Skip to content

Commit 0dd3f15

Browse files
authored
reference CIMD draft security considerations (modelcontextprotocol#1840)
1 parent 2f533cc commit 0dd3f15

File tree

1 file changed

+2
-15
lines changed

1 file changed

+2
-15
lines changed

docs/specification/draft/basic/authorization.mdx

Lines changed: 2 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -637,21 +637,8 @@ The authorization server takes a URL as input from an unknown client and fetches
637637
A malicious client could use this to trigger the authorization server to make requests to arbitrary URLs,
638638
such as requests to private administration endpoints the authorization server has access to.
639639

640-
Authorization servers fetching metadata documents **MUST** protect against
641-
[Server-Side Request Forgery (SSRF)](https://developer.mozilla.org/docs/Web/Security/Attacks/SSRF) attacks,
642-
as well as against being used as Denial of Service (DoS) amplifiers:
643-
644-
- Validate URLs and resolved IP addresses before fetching
645-
- Limit response size (recommended 5 kilobytes)
646-
- Implement request timeouts
647-
- Implement aggressive caching of metadata documents (respecting HTTP cache headers)
648-
- Never cache error responses or invalid documents
649-
- Rate limit metadata fetch requests per client
650-
- Monitor and alert on unusual metadata fetch patterns
651-
- Only fetch client metadata after authenticating the user
652-
653-
While there is no amplification in the fetch request bandwidth, aggressive caching minimizes
654-
the risk of authorization servers being used in distributed denial of service attacks.
640+
Authorization servers fetching metadata documents **SHOULD** consider
641+
[Server-Side Request Forgery (SSRF)](https://developer.mozilla.org/docs/Web/Security/Attacks/SSRF) risks, as described in [OAuth Client ID Metadata Document: Server Side Request Forgery (SSRF) Attacks](https://datatracker.ietf.org/doc/html/draft-ietf-oauth-client-id-metadata-document-00#name-server-side-request-forgery).
655642

656643
#### Localhost Redirect URI Risks
657644

0 commit comments

Comments
 (0)