52°F

Aaron Parecki

  • Articles
  • Notes
  • Photos
  • Adam Lewis https://twitter.com/lewiada   •   Apr 24
    and what about for storing the access token in the browser?
    Aaron Parecki
    Sadly there isn't a satisfying answer to that. Anything that your JS can use to store any token is vulnerable to XSS. The only secure option is cookies, but that won't work with OAuth. https://stormpath.com/blog/where-to-store-your-jwts-cookies-vs-html5-web-storage
    Portland, Oregon • 75°F
    Tue, Apr 24, 2018 12:07pm -07:00
    1 like 3 replies
    • Jim Manico
    • Jim Manico manicode.com
      And even if you use HTTPOnly secure same-site cookies XSS can force a forged request of any nature: XSS is game over. Nothing today solves that issue. In the future maybe token binding will stop attackers from using stolen tokens... but not replaying them from the victims browser
      Tue, Apr 24, 2018 7:21pm +00:00 (via brid-gy.appspot.com)
    • Jim Manico manicode.com
      tools.ietf.org/html/draft-iet…
      tools.ietf.org/html/draft-iet…
      tools.ietf.org/html/draft-iet…
      tools.ietf.org/html/draft-iet…
      openid.net/specs/openid-c…
      tools.ietf.org/html/draft-iet…
      Tue, Apr 24, 2018 7:18pm +00:00 (via brid-gy.appspot.com)
    • Jim Manico manicode.com
      I agree. All browser storage methods can be abused by XSS. XSS is game over. You can try various techniques to verify different browser characteristics after theft but meh. Real answer is token binding standards of the future...
      Tue, Apr 24, 2018 7:18pm +00:00 (via brid-gy.appspot.com)
Posted in /replies using monocle.p3k.io

Hi, I'm Aaron Parecki, Director of Identity Standards at Okta, and co-founder of IndieWebCamp. I maintain oauth.net, write and consult about OAuth, and participate in the OAuth Working Group at the IETF. I also help people learn about video production and livestreaming. (detailed bio)

I've been tracking my location since 2008 and I wrote 100 songs in 100 days. I've spoken at conferences around the world about owning your data, OAuth, quantified self, and explained why R is a vowel. Read more.

  • Director of Identity Standards at Okta
  • IndieWebCamp Founder
  • OAuth WG Editor
  • OpenID Board Member

  • 🎥 YouTube Tutorials and Reviews
  • 🏠 We're building a triplex!
  • ⭐️ Life Stack
  • ⚙️ Home Automation
  • All
  • Articles
  • Bookmarks
  • Notes
  • Photos
  • Replies
  • Reviews
  • Trips
  • Videos
  • Contact
© 1999-2025 by Aaron Parecki. Powered by p3k. This site supports Webmention.
Except where otherwise noted, text content on this site is licensed under a Creative Commons Attribution 3.0 License.
IndieWebCamp Microformats Webmention W3C HTML5 Creative Commons
WeChat ID
aaronpk_tv