On Tue, Apr 28, 2009 at 1:18 PM, Dossy Shiobara <[email protected]> wrote: > > If and only if the callback URL is protected from tampering. Since we > cannot guarantee the consumer secret and request token secret to be ... > well, secret ... there's no way to guarantee in ALL cases that the > callback URL will be protected from tampering.
If you can't guarantee the request token secret to be secret, then all bets are off everywhere. OAuth has been designed such that the request token secret *is* secret, and in the case of non-redistributed consumers (e.g., web sites or open source software with a requirement to obtain a new consumer key/secret), the consumer secret *is* also secret. For the callback URL signing case, it is absolutely possible to guarantee that the request token secret remains private, and therefore absolutely possible to ensure that the callback URL (and thus, the verification token) is genuine. My reading of Eran's proposal doesn't incorporate this level of signing. That is, I *don't* see a proposal to actually include a callback signature parameter in the callback URL, as in: http://example.com/callbackEndpoint?oauth_token=x&oauth_verifier=y&oauth_signature=HMAC-SHA1(oauth_token_secret, Normalized("http://example.com/callbackEndpoint?oauth_token=x&oauth_verifier=y")) It might be worthwhile, though, to do that? On the other hand, it would significantly complicate things, and might not provide a significant benefit, especially if both the callback URL and the authorization endpoint were handled over SSL. b. --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "OAuth" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/oauth?hl=en -~----------~----~----~----~------~----~------~--~---
