On Fri, Mar 19, 2010 at 6:21 PM, Brian Eaton <[email protected]> wrote:
>
> The gadget tells the container *where* to send the request.  So if
> OpenSocial gadgets supported PLAINTEXT, a malicious gadget author, or
> a malicious user of a gadget (they are pure javascript) could tell the
> container "please send a request to
> https://www.example.com/log_my_secret";.
>
> And the container would then leak the secret to www.example.com.

I've got to be missing something in the OpenSocial specification, but
in my mind the container *must* be keeping track of which secrets
belong to which domain, even for the signing case. Signing a request
to a random domain with a random secret isn't going to work, so the
application must be taking requests from gadgets and doing some
matching to secrets based on the URL. This matching (done correctly -
a big "if") should preclude leaking secrets.

In any case, this is probably neither here nor there. I agree with
your assessment of the two main interesting Open Social use cases.
Especially the idea that it is an example of a type of trusted
containers that can protect secrets from other applications or mediate
for an application in a not-as-highly-trusted environment.

Ethan
_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to