Ethan,

I think the concern Ravi is expressing is about the OAuth delegation
process itself, the process for issuing access tokens.  Authenticating
the Consumer enables the SP to make an authorization decision to make
sure that it's an actual site that the SP recognizes (plaxo) that gets
the access token, and not some other site (blaxo).

In some ways, this authorization process makes OAuth less "open"
(since the SP has to recognize the provider), but that topic has been
discussed in depth elsewhere.
<http://www.ietf.org/mail-archive/web/oauth/current/msg00373.html>

--Richard


On Sun, Oct 4, 2009 at 11:42 PM, Ethan Jewett <[email protected]> wrote:
>
> I don't understand how this blaxo/plaxoo consumer got hold of a valid
> access token to use in the PLAINTEXT request. Maybe this can be
> explained in a little more detail?
>
> Ethan
>
> On Sun, Oct 4, 2009 at 12:31 PM, beckett <[email protected]> wrote:
>>
>>> Assuming that the SP authenticated the consumer when it asked for a
>>> token, or if the SP authenticates the consumer in some other way, this
>>> all seems better than zero security.
>>
>> Aha... the keywords here being "assuming" and "some other way".  I
>> agree 100%. My point is that OAuth itself does not specify such a
>> method. Even if SSL is used in direct communication between Consumer
>> and SP, I suspect, that this will be interpreted as SSL with "server"
>> side authentication only, i.e. you get confidentiality and message
>> integrity as you observe, and consumer is authenticating SP, but not
>> vice versa. Would probably be preferable to make this with mutual
>> authentication. Without that blaxo or plaxoo can register and get
>> valid consumer key and secret, at which point its easy enough for them
>> to get request token. (and unfortunately any system that relies on an
>> eagle eyed user to notice stuff fails, because X% of users will not
>> notice visual cues and an attacker usually needs a small portion of X
>> to fall prey to be successful).
>>
>> And even, with mutual authentication it really comes down to the
>> quality of the SSL cert. Unfortunately domain validated SSL certs are
>> cheap, but the level of due diligence before issuance is not
>> appropriate for any high value information. And 'high value' is in
>> eyes of beholder, I'd consider my 'geo location' and my list of
>> contacts as high value, most would not!  But really, I for one would
>> really like to see OAuth widely used for applications like getting end
>> user permission to move money or health care data around, and my fear
>> is that OAuth used in weak fashion will get trivially hacked, and will
>> unfairly taint the entire protocol, which would be very unfortunate.
>> I dont want OAuth to be thought of as 'good enough' for social
>> networking sites, but we need something 'industrial strength' for
>> commercial enterprise use; and that is precisely what I have heard
>> said multiple time. Lots of people without understanding the details
>> of the session-fixation attack came away with a mis-impression that
>> the crypto did not work. At heart it was a social engineering attack
>> to which many many so called 'industrial strength' protocols used in
>> fin svcs and healthcare are certainly vulnerable.
>>
>> So I would personally prefer, that the use of PLAINTEXT w/o defining
>> "assuming" and "some other way" clearly, not be encouraged. The value
>> of PLAINTEXT to me is that it gives flexibility to use a strong
>> underlying protocol for mutual authentication and session key exchange
>> between Consumer and SP, but it should really not be used without
>> strong mutual auth of Consumer and SP with high quality credentials.
>> There is a soon to be announced open standard (waiting for the Open
>> Web Foundation Agreement to become final) in the works which provides
>> one such in "some other way" (see here for the not-yet-open version:
>> https://www.safemashups.com/home/public_html/solutions_oauth.html),
>> for  a series of protocols including OAuth.
>>
>> Thanks,
>>
>> Ravi
>>
>> On Oct 3, 3:46 pm, John Kemp <[email protected]> wrote:
>>> On Oct 3, 2009, at 5:25 PM, beckett wrote:
>>>
>>>
>>>
>>> >>> My understading is that I should be able to use PLAINTEXT without
>>> >>> compromising security as long as stick with HTTPS. Is my
>>> >>> understanding
>>> >>> right?
>>>
>>> > Depends on what you mean by "compromising security".
>>>
>>> > Say user wants to move data from Yahoo Contacts! to Plaxo. If you do
>>> > HTTPS on both links, it is true that an eavesdropper listening on
>>> > user's connection to Yahoo Contacts or users connection to Plaxo will
>>> > not be able to see anything.
>>>
>>> Yes, with TLS, you get confidentiality (and request integrity).
>>>
>>>
>>>
>>> > But if you just use PLAINTEXT you as Yahoo! Contacts have absolutely
>>> > no idea if its REALLY PLAXO at the other end.
>>>
>>> How did the consumer get a token for the SP though?
>>>
>>> > It is trivial for any
>>> > site to get user to give up data. In which case you might as well not
>>> > use OAUTH and just make your data publicly available period. So I
>>> > would say that in any real situation, OAUTH-PLAINTEXT plus HTTPS
>>> > equals ZERO security.
>>>
>>> I think you get confidentiality and integrity from TLS, and you get
>>> request authorization from OAuth, because a token that you accept
>>> comes with the request.
>>>
>>> Assuming that the SP authenticated the consumer when it asked for a
>>> token, or if the SP authenticates the consumer in some other way, this
>>> all seems better than zero security.
>>>
>>> Regards,
>>>
>>> - johnk
>>>
>>>
>>>
>>> > On Oct 2, 10:06 am, Eran Hammer-Lahav <[email protected]> wrote:
>>> >>> -----Original Message-----
>>> >>> From: [email protected] [mailto:[email protected]] On
>>> >>> Behalf
>>> >>> Of prashant kulkarni
>>> >>> Sent: Friday, October 02, 2009 9:35 AM
>>> >>> To: OAuth
>>> >>> Subject: [oauth] Need for timestamp and nonce over HTTPS
>>>
>>> >>> I am looking at implementing OAuth Service Provider that only
>>> >>> supports
>>> >>> communicatiion using HTTPS. The OAuth specification allows me to use
>>> >>> PLAINTEXT signature method. I am thinking it should be good fit
>>> >>> for my
>>> >>> purposes.
>>>
>>> >>> I have 2 questions
>>>
>>> >>> (a) My understading is that I should be able to use PLAINTEXT
>>> >>> without
>>> >>> compromising security as long as stick with HTTPS. Is my
>>> >>> understanding
>>> >>> right?
>>>
>>> >> Yes (assuming HTTPS is done correctly).
>>>
>>> >>> (b) I do not see any use of nonce and timestamp since there is no
>>> >>> real
>>> >>> signing of request or real threat of Man in the middle or replay
>>> >>> attacks. Would I be compromising security if I do not keep track of
>>> >>> nonce and timestamp?
>>>
>>> >> No. They are completely useless with PLAINTEXT.
>>>
>>> >> EHL
>>>
>>>
>> >
>>
>
> >
>

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"OAuth" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to [email protected]
For more options, visit this group at http://groups.google.com/group/oauth?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to