<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: webhamster</title><link>https://news.ycombinator.com/user?id=webhamster</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Mon, 06 Apr 2026 02:06:00 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=webhamster" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by webhamster in "German implementation of eIDAS will require an Apple/Google account to function"]]></title><description><![CDATA[
<p>German implementer here. We have to use some kind of attestation mechanism per the eIDAS implementing acts. That doesn't work without operating system support.<p>The initial limitation to Google/Android is not great, we know that, and we have support for other OSs on our list (like, e.g., GrapheneOS). It is simply a matter of where we focus our energy at the moment, not that we don't see the issues.</p>
]]></description><pubDate>Sun, 05 Apr 2026 09:08:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=47647522</link><dc:creator>webhamster</dc:creator><comments>https://news.ycombinator.com/item?id=47647522</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47647522</guid></item><item><title><![CDATA[RFC9700: Best Current Practice for OAuth 2.0 Security]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.rfc-editor.org/rfc/rfc9700.html">https://www.rfc-editor.org/rfc/rfc9700.html</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=42931507">https://news.ycombinator.com/item?id=42931507</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 04 Feb 2025 12:32:02 +0000</pubDate><link>https://www.rfc-editor.org/rfc/rfc9700.html</link><dc:creator>webhamster</dc:creator><comments>https://news.ycombinator.com/item?id=42931507</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42931507</guid></item><item><title><![CDATA[New comment by webhamster in "Why is OAuth still hard in 2023?"]]></title><description><![CDATA[
<p>For starters, without restrictions on the redirect URI, I (as the attacker) can just redirect a user to the authorization endpoint with a client ID of a trustworthy client, a redirect URI pointing to my server, and a PKCE challenge that I selected so that I know the PKCE verifier. The auth code will end up at my server and I can redeem it, giving me (instead of the trustworthy client) access to the user's resources. If the client is a confidential client, I can use a authorization code injection attack to redeem the code and work with the user's resource.</p>
]]></description><pubDate>Thu, 27 Apr 2023 19:29:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=35733357</link><dc:creator>webhamster</dc:creator><comments>https://news.ycombinator.com/item?id=35733357</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35733357</guid></item><item><title><![CDATA[New comment by webhamster in "Why is OAuth still hard in 2023?"]]></title><description><![CDATA[
<p>That's not correct. There are a number of attacks that can be mitigated by both, but PKCE serves as a very effective defense in case an authorization code leaks to an attacker. Such a leak can be caused by a malicious script on the redirect URI, referer headers, system or firewall logs, mix-up attacks and other problems even when the redirect URIs are restricted.<p>There is a good reason why we mandate both redirect URI allowlisting AND PKCE in the OAuth Security BCP RFC draft. One learning from our discovery of mix-up attacks with "code injection" was that client authentication is not sufficient to prevent the misuse of authorization codes.</p>
]]></description><pubDate>Thu, 27 Apr 2023 07:02:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=35724296</link><dc:creator>webhamster</dc:creator><comments>https://news.ycombinator.com/item?id=35724296</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35724296</guid></item><item><title><![CDATA[Selective Disclosure for JWTs (SD-JWT)]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.ietf.org/archive/id/draft-ietf-oauth-selective-disclosure-jwt-04.html">https://www.ietf.org/archive/id/draft-ietf-oauth-selective-disclosure-jwt-04.html</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=35706445">https://news.ycombinator.com/item?id=35706445</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 25 Apr 2023 20:38:43 +0000</pubDate><link>https://www.ietf.org/archive/id/draft-ietf-oauth-selective-disclosure-jwt-04.html</link><dc:creator>webhamster</dc:creator><comments>https://news.ycombinator.com/item?id=35706445</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35706445</guid></item><item><title><![CDATA[Miqro: MQTT Micro-Services for Python]]></title><description><![CDATA[
<p>Article URL: <a href="https://github.com/danielfett/miqro">https://github.com/danielfett/miqro</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=30427297">https://news.ycombinator.com/item?id=30427297</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 22 Feb 2022 12:51:44 +0000</pubDate><link>https://github.com/danielfett/miqro</link><dc:creator>webhamster</dc:creator><comments>https://news.ycombinator.com/item?id=30427297</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=30427297</guid></item><item><title><![CDATA[Improving OAuth App-to-App Security]]></title><description><![CDATA[
<p>Article URL: <a href="https://danielfett.de/2020/11/27/improving-app2app/">https://danielfett.de/2020/11/27/improving-app2app/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=25252940">https://news.ycombinator.com/item?id=25252940</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 30 Nov 2020 12:05:30 +0000</pubDate><link>https://danielfett.de/2020/11/27/improving-app2app/</link><dc:creator>webhamster</dc:creator><comments>https://news.ycombinator.com/item?id=25252940</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=25252940</guid></item><item><title><![CDATA[Finding and Fixing TLS Misconfigurations with TLS Profiler]]></title><description><![CDATA[
<p>Article URL: <a href="https://danielfett.de/2020/05/22/open-source-tls-scanner/">https://danielfett.de/2020/05/22/open-source-tls-scanner/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=23272086">https://news.ycombinator.com/item?id=23272086</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 22 May 2020 13:56:45 +0000</pubDate><link>https://danielfett.de/2020/05/22/open-source-tls-scanner/</link><dc:creator>webhamster</dc:creator><comments>https://news.ycombinator.com/item?id=23272086</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23272086</guid></item><item><title><![CDATA[OAuth and OpenID Connect: Do PKCE and Nonce Provide the Same Protection?]]></title><description><![CDATA[
