Hi,

my gadget issues an AJAX call to remotely update some data when its
state changes. The AJAX endpoint is the same server that hosts the
gadget.xml (Appengine). Currently, anyone looking at the gadget's
source can see the endpoint
and call it themselves with some query parameters to effectively
submit any data they like.

The question is how to prevent this. It's only a matter of time until
wave gadget hacking becomes a new pasttime.

1* Inspect the HTTP header on the server to check whether call
originates from Google?
>> Does not really solve the problem although makes it perhaps a little harder 
>> for the attacker. Malicious gadget's could be embedded. What about HTTP 
>> header spoofing (I don't know) and once federation kicks in the gadget would 
>> only work on Google's wave browser. No, not a solution.

2* OAuth? I keep reading about OAuth in this forum and started to read
the docs again. Is that the way to go? I haven't read much yet, but
tokens would have to stored somewhere in the gadget, wouldn't they?

Is there perhaps on obvious third approach - after all gadget.xml and
endpoint are on the same server...

Anyway, love wave, it's so much fun to use and even more so to
program.

Thanks,
HC

--

You received this message because you are subscribed to the Google Groups 
"Google Wave API" group.
To post to this group, send email to google-wave-...@googlegroups.com.
To unsubscribe from this group, send email to 
google-wave-api+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/google-wave-api?hl=.


Reply via email to