[twitter-dev] Re: Security Best Practices

2009-07-01 Thread DWRoelands

It seems as though revealing the Consumer Key and Consumer Key Secret
of my application would be a pretty serious security risk.  Anyone
could write an application that impersonates mine, but they still
would need an authorized user's Token and Token Secret in order to
commit mischief.

What sort of nastiness could one do in the Twitter environment with
someone else's Consumer Key and Consumer Key Secret?

Am I making a mountain out of a molehill here?  If this is not a big
deal, I'd like to hear so so I can continue working on my project as
an open source endeavor.  If this is a serious security issue, then I
have to close the source for my project (and obfuscate the source).

--Duane

On Jun 30, 9:29 pm, Alex Payne a...@twitter.com wrote:
 That's a solution that better fits open source Twitter web services. For an
 open source desktop client like Spaz it certainly doesn't work.



 On Tue, Jun 30, 2009 at 16:37, DWRoelands duane.roela...@gmail.com wrote:

  Wait, the solution is that every -user- of an open-source Twitter
  client would have to register for their own set of -consumer- keys?

  That's not what you meant, is it?

  On Jun 30, 4:39 pm, Alex Payne a...@twitter.com wrote:
   The simplest solution is that every deployment of the tool will have to
   register for their own OAuth credentials. This isn't ideal. I'd inquire
  over
   athttp://groups.google.com/group/oauth

   On Tue, Jun 30, 2009 at 06:04, DWRoelands duane.roela...@gmail.com
  wrote:

This is really an excellent question.

If we're developing an open-source Twitter client, how are we supposed
to handle the consumer_key and consumer_key_secret?

On Jun 29, 7:58 pm, Support supp...@yourhead.com wrote:
 2.  Obfuscation of the application's registered key and secret.
 Are there any best practices?  What about an open source project?

   --
   Alex Payne - Platform Lead, Twitter, Inc.http://twitter.com/al3x

 --
 Alex Payne - Platform Lead, Twitter, Inc.http://twitter.com/al3x


[twitter-dev] Re: Retrieving data from the Twitter API

2009-07-01 Thread Christian Fazzini

So is this wrong if I save the image and user details locally (on our
server) ?

Also, how would it be possible to get the users profile pic at
http://apiwiki.twitter.com/Twitter-REST-API-Method%3A-users%C2%A0show
using profile_image_url ?

At current it only returns _normal.jpg, which is set at 43x43. I need
the bigger profile image that is set at 73x73


On Jun 30, 10:45 pm, Abraham Williams 4bra...@gmail.com wrote:
 Twitter has said in the past they are more then willing to take care
 of the bandwidth for smaller applications but if you go huge they ask
 you to look at local caching.



 On Tue, Jun 30, 2009 at 08:12, Philip Plantepplante@gmail.com wrote:

  You can cache the user's profile data so API lookups are kept to a
  minimum.  Though the profile image should be hotlinked using whatever
  value is stored int he profile_image_url attribute of the user object
  returned from Twitter.  By using S3 as a central source Twitter is
  able to help alleviate image sync issues that would arise when third
  party services cache the image locally.  Also keep in mind that most
  of the time your user's should already have their cache primed, via
  twitter.com or another service, due the caching rules employed by
  Twitter and S3.

  On Jun 30, 6:32 am, Christian Fazzini christian.fazz...@gmail.com
  wrote:
  Hello,

  We are in the process of developing a website that uses the Twitter
  API.

  I understand that the Twitter API is capable of retrieving a user's
  profile photo via:

 http://apiwiki.twitter.com/Twitter-REST-API-Method%3A-users%C2%A0show

  Other websites that are using the Twitter API are, instead, getting
  these profile photos from Amazon's S3 storage service 
  (http://s3.amazonaws.com/twitter_production/).

  At current when a Twitter user logs onto our website, it will retrieve
  his information and store it our local db. At the same time it will
  also grab the profile photo from profile_image_url and store it on
  our server.

  In my opinion, this seems more appropriate instead of having the site
  quer the Twitters API and / or hotlink to Amazon's S3 storage service
  whenever a user loads a page. Especially, if it has to load several
  profile photos on every page load, on our site. I could be wrong
  here.

  What do you guys think the best approach for this is?

  Hoping to hear from you soon.

  Best regards,
  Chris

 --
 Abraham Williams | Community Evangelist |http://web608.org
 Hacker |http://abrah.am|http://twitter.com/abraham
 Project |http://fireeagle.labs.poseurtech.com
 This email is: [ ] blogable [x] ask first [ ] private.


[twitter-dev] Re: Retrieving data from the Twitter API

2009-07-01 Thread Christian Fazzini

hmmm

On Jun 30, 10:45 pm, Abraham Williams 4bra...@gmail.com wrote:
 Twitter has said in the past they are more then willing to take care
 of the bandwidth for smaller applications but if you go huge they ask
 you to look at local caching.



 On Tue, Jun 30, 2009 at 08:12, Philip Plantepplante@gmail.com wrote:

  You can cache the user's profile data so API lookups are kept to a
  minimum.  Though the profile image should be hotlinked using whatever
  value is stored int he profile_image_url attribute of the user object
  returned from Twitter.  By using S3 as a central source Twitter is
  able to help alleviate image sync issues that would arise when third
  party services cache the image locally.  Also keep in mind that most
  of the time your user's should already have their cache primed, via
  twitter.com or another service, due the caching rules employed by
  Twitter and S3.

  On Jun 30, 6:32 am, Christian Fazzini christian.fazz...@gmail.com
  wrote:
  Hello,

  We are in the process of developing a website that uses the Twitter
  API.

  I understand that the Twitter API is capable of retrieving a user's
  profile photo via:

 http://apiwiki.twitter.com/Twitter-REST-API-Method%3A-users%C2%A0show

  Other websites that are using the Twitter API are, instead, getting
  these profile photos from Amazon's S3 storage service 
  (http://s3.amazonaws.com/twitter_production/).

  At current when a Twitter user logs onto our website, it will retrieve
  his information and store it our local db. At the same time it will
  also grab the profile photo from profile_image_url and store it on
  our server.

  In my opinion, this seems more appropriate instead of having the site
  quer the Twitters API and / or hotlink to Amazon's S3 storage service
  whenever a user loads a page. Especially, if it has to load several
  profile photos on every page load, on our site. I could be wrong
  here.

  What do you guys think the best approach for this is?

  Hoping to hear from you soon.

  Best regards,
  Chris

 --
 Abraham Williams | Community Evangelist |http://web608.org
 Hacker |http://abrah.am|http://twitter.com/abraham
 Project |http://fireeagle.labs.poseurtech.com
 This email is: [ ] blogable [x] ask first [ ] private.


[twitter-dev] Use Twitter for login oauth/authenticate method

2009-07-01 Thread Arnaud

Hello,

I’m using the oauth/authenticate method (one click login) and I was
wondering if I had to check the Use Twitter for login option in my
application options. The application is Browser based (using a
callback URL) .