<p>Article URL: <a href="https://danielfett.de/2020/05/16/pkce-vs-nonce-equivalent-or-not/">https://danielfett.de/2020/05/16/pkce-vs-nonce-equivalent-or-not/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=23245055">https://news.ycombinator.com/item?id=23245055</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 20 May 2020 09:56:28 +0000</pubDate><link>https://danielfett.de/2020/05/16/pkce-vs-nonce-equivalent-or-not/</link><dc:creator>webhamster</dc:creator><comments>https://news.ycombinator.com/item?id=23245055</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23245055</guid></item><item><title><![CDATA[Show HN: TLS Profiler – Check your site's TLS against Mozilla's recommendations]]></title><description><![CDATA[
<p>Article URL: <a href="https://tlsprofiler.danielfett.de/">https://tlsprofiler.danielfett.de/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=22760824">https://news.ycombinator.com/item?id=22760824</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 02 Apr 2020 16:38:50 +0000</pubDate><link>https://tlsprofiler.danielfett.de/</link><dc:creator>webhamster</dc:creator><comments>https://news.ycombinator.com/item?id=22760824</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22760824</guid></item><item><title><![CDATA[New comment by webhamster in "JWT is Awesome"]]></title><description><![CDATA[
<p>Can we finally stop conflating an encoding/signature/encryption method with a transport/storage mechanism?!</p>
]]></description><pubDate>Tue, 18 Feb 2020 12:43:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=22355541</link><dc:creator>webhamster</dc:creator><comments>https://news.ycombinator.com/item?id=22355541</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22355541</guid></item><item><title><![CDATA[New comment by webhamster in "A guide to Oauth2"]]></title><description><![CDATA[
<p>Quote:<p><pre><code>   The resource owner password credentials grant MUST NOT be used.  This
   grant type insecurely exposes the credentials of the resource owner
   to the client.  Even if the client is benign, this results in an
   increased attack surface (credentials can leak in more places than
   just the AS) and users are trained to enter their credentials in
   places other than the AS.

   Furthermore, adapting the resource owner password credentials grant
   to two-factor authentication, authentication with cryptographic
   credentials, and authentication processes that require multiple steps
   can be hard or impossible (WebCrypto, WebAuthn).</code></pre></p>
]]></description><pubDate>Mon, 02 Sep 2019 16:17:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=20860006</link><dc:creator>webhamster</dc:creator><comments>https://news.ycombinator.com/item?id=20860006</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20860006</guid></item><item><title><![CDATA[New comment by webhamster in "A guide to Oauth2"]]></title><description><![CDATA[
<p>FYI, the IETF plans to deprecate the Resource Owner Password Credentials Grant you are talking about [1].<p>[1] <a href="https://tools.ietf.org/html/draft-ietf-oauth-security-topics" rel="nofollow">https://tools.ietf.org/html/draft-ietf-oauth-security-topics</a></p>
]]></description><pubDate>Mon, 02 Sep 2019 16:15:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=20859991</link><dc:creator>webhamster</dc:creator><comments>https://news.ycombinator.com/item?id=20859991</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20859991</guid></item><item><title><![CDATA[New comment by webhamster in "Show HN: Hydra – Open-Source OAuth2 Server"]]></title><description><![CDATA[
<p>There is no issuer in OAuth. Therefore, the distinct-redirect-URI solution is the most universal.</p>
]]></description><pubDate>Tue, 02 Jul 2019 07:28:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=20332955</link><dc:creator>webhamster</dc:creator><comments>https://news.ycombinator.com/item?id=20332955</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20332955</guid></item><item><title><![CDATA[New comment by webhamster in "Show HN: Hydra – Open-Source OAuth2 Server"]]></title><description><![CDATA[
<p>Also, we now have formal proofs for the security of the OAuth and OIDC protocols.</p>
]]></description><pubDate>Tue, 02 Jul 2019 07:28:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=20332951</link><dc:creator>webhamster</dc:creator><comments>https://news.ycombinator.com/item?id=20332951</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20332951</guid></item><item><title><![CDATA[New comment by webhamster in "Show HN: Hydra – Open-Source OAuth2 Server"]]></title><description><![CDATA[
<p>Does Hydra follow the OAuth Security BCP (<a href="https://tools.ietf.org/html/draft-ietf-oauth-security-topics-12" rel="nofollow">https://tools.ietf.org/html/draft-ietf-oauth-security-topics...</a>)? I do not see PKCE or mix-up mitigation mentioned, for example.</p>
]]></description><pubDate>Mon, 01 Jul 2019 17:38:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=20327743</link><dc:creator>webhamster</dc:creator><comments>https://news.ycombinator.com/item?id=20327743</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20327743</guid></item><item><title><![CDATA[Why you should stop using the OAuth implicit grant]]></title><description><![CDATA[
<p>Article URL: <a href="https://medium.com/@torsten_lodderstedt/why-you-should-stop-using-the-oauth-implicit-grant-2436ced1c926">https://medium.com/@torsten_lodderstedt/why-you-should-stop-using-the-oauth-implicit-grant-2436ced1c926</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=18509362">https://news.ycombinator.com/item?id=18509362</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 22 Nov 2018 11:34:03 +0000</pubDate><link>https://medium.com/@torsten_lodderstedt/why-you-should-stop-using-the-oauth-implicit-grant-2436ced1c926</link><dc:creator>webhamster</dc:creator><comments>https://news.ycombinator.com/item?id=18509362</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18509362</guid></item></channel></rss>