messages. Content filtering may also be fragmented across multiple communications systems and channels (e-mail, messaging, text etc), making it harder to detect or interrupt attacks that are executed over multiple channels, unless here is a high degree of integration between content filtering systems.
649+
**Limitations:** Some scenarios may require legitimate re-transmission of user, QR and authorization data (e.g., retries). To prevent the disruption of legitimate scenarios, content filters may use a threshold and allow a limited number of messages with the same QR or user codes to be transmitted before interrupting the delivery of those messages. Content filtering may also be fragmented across multiple communications systems and communication channels (e-mail, text messaging, instant messaging or other communication mechanisms), making it harder to detect or interrupt attacks that are executed over multiple channels, unless here is a high degree of integration between content filtering systems.
650650

651651
### Detect and Remediate
652652
The authorization server may be able to detect misuse of the codes due to repeated use as described in [Unique Codes](#Unique Codes), as an input from a content filtering engine as described in [Content Filtering](#Content Filtering), or through other mechanisms such as reports from end-users. If an authorization server determines that a user code or QR code is being used in an attack it may choose to invalidate all tokens issued in response to these codes and make that information available through a token introspection endpoint (see [@RFC7662]). In addition it may notify resource servers to stop accepting these tokens or to terminate existing sessions associated with these tokens using Continuous Access Evaluation Protocol (CAEP) messages [@CAEP] using the Shared Signals Framework (SSF) [@SSF] framework or an equivalent notification system.
@@ -890,14 +890,15 @@ The authors would like to thank Tim Cappalli, Nick Ludwig, Adrian Frei, Nikhil R
890890
* Clarification of FIDO\WebAuthn section.
891891
* Updated langugage in section on FIDO to allow for use of FIDO keys on consumption devices.
892892
* Clarified origin of QR Code.
893-
* Editorial update.
893+
* Editorial updates
894894
* Updated examples to be consistent.
895895
* Made diagram description clearer.
896896
* Added CTAP 2.2 Draft.
897897
* Added additional guidance on geolocation inaccuracies.
898898
* Added Roy Williams to acknowledgements
899899
* Clarified that authorization servers can detect
900900
* Consistent use of "smart TV"
901+
* Fixed references
901902

902903
-06
903904

0 commit comments

Comments
 (0)