I’m quite confused with this option as I don’t really understand what
it is standing for?

All the best,
Arnaud.


[twitter-dev] Re: How-To: Load the Twitter XML into a VB.Net XML Document...

2009-07-01 Thread Obrzut

Right - I am not scraping the PIN? I am using the web browser in .NET
(which is similar to Internet Explorer)

to authenticate via a pin and username / password credentials.

The only part of the workflow I do not follow is opening the URL in IE
- I open in it VB.NET Web Browser.

But - my user has to input it to send it back - I do not retreive it.

What I am retreiving is the XML document that is sent to the web
browser.

I am not sure if any of you have actually seen the pages yet - but I
have a few problems with your Library.

When the pin starts with a zero - the authentication fails. Are you
converting the pin string to an integer in your library? This is the
only reason why a leading zero would be stripped you see.

That is my first problem with the library - it has not been tested in
a real world example otherwise this would have been flagged long ago.

Now - I am not sure why you would think I was scraping the PIN - my
user inputs it into a VB textbox for sending back to the correct URL.
This way - my web browser gets authenticated.

Also, did you know a Login prompt appears from the browser window -
asking the user for Login credentials a SECOND time!?

This is most peculiar. Have anyone else experienced this or are
basically just not experienced in writing for the Twitter API and just
read the information pages.

I am a programmer - writing a VB.NET application that is registered
with Twitter. I require real world examples because my program is real
world - not from the pages of the Twitter API documentation.

So, lets make this clear divide here - I want to talk to programmers -
not just people who THINK they know what is happening from the API man
pages. lol


[twitter-dev] Re: User id range

2009-07-01 Thread Philip Plante

You should use an unsigned 64 bit int for status and user ids to be
safe.  IDs will never be negative, so a signed value is wasted space.

On Jul 1, 6:28 am, DWRoelands duane.roela...@gmail.com wrote:
 If you're asking what data type should you use to store these value,
 I'm using the .NET Int64 type in my library.  The Int64 value type
 represents integers with values ranging from negative
 9,223,372,036,854,775,808 through positive 9,223,372,036,854,775,807.
 I was seeing occasional overflows using Int32.

 On Jul 1, 1:14 am, Arunachalam arunachala...@gmail.com wrote:



  Im little bit confused in identifying the numeric digit say '14198354'
  either as statuses id/ user id.
  As of now im accessinghttp://twitter.com/users/show/14198354.xmlto
  identify it as a user.

  Is there any range in the user id values
  and wht will be the range for the statues id values?

  Cheers,
  Arunachalam


[twitter-dev] Re: How-To: Load the Twitter XML into a VB.Net XML Document...

2009-07-01 Thread Obrzut

Did I state otherwise?

You are not reading my words - you are being blinded by the noise from
your own head.

What I stated is this;

I authenticate my VB.NET web browser via PIN etc

THIS means my browser is authenticated.

If I try to access a page via the program with a TCP Client - I have
to re-authenticate via PIN.

This WAS a problem - my solution is to continue to use the web browser
for authentication and extract the XML pages into an XML Document.

Hence the above code.

If you state otherwise - that you CAN use a TCP Client after already
authenticating your VB.Net web browser - you are wrong.

I imagine you think I am wrong - and that I am an idiot. Believe me -
I am very skilled at programming. And this is my experience.

The library is faulty. It does not process leading zero pins.

The OAuth implementation is stupid - because it does not authenticate
an program but a TCP method.

Hence, you guys are s off the mark here it hurts me to talk to
you.

Really, srsly, it's pathetic that you DO NOT LISTEN.

On Jul 1, 4:58 am, DWRoelands duane.roela...@gmail.com wrote:
 You can absolutely authenticate in a web page, even if your
 application is not a web application.  Mine works that way.

 Here's how it should go.  Bojan, please correct me if I'm wrong.

 1. Your application calls GetAuthorizationLink() to get the URL of the
 authorization page (you've got this already).
 2. Your application opens a web browser to that link.  In .NET, you
 can do this with Process.Start(The URL that you get from
 GetAuthorizationLink).
 3. The user sees the six-digit PIN on the screen.
 4. Your application prompts the user to enter the six-digit PIN that
 they see.
 5. Your application calls GetAccessToken(), passing the six-digit PIN
 as the input parameter.
 6. The OAuth object has two properties that should now be populated:
 Token and TokenSecret.  These are the items you will use for all
 subsequent OAuth requests to Twitter.

 Your application should now be authorized via OAuth.

 On Jun 30, 8:58 pm, Obrzut sa...@peyoteuk.com wrote:



  This is because of OAuth. It uses HTML pages to validate. Perhaps I am
  wrong - but once I use a web browser to validate - I cannot use a TCP
  Client to get the XML because I authenticated via a web browser. When
  I tried to (for example) send the pin back via a HTTP Web Request it
  failed. I am not sure if I am using the OAuth library Interface Class
  I have for VB.NET correctly!?


[twitter-dev] Re: How-To: Load the Twitter XML into a VB.Net XML Document...

2009-07-01 Thread Abraham Williams

On Wed, Jul 1, 2009 at 07:00, Obrzutsa...@peyoteuk.com wrote:
 The library is faulty. It does not process leading zero pins.

 The OAuth implementation is stupid - because it does not authenticate
 an program but a TCP method.

 Hence, you guys are s off the mark here it hurts me to talk to
 you.

 Really, srsly, it's pathetic that you DO NOT LISTEN.

Well that is one way to thank people donating their time to try and help you...

-- 
Abraham Williams | Community Evangelist | http://web608.org
Hacker | http://abrah.am | http://twitter.com/abraham
Project | http://fireeagle.labs.poseurtech.com
This email is: [ ] blogable [x] ask first [ ] private.


[twitter-dev] Re: Security Best Practices

2009-07-01 Thread Philip Plante

I do not feel you've made a mountain out of a mole hill here.  This
topic has been on my mind since I first encountered oAuth.  I haven't
seen any open source apps use oAuth yet.

We have an open source application called Application X.  The
potential risk is that Application X becomes widely adopted, thus
having a higher risk of being impersonated.  For instance, malware
could then use the tokens from Application X to obtain authorization
from Twitter.  This would require the user to authorize the
impersonator via Twitter since it is likely a new session token would
be generated.  Potentially the user would likely trust this
impersonator and not think twice about authorizing it because they
will see Application X on Twitter.com.  Once they click allow the
impersonator has control of their account.  Even if the malware
doesn't spread quickly it would possibly be harder to track since it
would appear to be communications from Application X.

I am not one to cry fowl over an issue like this, just merely throwing
this out here as an idea.  Anyone else have any ideas how to secure
open source oAuth apps?

On Jul 1, 6:24 am, DWRoelands duane.roela...@gmail.com wrote:
 It seems as though revealing the Consumer Key and Consumer Key Secret
 of my application would be a pretty serious security risk.  Anyone
 could write an application that impersonates mine, but they still
 would need an authorized user's Token and Token Secret in order to
 commit mischief.

