<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[I&#x27;m half asleep and not feeling very well today, so please bear that in mind with the following question...]]></title><description><![CDATA[<p>I'm half asleep and not feeling very well today, so please bear that in mind with the following question...</p><p>In the context of a third party Digital Identity provider using PKI, can a phishing site act as a socks proxy (or a plain MitM) for the site that wants authentication, with the third party digital identity provider obviously going direct to the victim because it's a different site (or app), and then just steal the session token once the authentication process is finished?</p><p>The point being (possibly) that the PKI gubbins could happen purely with the ID provider. Is there potentially some sort of handshake via the client between the ID provider and the authentication server which stops this? Should I just go and have a nap?</p><p>cc: <span><a href="/user/tychotithonus%40infosec.exchange">@<span>tychotithonus</span></a></span> <span><a href="/user/atoponce%40fosstodon.org">@<span>atoponce</span></a></span></p>]]></description><link>https://board.circlewithadot.net/topic/c4a8b106-2d68-46bd-b41a-3dd7309c4c5b/i-m-half-asleep-and-not-feeling-very-well-today-so-please-bear-that-in-mind-with-the-following-question...</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 02:51:53 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/c4a8b106-2d68-46bd-b41a-3dd7309c4c5b.rss" rel="self" type="application/rss+xml"/><pubDate>Tue, 28 Apr 2026 10:09:54 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to I&#x27;m half asleep and not feeling very well today, so please bear that in mind with the following question... on Tue, 28 Apr 2026 14:55:35 GMT]]></title><description><![CDATA[<p><span><a href="/user/davep%40infosec.exchange">@<span>davep</span></a></span></p><p>Yeah, my understanding is that if something is in the middle, then unless there's something like WebAuthn (or some other equivalent steps) that enforces binding -- cryptographic validation -- of the <em>actual</em> origin at the far end ... spoofing is possible.</p><p><span><a href="/user/atoponce%40fosstodon.org" rel="nofollow noopener">@<span>atoponce</span></a></span></p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/tychotithonus/statuses/116482908831870320</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/tychotithonus/statuses/116482908831870320</guid><dc:creator><![CDATA[tychotithonus@infosec.exchange]]></dc:creator><pubDate>Tue, 28 Apr 2026 14:55:35 GMT</pubDate></item><item><title><![CDATA[Reply to I&#x27;m half asleep and not feeling very well today, so please bear that in mind with the following question... on Tue, 28 Apr 2026 10:36:49 GMT]]></title><description><![CDATA[<p><span><a href="/user/peacefulz%40infosec.exchange">@<span>Peacefulz</span></a></span> Cheers <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f64f.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--pray" style="height:23px;width:auto;vertical-align:middle" title="🙏" alt="🙏" /></p><p>I'll go through that when I'm less befuddled.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/davep/statuses/116481891343602064</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/davep/statuses/116481891343602064</guid><dc:creator><![CDATA[davep@infosec.exchange]]></dc:creator><pubDate>Tue, 28 Apr 2026 10:36:49 GMT</pubDate></item><item><title><![CDATA[Reply to I&#x27;m half asleep and not feeling very well today, so please bear that in mind with the following question... on Tue, 28 Apr 2026 10:28:42 GMT]]></title><description><![CDATA[<p><span><a href="/user/davep%40infosec.exchange">@<span>davep</span></a></span></p><p>PKCE: <a href="https://auth0.com/docs/get-started/authentication-and-authorization-flow/authorization-code-flow-with-pkce" rel="nofollow noopener">link</a></p><p>DPoP: <a href="https://auth0.com/docs/secure/sender-constraining/demonstrating-proof-of-possession-dpop" rel="nofollow noopener">link</a></p><p>This should send you in the right direction. You're correct. PKI alone is vulnerable.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/Peacefulz/statuses/116481859418575767</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/Peacefulz/statuses/116481859418575767</guid><dc:creator><![CDATA[peacefulz@infosec.exchange]]></dc:creator><pubDate>Tue, 28 Apr 2026 10:28:42 GMT</pubDate></item><item><title><![CDATA[Reply to I&#x27;m half asleep and not feeling very well today, so please bear that in mind with the following question... on Tue, 28 Apr 2026 10:23:03 GMT]]></title><description><![CDATA[<p><span><a href="/user/davep%40infosec.exchange">@<span>davep</span></a></span> It'll take you a fraction of the time when you're not tired and ill.</p>]]></description><link>https://board.circlewithadot.net/post/https://beige.party/users/woe2you/statuses/116481837235160532</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://beige.party/users/woe2you/statuses/116481837235160532</guid><dc:creator><![CDATA[woe2you@beige.party]]></dc:creator><pubDate>Tue, 28 Apr 2026 10:23:03 GMT</pubDate></item><item><title><![CDATA[Reply to I&#x27;m half asleep and not feeling very well today, so please bear that in mind with the following question... on Tue, 28 Apr 2026 10:20:42 GMT]]></title><description><![CDATA[<p>Just going through OpenID Connect stuff for the first time in ages but I'm too tired today. Ho hum.</p><p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">

<div class="card-body">
<h5 class="card-title">
<a href="https://hackmag.com/security/openid-connect">
Just a moment...
</a>
</h5>
<p class="card-text line-clamp-3"></p>
</div>
<a href="https://hackmag.com/security/openid-connect" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://hackmag.com/favicon.ico" alt="favicon" class="not-responsive overflow-hiddden" style="max-width: 21px; max-height: 21px;" />



<p class="d-inline-block text-truncate mb-0"> <span class="text-secondary">(hackmag.com)</span></p>
</a>
</div></p><p><span><a href="/user/tychotithonus%40infosec.exchange">@<span>tychotithonus</span></a></span> <span><a href="/user/atoponce%40fosstodon.org">@<span>atoponce</span></a></span></p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/davep/statuses/116481827962433992</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/davep/statuses/116481827962433992</guid><dc:creator><![CDATA[davep@infosec.exchange]]></dc:creator><pubDate>Tue, 28 Apr 2026 10:20:42 GMT</pubDate></item></channel></rss>