Aaron,

Actually, I never fully understood the "password" access grant type, as technically it is against the very spirit of OAuth, which, I thought, was to avoid divulging the password. TLS provides confidentiality, and so you ought to be able to rely on TLS, although I have no idea what kinds of logs there may be.

Unfortunately, hashing won't help with encryption, because it is impossible to decrypt. Relying on the hash of the password, without salt, is not solving the problem because anyone who can intercept this hash could then use it. Things would be somewhat better if the salt were known, but how can the salt be known to anyone except the server that has created it (and must keep it secret)? I guess the only sure way is to use the public key of the receiver (or a one-time pad based on the shared secret).

Igor

Aaron Parecki wrote:
Hi folks,

I'm implementing OAuth 2 for my project (geoloqi.com <http://geoloqi.com>) where I have some mobile phone clients needing to authenticate. I'm using the "password" grant type for these clients. Even though the call to the token endpoint is going over HTTPS, I'm still slightly concerned about sending the user's password to the server unencrypted. (I don't want the users' passwords to appear in my debug log file for instance.) Does the spec allow for or have a way to extend so that I can define a hashing algorithm the client can use to encrypt the password before sending it? I'm already not storing the passwords in plain text in the database anyway. Anybody else dealing with a similar issue?

Aaron


------------------------------------------------------------------------

_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to