 What sort of nastiness could one do in the Twitter environment with
 someone else's Consumer Key and Consumer Key Secret?

 Am I making a mountain out of a molehill here?  If this is not a big
 deal, I'd like to hear so so I can continue working on my project as
 an open source endeavor.  If this is a serious security issue, then I
 have to close the source for my project (and obfuscate the source).

 --Duane

 On Jun 30, 9:29 pm, Alex Payne a...@twitter.com wrote:



  That's a solution that better fits open source Twitter web services. For an
  open source desktop client like Spaz it certainly doesn't work.

  On Tue, Jun 30, 2009 at 16:37, DWRoelands duane.roela...@gmail.com wrote:

   Wait, the solution is that every -user- of an open-source Twitter
   client would have to register for their own set of -consumer- keys?

   That's not what you meant, is it?

   On Jun 30, 4:39 pm, Alex Payne a...@twitter.com wrote:
The simplest solution is that every deployment of the tool will have to
register for their own OAuth credentials. This isn't ideal. I'd inquire
   over
athttp://groups.google.com/group/oauth

On Tue, Jun 30, 2009 at 06:04, DWRoelands duane.roela...@gmail.com
   wrote:

 This is really an excellent question.

 If we're developing an open-source Twitter client, how are we supposed
 to handle the consumer_key and consumer_key_secret?

 On Jun 29, 7:58 pm, Support supp...@yourhead.com wrote:
  2.  Obfuscation of the application's registered key and secret.
  Are there any best practices?  What about an open source project?

--
Alex Payne - Platform Lead, Twitter, Inc.http://twitter.com/al3x

  --
  Alex Payne - Platform Lead, Twitter, Inc.http://twitter.com/al3x


[twitter-dev] Re: How-To: Load the Twitter XML into a VB.Net XML Document...

2009-07-01 Thread Stuart

2009/7/1 Obrzut sa...@peyoteuk.com:

 Did I state otherwise?

 You are not reading my words - you are being blinded by the noise from
 your own head.

 What I stated is this;

 I authenticate my VB.NET web browser via PIN etc

 THIS means my browser is authenticated.

 If I try to access a page via the program with a TCP Client - I have
 to re-authenticate via PIN.

 This WAS a problem - my solution is to continue to use the web browser
 for authentication and extract the XML pages into an XML Document.

 Hence the above code.

 If you state otherwise - that you CAN use a TCP Client after already
 authenticating your VB.Net web browser - you are wrong.

 I imagine you think I am wrong - and that I am an idiot. Believe me -
 I am very skilled at programming. And this is my experience.

 The library is faulty. It does not process leading zero pins.

 The OAuth implementation is stupid - because it does not authenticate
 an program but a TCP method.

 Hence, you guys are s off the mark here it hurts me to talk to
 you.

 Really, srsly, it's pathetic that you DO NOT LISTEN.

And it's pathetic that you take a piece of code that someone has
generously donated to the Twitter developer community and then
complain because *you* can't get it to work with an attitude that
would be barely acceptable if you'd paid for it.

You clearly think you can do better, so go ahead and write your own
Twitter library for VB.net. Nobody is forcing you to use that code.

-Stuart

-- 
http://stut.net/projects/twitter

 On Jul 1, 4:58 am, DWRoelands duane.roela...@gmail.com wrote:
 You can absolutely authenticate in a web page, even if your
 application is not a web application.  Mine works that way.

 Here's how it should go.  Bojan, please correct me if I'm wrong.

 1. Your application calls GetAuthorizationLink() to get the URL of the
 authorization page (you've got this already).
 2. Your application opens a web browser to that link.  In .NET, you
 can do this with Process.Start(The URL that you get from
 GetAuthorizationLink).
 3. The user sees the six-digit PIN on the screen.
 4. Your application prompts the user to enter the six-digit PIN that
 they see.
 5. Your application calls GetAccessToken(), passing the six-digit PIN
 as the input parameter.
 6. The OAuth object has two properties that should now be populated:
 Token and TokenSecret.  These are the items you will use for all
 subsequent OAuth requests to Twitter.

 Your application should now be authorized via OAuth.

 On Jun 30, 8:58 pm, Obrzut sa...@peyoteuk.com wrote:



  This is because of OAuth. It uses HTML pages to validate. Perhaps I am
  wrong - but once I use a web browser to validate - I cannot use a TCP
  Client to get the XML because I authenticated via a web browser. When
  I tried to (for example) send the pin back via a HTTP Web Request it
  failed. I am not sure if I am using the OAuth library Interface Class
  I have for VB.NET correctly!?


[twitter-dev] Re: Security Best Practices

2009-07-01 Thread DWRoelands

If you check out the OAuth Core Abstract, Section 4 (http://oauth.net/
core/1.0#anchor4) states it pretty plainly:

Service Providers SHOULD NOT rely on the Consumer Secret as a method
to verify the Consumer identity, unless the Consumer Secret is known
to be inaccessible to anyone other than the Consumer and the Service
Provider.

This is exactly what Twitter has done with the Consumer Secret; they
rely on it to verify the Consumer identity.

This is a thorny dilemma for open source developers.  There's no way
to share the source code without compromising your application's
security, because you've got to include the Consumer Key Secret in the
source.  You can obfuscate and encrypt, but a malicious actor with
access to the source code can simply step through the code until the
Consumer Secret is exposed in plain text.

In any event, what's done is done, and Twitter certainly isn't going
to abandon OAuth at this point.  But opening the source of my Twitter
client seems to be out of the question if I want to use OAuth.


On Jul 1, 8:10 am, Philip Plante pplante@gmail.com wrote:
 I do not feel you've made a mountain out of a mole hill here.  This
 topic has been on my mind since I first encountered oAuth.  I haven't
 seen any open source apps use oAuth yet.


[twitter-dev] Re: Security Best Practices

2009-07-01 Thread Andrew Badera

The secret should not reside in code. The secret should reside in a
config file, or maybe even a machine datastore. Abstract it out, no
one ever needs to see anything secret in your code.

Thanks-
- Andy Badera
- and...@badera.us
- Google me: http://www.google.com/search?q=andrew+badera
- This email is: [ ] bloggable [x] ask first [ ] private



On Wed, Jul 1, 2009 at 9:25 AM, DWRoelandsduane.roela...@gmail.com wrote:

 If you check out the OAuth Core Abstract, Section 4 (http://oauth.net/
 core/1.0#anchor4) states it pretty plainly:

 Service Providers SHOULD NOT rely on the Consumer Secret as a method
 to verify the Consumer identity, unless the Consumer Secret is known
 to be inaccessible to anyone other than the Consumer and the Service
 Provider.

 This is exactly what Twitter has done with the Consumer Secret; they
 rely on it to verify the Consumer identity.

 This is a thorny dilemma for open source developers.  There's no way
 to share the source code without compromising your application's
 security, because you've got to include the Consumer Key Secret in the
 source.  You can obfuscate and encrypt, but a malicious actor with
 access to the source code can simply step through the code until the
 Consumer Secret is exposed in plain text.

