I tend to agree with you.  Anything that is flexible enough to satisfy enough 
people to become a standard will become rather complex.  The more use-cases you 
try to accommodate, the more the complexity grows.  That doesn't mean it is 
bad, and therefore I don't think it should give anyone pause about using Oauth 
in CAS.  It just should be a reminder to be careful to make sure our 
implementation is secure.

The OAuth spec clearly outlines many security issues, though, which is great!  
For one thing, it convinced me that we needed to enforce a white-list of 
allowed services for our CAS server implementation.  Allowing unchecked 
redirecting to unregistered services is actually a much greater security risk 
than I had considered.  The OAuth spec writers seem to have been very careful 
in analyzing their protocol.

-Nathan


From: Ganesh and Sashi Prasad 
<g.c.pra...@gmail.com<mailto:g.c.pra...@gmail.com>>
Reply-To: "cas-dev@lists.jasig.org<mailto:cas-dev@lists.jasig.org>" 
<cas-dev@lists.jasig.org<mailto:cas-dev@lists.jasig.org>>
Date: Monday, July 30, 2012 8:19 PM
To: "cas-dev@lists.jasig.org<mailto:cas-dev@lists.jasig.org>" 
<cas-dev@lists.jasig.org<mailto:cas-dev@lists.jasig.org>>
Subject: Re: [cas-dev] Article: OAuth 2.0 and the Road to Hell

Thanks for the link, Scott. On first reading, Eran Hammer's criticism seems 
damning. However, what he's essentially saying is that the OAuth 2.0 spec in 
itself is too flexible and extensible, allowing naive developers to produce 
non-secure implementations, and also that two "spec-compliant" implementations 
may be non-interoperable.

As we know from the Web Services experience, this is the sort of thing that can 
be fixed with an Interoperability Profile (e.g., WS-I Basic Profile). He did 
admit that there are implementations that are straightforward, simple and 
secure. So I'm sure there will be a second level of standardisation to fix the 
problems he's pointing out. It doesn't mean that OAuth 2.0 is unusable. That 
would be reading too much into it.

My blog on this has more detail: 
http://wisdomofganesh.blogspot.com.au/2012/07/oauth2-whom-to-believe.html

Regards,
Ganesh Prasad

On 29 July 2012 08:55, Scott Battaglia 
<scott.battag...@gmail.com<mailto:scott.battag...@gmail.com>> wrote:
Interesting read as we attempt to evaluate which standards make the most sense 
for CAS to support:
http://hueniverse.com/2012/07/oauth-2-0-and-the-road-to-hell/

Cheers,
Scott


--
You are currently subscribed to 
cas-dev@lists.jasig.org<mailto:cas-dev@lists.jasig.org> as: 
g.c.pra...@gmail.com<mailto:g.c.pra...@gmail.com>
To unsubscribe, change settings or access archives, see 
http://www.ja-sig.org/wiki/display/JSG/cas-dev


--
You are currently subscribed to 
cas-dev@lists.jasig.org<mailto:cas-dev@lists.jasig.org> as: 
nathan.k...@ccci.org<mailto:nathan.k...@ccci.org>
To unsubscribe, change settings or access archives, see 
http://www.ja-sig.org/wiki/display/JSG/cas-dev

-- 
You are currently subscribed to cas-dev@lists.jasig.org as: 
arch...@mail-archive.com
To unsubscribe, change settings or access archives, see 
http://www.ja-sig.org/wiki/display/JSG/cas-dev

Reply via email to