@@ -123,7 +123,9 @@ that the error can be noticed and corrected.
123123Servers MAY induce such an early failure by not accepting unencrypted
124124connections, e.g. on port 80. This makes it impossible for a client to send a
125125credential over an insecure channel to the authentic server, as no such channel
126- can be opened.
126+ can be opened. Servers MAY alternatively restrict connections on port 80 to
127+ network sources which are more trusted, such as a VPN or virtual network
128+ interface.
127129
128130However, this mitigation is limited against active network attackers, who can
129131impersonate the server and accept the client's insecure connection attempt.
@@ -155,11 +157,11 @@ When the credential is next used over a secure channel, a server MAY return an
155157error that indicates why the credential was revoked.
156158
157159Credentials in a request can take on different forms. API keys and tokens are simple
158- modes for authentication, but can be abused by attackers to forfeit requests and hence
160+ modes for authentication, but can be abused by attackers to forge requests and hence
159161should be revoked if compromised. Requests can also be authenticated using derived values,
160162where they only include digital signatures or message authentication codes (MACs)
161163derived from credentials but not the credentials themselves. Since an attacker cannot
162- abuse the derived values to forfeit requests, the server MAY choose to not revoke the
164+ abuse the derived values to forge requests, the server MAY choose to not revoke the
163165credentials in this case.
164166
165167# Client Recommendations
0 commit comments