 In any event, what's done is done, and Twitter certainly isn't going
 to abandon OAuth at this point.  But opening the source of my Twitter
 client seems to be out of the question if I want to use OAuth.


 On Jul 1, 8:10 am, Philip Plante pplante@gmail.com wrote:
 I do not feel you've made a mountain out of a mole hill here.  This
 topic has been on my mind since I first encountered oAuth.  I haven't
 seen any open source apps use oAuth yet.



[twitter-dev] Re: How-To: Load the Twitter XML into a VB.Net XML Document...

2009-07-01 Thread DWRoelands

Obrzut:
My application does exactly what you say is impossible.  The user
authenticates via the web browser, then my desktop application
completes the process using the six-digit PIN.

There's no need to fix any XML that comes from Twitter, and there's
no need to process any HTML from a web page.

I'd be happy to help you work through the issues you're having with
your application, but please stop insisting that you're smarter than
everyone else here.

Bojan:
Obrzut's right about the GetAccessToken() call in the Twarp code.
GetAccessToken accepts the PIN as an Int; that should be a string so
that leading zeroes don't get stripped.  I haven't seen any PINs with
a leading zero, but that doesn't mean they don't occur. :)

--Duane

On Jul 1, 8:00 am, Obrzut sa...@peyoteuk.com wrote:
 If you state otherwise - that you CAN use a TCP Client after already
 authenticating your VB.Net web browser - you are wrong.


[twitter-dev] Re: Security Best Practices

2009-07-01 Thread DWRoelands

That's not correct.  Updates posted to Twitter via Basic Auth always
appear with a source of From Web (unless the application in question
was grandfathered in).  Otherwise, it's not possible to impersonate
another application via Basic Auth.

On Jul 1, 9:34 am, Abraham Williams 4bra...@gmail.com wrote:
 Using basic auth it is already possible to use any
 source and impersonate another application so not much is changing
 here except better security for web applications.


[twitter-dev] Re: Security Best Practices

2009-07-01 Thread DWRoelands

True, but none of that addresses the central points that I'm trying to
make:

1. The OAuth Core documentation says that providers should not rely on
the Consumer Secret to identify consumers.
2. Twitter's implementation of OAuth appears to do exactly what the
OAuth Core documentation says not to do.
3. As a result, open-source developers have to expose the Consumer
Secret for their application, opening their keys to potential abuse
and eventual cancellation by Twitter.

That's a problem.

What's done is done and I don't expect Twitter to abandon OAuth.  But
it's an important issue that's worth talking about because it's a
security risk for developers of desktop clients.

On Jul 1, 9:50 am, Abraham Williams 4bra...@gmail.com wrote:
 True. But I'm pretty sure that there are more active grandfathered
 sources then OAuth sources. And it takes nothing to create a new OAuth
 application that has the same source as an existing OAuth application
 but with only a slightly different name.


[twitter-dev] Re: Security Best Practices

2009-07-01 Thread funkatron

Might sorta work on webapps, or maybe desktop compiled code (assuming
the config is compiled in at build time), but that doesn't help for
desktop apps written in interpreted langs, where all source code and
configs would be easily viewable (although I could imagine some
initial setup stuff where it could get obscured).

Not that I'm on either side of whatever this is.


On Jul 1, 9:32 am, Andrew Badera and...@badera.us wrote:
 The secret should not reside in code. The secret should reside in a
 config file, or maybe even a machine datastore. Abstract it out, no
 one ever needs to see anything secret in your code.

 Thanks-
 - Andy Badera
 - and...@badera.us
 - Google me:http://www.google.com/search?q=andrew+badera
 - This email is: [ ] bloggable [x] ask first [ ] private

 On Wed, Jul 1, 2009 at 9:25 AM, DWRoelandsduane.roela...@gmail.com wrote:

  If you check out the OAuth Core Abstract, Section 4 (http://oauth.net/
  core/1.0#anchor4) states it pretty plainly:

  Service Providers SHOULD NOT rely on the Consumer Secret as a method
  to verify the Consumer identity, unless the Consumer Secret is known
  to be inaccessible to anyone other than the Consumer and the Service
  Provider.

  This is exactly what Twitter has done with the Consumer Secret; they
  rely on it to verify the Consumer identity.

  This is a thorny dilemma for open source developers.  There's no way
  to share the source code without compromising your application's
  security, because you've got to include the Consumer Key Secret in the
  source.  You can obfuscate and encrypt, but a malicious actor with
  access to the source code can simply step through the code until the
  Consumer Secret is exposed in plain text.

  In any event, what's done is done, and Twitter certainly isn't going
  to abandon OAuth at this point.  But opening the source of my Twitter
  client seems to be out of the question if I want to use OAuth.

  On Jul 1, 8:10 am, Philip Plante pplante@gmail.com wrote:
  I do not feel you've made a mountain out of a mole hill here.  This
  topic has been on my mind since I first encountered oAuth.  I haven't
  seen any open source apps use oAuth yet.




[twitter-dev] Re: Security Best Practices

2009-07-01 Thread DWRoelands

Andrew,

The Consumer Secret is the key that has to be associated with my
application so that it can authenticate to Twitter.  Regardless of how
I distribute it, I still have to distribute it with the source code in
order for the source code to work.

No amount of abstraction will prevent someone from analyzing the
source and being able to retrieve the Consumer Secret.

In a closed-source project, this is less of an issue.  For open-source
projects, this is a pretty big problem.

Regards,
Duane

On Jul 1, 9:32 am, Andrew Badera and...@badera.us wrote:
 The secret should not reside in code. The secret should reside in a
 config file, or maybe even a machine datastore. Abstract it out, no
 one ever needs to see anything secret in your code.


[twitter-dev] Re: Use Twitter for login oauth/authenticate method

2009-07-01 Thread Matt Sanford


Hi Arnaud,

That option during application creation is really more trouble  
that it is worth. Right now applications that have that option checked  
include an extra sentence to tell users the application will be using  
twitter for login, that's all. In the future we may restrict the / 
oauth/authenticate call to applications that have specifically chosen  
the option, so I recommend that any application using 'Sing in with  
Twitter' check the check box. We're also working on redesigning the  
authorization page and might do more with that value then.
We will announce before hand if we make any changes, like  
requiring that value to use the authenticate method. It's not  
something we'll definitely do but it is something that may come up in  
the medium term you should be aware of.


Thanks;
 – Matt Sanford / @mzsanford
 Twitter Dev

On Jul 1, 2009, at 4:26 AM, Arnaud wrote:



Hello,

I’m using the oauth/authenticate method (one click login) and I was
wondering if I had to check the Use Twitter for login option in my
application options. The application is Browser based (using a
callback URL) .

I’m quite confused with this option as I don’t really understand what
it is standing for?

All the best,
Arnaud.




[twitter-dev] Re: Security Best Practices

2009-07-01 Thread Cameron Kaiser

 Yes, but don't distribute it. Obviously config files are human
 readable, but you blank out secrets before publishing them.
 
