@Tristan,
The OAuth attack scenario is similar to trust one:
* Trustee creates an OAuth authentication delegation (with elevated privs) * ReAuth with new OAuth based delegation.
Alternatively, someone authenticated with an OAuth delegation could: * Create Trust with elevated privileges * ReAuthenticate with new Trust.
The fixes Adam Young has provided eliminate both of these alternate attack vectors.
@Tristan,
The OAuth attack scenario is similar to trust one:
* Trustee creates an OAuth authentication delegation (with elevated privs)
* ReAuth with new OAuth based delegation.
Alternatively, someone authenticated with an OAuth delegation could:
* Create Trust with elevated privileges
* ReAuthenticate with new Trust.
The fixes Adam Young has provided eliminate both of these alternate attack vectors.