That's a matter for how servers handle their consumer keys and registrations. 
If no oauth_callback is present in the first step (1.0a), a server can:

1. Reject the request
2. Allow the request but only for clients registered as desktop, and properly 
inform the user ("An application running on your computer (not a web site) has 
requested access").
3. Show a big red warning that the user must not grant access unless they know 
where they came from, etc.

Deciding what to do is up to each server based on its own security 
requirements. Making desktop applications use the verifier is bad user 
experience as it adds no real value there, but it does make the entire API more 
secure and more difficult to trick users.

EHL

> -----Original Message-----
> From: [email protected] [mailto:[email protected]] On Behalf
> Of Luca Mearelli
> Sent: Thursday, April 30, 2009 8:54 AM
> To: [email protected]
> Subject: [oauth] Re: OAuth Core 1.0 Rev A, Draft 1
> 
> 
> On Thu, Apr 30, 2009 at 5:38 PM, Eran Hammer-Lahav
> <[email protected]> wrote:
> > Also, do we need another value to indicate a desktop client that
> doesn't need the verifier?
> 
> Will the revised protocol allow for (desktop) consumers who *don't
> need* the verifier or should the protocol ask for *manual input* of
> the verifier?
> If the former then maybe the attack could be done by using one of
> those clients who don't require the verifier ...
> 
> Luca
> 
> 

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"OAuth" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to [email protected]
For more options, visit this group at http://groups.google.com/group/oauth?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to