 People using open source libraries will have to get their own keys.
 So, either you really are contributing in the spirit of open source,
 and you don't care about getting credit, or you're doing it for self
 promotional purposes, and the conversation is moot anyhow.

That's an asinine statement. So everybody who doesn't make their open
source software anonymous is a publicity whore?

-- 
 personal: http://www.cameronkaiser.com/ --
  Cameron Kaiser * Floodgap Systems * www.floodgap.com * ckai...@floodgap.com
-- In memory of John Banner ---


[twitter-dev] Re: Security Best Practices

2009-07-01 Thread DWRoelands

Andrew,

I'm not talking about a -library-.  I'm talking about a -client-.  If
I want to produce a Twitter client, it needs its own Consumer Key and
Consumer Key Secret.  If want to share the source code for that
client, I will also have to share it's Consumer Key and Consumer Key
Secret.

You seem to know what you're talking about; perhaps you have a
solution.  I have written a Twitter client.  This client is registered
with Twitter for OAuth.  How do I share the source code without
exposing the Consumer Key Secret and still allow the end users to
authenticate?

Regards,
Duane

On Jul 1, 10:48 am, Andrew Badera and...@badera.us wrote:
 Yes, but don't distribute it. Obviously config files are human
 readable, but you blank out secrets before publishing them.

 People using open source libraries will have to get their own keys.
 So, either you really are contributing in the spirit of open source,
 and you don't care about getting credit, or you're doing it for self
 promotional purposes, and the conversation is moot anyhow.

 You being any person worried about keys and open sourcing their libraries.



 On Wed, Jul 1, 2009 at 10:39 AM, Cameron Kaiserspec...@floodgap.com wrote:

  The secret should not reside in code. The secret should reside in a
  config file, or maybe even a machine datastore. Abstract it out, no
  one ever needs to see anything secret in your code.

  That's not workable. It has to be publicly accessible somehow.

  --
   
  personal:http://www.cameronkaiser.com/--
   Cameron Kaiser * Floodgap Systems *www.floodgap.com* ckai...@floodgap.com
  -- He hadn't a single redeeming vice. -- Oscar Wilde 
  --


[twitter-dev] Re: Security Best Practices

2009-07-01 Thread Cameron Kaiser

 The worst that happens if you publish the consumer tokens in an
 opensouce app is someone malicious uses it to abuse Twitter and the
 consumer token gets banned. At which point you regenerate a new one
 and push a new version of the app. The cycle may or may not start
 again depending on the malicious party.
 
 They can not act upon user accounts without the users going through
 the authorize flow. Using basic auth it is already possible to use any
 source and impersonate another application so not much is changing
 here except better security for web applications.

But the situation you state above is a bigger price to pay than if an
app is impersonated via basic auth. In basic auth, it's simply cosmetic.
In OAuth, you can certainly cause no small amount of turmoil by forcing
open source apps to push out new versions by no fault of their own. That's
not exactly an even playing field.

-- 
 personal: http://www.cameronkaiser.com/ --
  Cameron Kaiser * Floodgap Systems * www.floodgap.com * ckai...@floodgap.com
-- Man who live in glass house dress in basement. -


[twitter-dev] Re: Security Best Practices

2009-07-01 Thread Andrew Badera

Not what I said in the least, but it's interesting that you should
interpret it that way.

Re-read what I said.

If someone is open sourcing something, in the true spirit of open
source, they shouldn't care about getting credit in the source
parameter.

Thanks you and good night, I'm here all week, try the veal, don't
forget to tip your waitresses and angry developers.


On Wed, Jul 1, 2009 at 10:50 AM, Cameron Kaiserspec...@floodgap.com wrote:

 Yes, but don't distribute it. Obviously config files are human
 readable, but you blank out secrets before publishing them.

 People using open source libraries will have to get their own keys.
 So, either you really are contributing in the spirit of open source,
 and you don't care about getting credit, or you're doing it for self
 promotional purposes, and the conversation is moot anyhow.

 That's an asinine statement. So everybody who doesn't make their open
 source software anonymous is a publicity whore?

 --
  personal: http://www.cameronkaiser.com/ 
 --
  Cameron Kaiser * Floodgap Systems * www.floodgap.com * ckai...@floodgap.com
 -- In memory of John Banner 
 ---



[twitter-dev] Re: Security Best Practices

2009-07-01 Thread Cameron Kaiser

 Not what I said in the least, but it's interesting that you should
 interpret it that way.
 
 Re-read what I said.
 
 If someone is open sourcing something, in the true spirit of open
 source, they shouldn't care about getting credit in the source
 parameter.

Tell that to Richard Stallman.

-- 
 personal: http://www.cameronkaiser.com/ --
  Cameron Kaiser * Floodgap Systems * www.floodgap.com * ckai...@floodgap.com
-- Another visitor. Stay awhile. Stay forever! -- Professor Elvin Atombender --


[twitter-dev] Re: Security Best Practices

2009-07-01 Thread DWRoelands

Andrew,

This isn't about credit in the source parameter.  It's about
application security.

Twitter has stated that Basic Auth will eventually be deprecated.
OAuth will eventually be the only method of authentication available.
When that happens, developers of open source clients will be forced to
reveal their Consumer Key Secret.

This is a very real problem; open-source developers of desktop clients
will have to reveal their Consumer Key Secret.

Can we keep this discussion focused on the technical issues at hand,
rather than snarking about one another's motives?  It's not
productive.

Regards,
Duane


On Jul 1, 10:57 am, Andrew Badera and...@badera.us wrote:
 Not what I said in the least, but it's interesting that you should
 interpret it that way.

 Re-read what I said.

 If someone is open sourcing something, in the true spirit of open
 source, they shouldn't care about getting credit in the source
 parameter.

 Thanks you and good night, I'm here all week, try the veal, don't
 forget to tip your waitresses and angry developers.



 On Wed, Jul 1, 2009 at 10:50 AM, Cameron Kaiserspec...@floodgap.com wrote:

  Yes, but don't distribute it. Obviously config files are human
  readable, but you blank out secrets before publishing them.

  People using open source libraries will have to get their own keys.
  So, either you really are contributing in the spirit of open source,
  and you don't care about getting credit, or you're doing it for self
  promotional purposes, and the conversation is moot anyhow.

  That's an asinine statement. So everybody who doesn't make their open
  source software anonymous is a publicity whore?

  --
   
  personal:http://www.cameronkaiser.com/--
   Cameron Kaiser * Floodgap Systems *www.floodgap.com* ckai...@floodgap.com
  -- In memory of John Banner 
  ---


[twitter-dev] Re: Security Best Practices

2009-07-01 Thread Andrew Badera

Amen and thank you Matt.


On Wed, Jul 1, 2009 at 11:09 AM, Matt Sanfordm...@twitter.com wrote:


 On Jul 1, 2009, at 5:10 AM, Philip Plante wrote:


 I do not feel you've made a mountain out of a mole hill here.  This
 topic has been on my mind since I first encountered oAuth.  I haven't
 seen any open source apps use oAuth yet.

