Devils advocate:  I know all of the arguments pro URL bar.  Note that
even without that, the browser will issue warnings if iframe'd over to
a known-bad site.  At least modern browsers will.  I suspect those
warnings are far more effective, when they trigger, than users
checking urls.  Perhaps browsers can do more - a subtle clue about
phishing today is that your password field is not prefilled; could
they be more blatant?  Issue warnings for entirely new sites the user
has never seen that claim to be OAuth SPs?

How many users actually check urls?  How many are equipped to check
urls with Unicode characters?

Would it be possible to get 99% of the security  with an iframe plus a
button to pop out to a full window to complete the action?  The latter
would be chosen by a self selected group of people who actually check
urls and are potentially giving up a high value password.

And, it'd be far more usable, letting more sites abandon the
collect-the-password antipattern, leading to better security overall.

On Monday, January 18, 2010, Paul Osman <[email protected]> wrote:
> Hi Willem,
>
> While it's obviously not something that is covered in the spec (User-Agent 
> specific details are understandably out of scope), I would say that it is 
> strictly necessary. It gets into the "spirit" vs the "letter" of a 
> specification. In my view, using a browser and hiding the location bar breaks 
> the spirit of OAuth and makes the user authorization step less secure.
>
> True, users can always view the location of the page through the properties, 
> but why introduce that hurdle? What percentage of users will know to check 
> that?
>
> As Chris mentioned in another reply to this thread, there are two pieces of 
> information that a user must have:
>
> * the URL where they're entering their password
> * whether the connection is secure (ie using SSL)
>
> The best way to communicate this information in most browsers is the location 
> bar.
>
> Anything that obfuscates the source of the authorization screen, in my 
> opinion, breaks an OAuth implementation because it interferes with a users 
> ability to identify critical pieces of information (the URL and the security 
> details of the connection).
>
> Cheers,
> Paul
>
> On 2010-01-18, at 5:13 AM, Willem Jan Gerritsen wrote:
>
>> Hi,
>>
>> A user can always view the location of a page through the properties.
>> Being able to view the URL in the location bar is useful, but is it strictly 
>> necessary?
>>
>> Regards,
>> Willem Jan
>>
>> -----Original Message-----
>> From: [email protected] [mailto:[email protected]] On Behalf Of 
>> Paul Osman
>> Sent: Sunday, January 17, 2010 5:12 PM
>> To: [email protected]
>> Subject: Re: [oauth] Best Practice
>>
>> If the user cannot reliably see who is presenting the authorization-sign in 
>> window, they have no idea who they are giving their credentials to. This 
>> makes the whole point of delegated authorization moot, so I would consider 
>> it absolutely necessary to direct the user to a browser window where the 
>> location bar is visible.
>>
>> Cheers,
>> Paul
>>
>> On 2010-01-17, at 10:17 AM, eco_bach wrote:
>>
>>> Hi
>>> Building a Twitter application using OAuth.
>>> I'd like to embed the Twitter OAuth authorization-sign in window
>>> WITHIN my application.
>>>
>>> Is this considered a best practice, or is it always recommended to
>>> send the user to a new browser window for the service provider(Twitter
>>> in this case) authentication process?
>>> --
>>> You received this message because you are subscribed to the Google Groups 
>>> "OAuth" group.
>>> To post to this group, send email to [email protected].
>>> To unsubscribe from this group, send email to 
>>> [email protected].
>>> For more options, visit this group at 
>>> http://groups.google.com/group/oauth?hl=en.
>>>
>>>
>>
>>
>> The information contained in this communication is confidential, intended 
>> solely for the use of the individual or entity to whom it is addressed and 
>> may be legally privileged and protected by professional secrecy. Access to 
>> this message by anyone else is unauthorized. If you are not the intended 
>> recipient, any disclosure, copying, or distribution of the message, or any 
>> action or omission taken by you in reliance on it is prohibited and may be 
>> unlawful. Please immediately contact the sender if you have received this 
>> message in error. This email does not constitute any commitment from Cordys 
>> Holding BV or any of its subsidiaries except when expressly agreed in a 
>> written agreement between the intended recipient and Cordys Holding BV or 
>> its subsidiaries. Cordys is neither liable for the proper and complete 
>> transmission of the information contained in this communication nor for any 
>> delay in its receipt. Cordys does not guarantee that the integrity of this 
>> communication has been maintained nor that the communication is free of 
>> viruses, interceptions or interference. If you are not the intended 
>> recipient of this communication please return the communication to the 
>> sender and delete and destroy all copies.
>> --
>> You received this message because you are subscribed to the Google Groups 
>> "OAuth" group.
>> To post to this group, send email to [email protected].
>> To unsubscribe from this group, send email to 
>> [email protected].
>> For more options, visit this group at 
>> http://groups.google.com/group/oauth?hl=en.
>>
>>
>
> --
> You received this message because you are subscribed to the Google Groups 
> "OAuth" group.
> To post to this group, send email to [email protected].
> To unsubscribe from this group, send email to 
> [email protected].
> For more options, visit this group at 
> http://groups.google.com/group/oauth?hl=en.
>
>
>

-- 
--
John Panzer / Google
[email protected] / abstractioneer.org / @jpanzer
-- 
You received this message because you are subscribed to the Google Groups 
"OAuth" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/oauth?hl=en.


Reply via email to