 We have an open source application called Application X.  The
 potential risk is that Application X becomes widely adopted, thus
 having a higher risk of being impersonated.  For instance, malware
 could then use the tokens from Application X to obtain authorization
 from Twitter.  This would require the user to authorize the
 impersonator via Twitter since it is likely a new session token would
 be generated.  Potentially the user would likely trust this
 impersonator and not think twice about authorizing it because they
 will see Application X on Twitter.com.  Once they click allow the
 impersonator has control of their account.  Even if the malware
 doesn't spread quickly it would possibly be harder to track since it
 would appear to be communications from Application X.

    One thing the above description leaves out is that not only would the
 user have to approve the application, but that since it is a desktop
 application they would have to type the PIN number back into the
 MalewareApp. Perhaps the PIN-flow for desktop applications was not taken
 into account, or maybe the wording on the PIN pages should be stronger, but
 that's pretty much why we added the PIN flow.
    In my mind server-side applications should not publish a consumer
 key/secret. There is an assumption here that anyone savvy enough to install
 your wildly successful open source server-side application can register a
 key/secret … and that they probably want callbacks going to the correct
 site. This is not unlike the current Twitter/OAuth libraries, which all
 require you to get your own key.



 I am not one to cry fowl over an issue like this, just merely throwing
 this out here as an idea.  Anyone else have any ideas how to secure
 open source oAuth apps?

 On Jul 1, 6:24 am, DWRoelands duane.roela...@gmail.com wrote:

 It seems as though revealing the Consumer Key and Consumer Key Secret
 of my application would be a pretty serious security risk.  Anyone
 could write an application that impersonates mine, but they still
 would need an authorized user's Token and Token Secret in order to
 commit mischief.

 What sort of nastiness could one do in the Twitter environment with
 someone else's Consumer Key and Consumer Key Secret?

 Am I making a mountain out of a molehill here?  If this is not a big
 deal, I'd like to hear so so I can continue working on my project as
 an open source endeavor.  If this is a serious security issue, then I
 have to close the source for my project (and obfuscate the source).

 --Duane

 On Jun 30, 9:29 pm, Alex Payne a...@twitter.com wrote:



 That's a solution that better fits open source Twitter web services. For
 an
 open source desktop client like Spaz it certainly doesn't work.

 On Tue, Jun 30, 2009 at 16:37, DWRoelands duane.roela...@gmail.com
 wrote:

 Wait, the solution is that every -user- of an open-source Twitter
 client would have to register for their own set of -consumer- keys?

 That's not what you meant, is it?

 On Jun 30, 4:39 pm, Alex Payne a...@twitter.com wrote:

 The simplest solution is that every deployment of the tool will have
 to
 register for their own OAuth credentials. This isn't ideal. I'd
 inquire

 over

 athttp://groups.google.com/group/oauth

 On Tue, Jun 30, 2009 at 06:04, DWRoelands duane.roela...@gmail.com

 wrote:

 This is really an excellent question.

 If we're developing an open-source Twitter client, how are we
 supposed
 to handle the consumer_key and consumer_key_secret?

 On Jun 29, 7:58 pm, Support supp...@yourhead.com wrote:

 2.  Obfuscation of the application's registered key and secret.
 Are there any best practices?  What about an open source project?

 --
 Alex Payne - Platform Lead, Twitter, Inc.http://twitter.com/al3x

 --
 Alex Payne - Platform Lead, Twitter, Inc.http://twitter.com/al3x




[twitter-dev] Re: How-To: Load the Twitter XML into a VB.Net XML Document...

2009-07-01 Thread Nancy Miracle

If you force datatyping to alpha, six chars, this will be a nonproblem

Sent from my iPhone

On Jul 1, 2009, at 8:00 AM, Obrzut sa...@peyoteuk.com wrote:


 Did I state otherwise?

 You are not reading my words - you are being blinded by the noise from
 your own head.

 What I stated is this;

 I authenticate my VB.NET web browser via PIN etc

 THIS means my browser is authenticated.

 If I try to access a page via the program with a TCP Client - I have
 to re-authenticate via PIN.

 This WAS a problem - my solution is to continue to use the web browser
 for authentication and extract the XML pages into an XML Document.

 Hence the above code.

 If you state otherwise - that you CAN use a TCP Client after already
 authenticating your VB.Net web browser - you are wrong.

 I imagine you think I am wrong - and that I am an idiot. Believe me -
 I am very skilled at programming. And this is my experience.

 The library is faulty. It does not process leading zero pins.

 The OAuth implementation is stupid - because it does not authenticate
 an program but a TCP method.

 Hence, you guys are s off the mark here it hurts me to talk to
 you.

 Really, srsly, it's pathetic that you DO NOT LISTEN.

 On Jul 1, 4:58 am, DWRoelands duane.roela...@gmail.com wrote:
 You can absolutely authenticate in a web page, even if your
 application is not a web application.  Mine works that way.

 Here's how it should go.  Bojan, please correct me if I'm wrong.

 1. Your application calls GetAuthorizationLink() to get the URL of  
 the
 authorization page (you've got this already).
 2. Your application opens a web browser to that link.  In .NET, you
 can do this with Process.Start(The URL that you get from
 GetAuthorizationLink).
 3. The user sees the six-digit PIN on the screen.
 4. Your application prompts the user to enter the six-digit PIN that
 they see.
 5. Your application calls GetAccessToken(), passing the six-digit PIN
 as the input parameter.
 6. The OAuth object has two properties that should now be populated:
 Token and TokenSecret.  These are the items you will use for all
 subsequent OAuth requests to Twitter.

 Your application should now be authorized via OAuth.

 On Jun 30, 8:58 pm, Obrzut sa...@peyoteuk.com wrote:



 This is because of OAuth. It uses HTML pages to validate. Perhaps  
 I am
 wrong - but once I use a web browser to validate - I cannot use a  
 TCP
 Client to get the XML because I authenticated via a web browser.  
 When
 I tried to (for example) send the pin back via a HTTP Web Request it
 failed. I am not sure if I am using the OAuth library Interface  
 Class
 I have for VB.NET correctly!?


[twitter-dev] Re: Security Best Practices

2009-07-01 Thread Abraham Williams

A technical solution I see working is a modified PIN flow where
instead of a 6 digit PIN the user gets a 20 character token that acts
as consumer token. No harder then using PIN flow but each desktop
install would have a unique consumer sub token that could still be
tied into the global consumer token.

Abraham

On Wed, Jul 1, 2009 at 10:11, Andrew Baderaand...@badera.us wrote:

 Amen and thank you Matt.


 On Wed, Jul 1, 2009 at 11:09 AM, Matt Sanfordm...@twitter.com wrote:


 On Jul 1, 2009, at 5:10 AM, Philip Plante wrote:


 I do not feel you've made a mountain out of a mole hill here.  This
 topic has been on my mind since I first encountered oAuth.  I haven't
 seen any open source apps use oAuth yet.

 We have an open source application called Application X.  The
 potential risk is that Application X becomes widely adopted, thus
 having a higher risk of being impersonated.  For instance, malware
 could then use the tokens from Application X to obtain authorization
 from Twitter.  This would require the user to authorize the
 impersonator via Twitter since it is likely a new session token would
 be generated.  Potentially the user would likely trust this
 impersonator and not think twice about authorizing it because they
 will see Application X on Twitter.com.  Once they click allow the
 impersonator has control of their account.  Even if the malware
 doesn't spread quickly it would possibly be harder to track since it
 would appear to be communications from Application X.

    One thing the above description leaves out is that not only would the
 user have to approve the application, but that since it is a desktop
 application they would have to type the PIN number back into the
 MalewareApp. Perhaps the PIN-flow for desktop applications was not taken
 into account, or maybe the wording on the PIN pages should be stronger, but
 that's pretty much why we added the PIN flow.
    In my mind server-side applications should not publish a consumer
 key/secret. There is an assumption here that anyone savvy enough to install
 your wildly successful open source server-side application can register a
 key/secret … and that they probably want callbacks going to the correct
 site. This is not unlike the current Twitter/OAuth libraries, which all
 require you to get your own key.



 I am not one to cry fowl over an issue like this, just merely throwing
 this out here as an idea.  Anyone else have any ideas how to secure
 open source oAuth apps?

 On Jul 1, 6:24 am, DWRoelands duane.roela...@gmail.com wrote:

 It seems as though revealing the Consumer Key and Consumer Key Secret
 of my application would be a pretty serious security risk.  Anyone
 could write an application that impersonates mine, but they still
 would need an authorized user's Token and Token Secret in order to
 commit mischief.

 What sort of nastiness could one do in the Twitter environment with
 someone else's Consumer Key and Consumer Key Secret?

 Am I making a mountain out of a molehill here?  If this is not a big
 deal, I'd like to hear so so I can continue working on my project as
 an open source endeavor.  If this is a serious security issue, then I
 have to close the source for my project (and obfuscate the source).

 --Duane

 On Jun 30, 9:29 pm, Alex Payne a...@twitter.com wrote:



 That's a solution that better fits open source Twitter web services. For
 an
 open source desktop client like Spaz it certainly doesn't work.

 On Tue, Jun 30, 2009 at 16:37, DWRoelands duane.roela...@gmail.com
 wrote:

 Wait, the solution is that every -user- of an open-source Twitter
 client would have to register for their own set of -consumer- keys?

 That's not what you meant, is it?

 On Jun 30, 4:39 pm, Alex Payne a...@twitter.com wrote:

 The simplest solution is that every deployment of the tool will have
 to
 register for their own OAuth credentials. This isn't ideal. I'd
 inquire

 over

 athttp://groups.google.com/group/oauth

 On Tue, Jun 30, 2009 at 06:04, DWRoelands duane.roela...@gmail.com

 wrote:

 This is really an excellent question.

 If we're developing an open-source Twitter client, how are we
 supposed
 to handle the consumer_key and consumer_key_secret?

 On Jun 29, 7:58 pm, Support supp...@yourhead.com wrote:

 2.  Obfuscation of the application's registered key and secret.
 Are there any best practices?  What about an open source project?

 --
 Alex Payne - Platform Lead, Twitter, Inc.http://twitter.com/al3x

 --
 Alex Payne - Platform Lead, Twitter, Inc.http://twitter.com/al3x






-- 
Abraham Williams | Community Evangelist | http://web608.org
Hacker | http://abrah.am | http://twitter.com/abraham
Project | http://fireeagle.labs.poseurtech.com
This email is: [ ] blogable [x] ask first [ ] private.


[twitter-dev] Re: Security Best Practices

2009-07-01 Thread Nancy Miracle


Sounds like the assumption is that part of the keypair is in the  
source.  That is clearly a bad idea ... The software should obly  
provide for processes and not ever content


Sent from my iPhone

On Jul 1, 2009, at 11:10 AM, Andrew Badera and...@badera.us wrote:



No one's snarking, but again, interesting you would interpret it  
that way.


Open source all you want, each person deploying an instance will have
to get their own keys. What's so tough about that?



On Wed, Jul 1, 2009 at 11:07 AM,  
DWRoelandsduane.roela...@gmail.com wrote:


Andrew,

This isn't about credit in the source parameter.  It's about
application security.

Twitter has stated that Basic Auth will eventually be deprecated.
OAuth will eventually be the only method of authentication available.
When that happens, developers of open source clients will be forced  
to

reveal their Consumer Key Secret.

This is a very real problem; open-source developers of desktop  
clients

will have to reveal their Consumer Key Secret.

Can we keep this discussion focused on the technical issues at hand,
rather than snarking about one another's motives?  It's not
productive.

Regards,
Duane


On Jul 1, 10:57 am, Andrew Badera and...@badera.us wrote:

Not what I said in the least, but it's interesting that you should
interpret it that way.

Re-read what I said.

If someone is open sourcing something, in the true spirit of open
source, they shouldn't care about getting credit in the source
parameter.

Thanks you and good night, I'm here all week, try the veal, don't
forget to tip your waitresses and angry developers.



On Wed, Jul 1, 2009 at 10:50 AM, Cameron  
Kaiserspec...@floodgap.com wrote:



Yes, but don't distribute it. Obviously config files are human
readable, but you blank out secrets before publishing them.


People using open source libraries will have to get their own  
keys.
So, either you really are contributing in the spirit of open  
source,
and you don't care about getting credit, or you're doing it for  
self

promotional purposes, and the conversation is moot anyhow.


That's an asinine statement. So everybody who doesn't make their  
open

source software anonymous is a publicity whore?



--
 personal:http://www.cameronkaiser.com/--
 Cameron Kaiser * Floodgap Systems *www.floodgap.com*  
ckai...@floodgap.com
-- In memory of John Banner  
---




[twitter-dev] Re: Security Best Practices

2009-07-01 Thread DWRoelands

Nancy,

You're right - it is a bad idea.  However, it appears to be the only
option that Twitter has left to open-source developers who wish to
implement OAuth.  There doesn't seem to be any way around distributing
my application's Consumer Key Secret.

Regards,
Duane


On Jul 1, 11:17 am, Nancy Miracle nmira...@gmail.com wrote:
 Sounds like the assumption is that part of the keypair is in the  
 source.  That is clearly a bad idea ... The software should obly  
 provide for processes and not ever content

 Sent from my iPhone

 On Jul 1, 2009, at 11:10 AM, Andrew Badera and...@badera.us wrote:





  No one's snarking, but again, interesting you would interpret it  
  that way.

  Open source all you want, each person deploying an instance will have
  to get their own keys. What's so tough about that?

  On Wed, Jul 1, 2009 at 11:07 AM,  
  DWRoelandsduane.roela...@gmail.com wrote:

  Andrew,

  This isn't about credit in the source parameter.  It's about
  application security.

  Twitter has stated that Basic Auth will eventually be deprecated.
  OAuth will eventually be the only method of authentication available.
  When that happens, developers of open source clients will be forced  
  to
  reveal their Consumer Key Secret.

  This is a very real problem; open-source developers of desktop  
  clients
  will have to reveal their Consumer Key Secret.

  Can we keep this discussion focused on the technical issues at hand,
  rather than snarking about one another's motives?  It's not
  productive.

  Regards,
  Duane

  On Jul 1, 10:57 am, Andrew Badera and...@badera.us wrote:
  Not what I said in the least, but it's interesting that you should
  interpret it that way.

  Re-read what I said.

  If someone is open sourcing something, in the true spirit of open
  source, they shouldn't care about getting credit in the source
  parameter.

  Thanks you and good night, I'm here all week, try the veal, don't
  forget to tip your waitresses and angry developers.

  On Wed, Jul 1, 2009 at 10:50 AM, Cameron  
  Kaiserspec...@floodgap.com wrote:

  Yes, but don't distribute it. Obviously config files are human
  readable, but you blank out secrets before publishing them.

  People using open source libraries will have to get their own  
  keys.
  So, either you really are contributing in the spirit of open  
  source,
  and you don't care about getting credit, or you're doing it for  
  self
  promotional purposes, and the conversation is moot anyhow.

  That's an asinine statement. So everybody who doesn't make their  
  open
  source software anonymous is a publicity whore?

  --
   
  personal:http://www.cameronkaiser.com/--
   Cameron Kaiser * Floodgap Systems *www.floodgap.com* 
  ckai...@floodgap.com
  -- In memory of John Banner  
  ---


[twitter-dev] Re: Security Best Practices

2009-07-01 Thread JDG
The problem is that by everyone getting their own consumer keys, the source
parameter will be different for every person. Now, I'm not interested in
getting my name in lights in the Twitter world -- I could honestly care
less. That said, if I'm going to spend a significant portion of my time
creating an open source app for people to enjoy, I'd like for people to
actually know that they can use it, and the source parameter is by far the
easiest way to accomplish that.

On Wed, Jul 1, 2009 at 09:10, Andrew Badera and...@badera.us wrote:


 No one's snarking, but again, interesting you would interpret it that way.

 Open source all you want, each person deploying an instance will have
 to get their own keys. What's so tough about that?



 On Wed, Jul 1, 2009 at 11:07 AM, DWRoelandsduane.roela...@gmail.com
 wrote:
 
  Andrew,
 
  This isn't about credit in the source parameter.  It's about
  application security.
 
  Twitter has stated that Basic Auth will eventually be deprecated.
  OAuth will eventually be the only method of authentication available.
  When that happens, developers of open source clients will be forced to
  reveal their Consumer Key Secret.
 
  This is a very real problem; open-source developers of desktop clients
  will have to reveal their Consumer Key Secret.
 
  Can we keep this discussion focused on the technical issues at hand,
  rather than snarking about one another's motives?  It's not
  productive.
 
  Regards,
  Duane
 
 
  On Jul 1, 10:57 am, Andrew Badera and...@badera.us wrote:
  Not what I said in the least, but it's interesting that you should
  interpret it that way.
 
  Re-read what I said.
 
  If someone is open sourcing something, in the true spirit of open
  source, they shouldn't care about getting credit in the source
  parameter.
 
  Thanks you and good night, I'm here all week, try the veal, don't
  forget to tip your waitresses and angry developers.
 
 
 
  On Wed, Jul 1, 2009 at 10:50 AM, Cameron Kaiserspec...@floodgap.com
 wrote:
 
   Yes, but don't distribute it. Obviously config files are human
   readable, but you blank out secrets before publishing them.
 
   People using open source libraries will have to get their own keys.
   So, either you really are contributing in the spirit of open source,
   and you don't care about getting credit, or you're doing it for self
   promotional purposes, and the conversation is moot anyhow.
 
   That's an asinine statement. So everybody who doesn't make their open
   source software anonymous is a publicity whore?
 
   --
    personal:
 http://www.cameronkaiser.com/--
Cameron Kaiser * Floodgap Systems *www.floodgap.com*
 ckai...@floodgap.com
   -- In memory of John Banner
 ---
 




-- 
Internets. Serious business.


[twitter-dev] Re: Security Best Practices

2009-07-01 Thread DWRoelands

Actually, since Twitter has said that Basic Auth will eventually go
away, OAuth is going to be the only choice for authentication.
Twitter has forced the choice by implementing OAuth in the way that
they did.

Why should a user who chooses to support open source by using an open-
source Twitter client be punished by having to go through extra hoops
that users of closed-source clients don't have to endure?

Forcing users of open source Twitter clients to register their
individual installations as Twitter applications is not a viable
solution.  Matt Sanford has even said so.

No one is asking for easy.  I just want open source Twitter desktop
clients to be able to compete with closed-source versions when it
comes to security.  Right now, that's not possible because of
Twitter's implementation of OAuth.

Regards,
Duane

On Jul 1, 11:23 am, Andrew Badera and...@badera.us wrote:
 But that's the choice you're forced to make by OAuth, not Twitter. And
 it is YOUR choice. Personally, I would probably use the conventional
 mechanisms of open source: mailing lists, special interest and user
 groups. Pound the pavement and promote yourself. Who said it was going
 to be easy?


[twitter-dev] Re: Security Best Practices

2009-07-01 Thread Bruce Brown

How difficult is it to, as part of the build, check for a key file, if  
it doesn't exist, go to Twitter and do the stuff to get the tokens,  
parse the tokens and save in the key file, and then continue on with  
the build. Seems easy enuff.

-- Bruce
Sent from my iPhone

On Jul 1, 2009, at 8:23 AM, Andrew Badera and...@badera.us wrote:


 But that's the choice you're forced to make by OAuth, not Twitter. And
 it is YOUR choice. Personally, I would probably use the conventional
 mechanisms of open source: mailing lists, special interest and user
 groups. Pound the pavement and promote yourself. Who said it was going
 to be easy?


 On Wed, Jul 1, 2009 at 11:22 AM, JDGghil...@gmail.com wrote:
 The problem is that by everyone getting their own consumer keys,  
 the source
 parameter will be different for every person. Now, I'm not  
 interested in
 getting my name in lights in the Twitter world -- I could honestly  
 care
 less. That said, if I'm going to spend a significant portion of my  
 time
 creating an open source app for people to enjoy, I'd like for  
 people to
 actually know that they can use it, and the source parameter is by  
 far the
 easiest way to accomplish that.

 On Wed, Jul 1, 2009 at 09:10, Andrew Badera and...@badera.us wrote:

 No one's snarking, but again, interesting you would interpret it  
 that way.

 Open source all you want, each person deploying an instance will  
 have
 to get their own keys. What's so tough about that?



 On Wed, Jul 1, 2009 at 11:07 AM,  
 DWRoelandsduane.roela...@gmail.com
 wrote:

 Andrew,

 This isn't about credit in the source parameter.  It's about
 application security.

 Twitter has stated that Basic Auth will eventually be deprecated.
 OAuth will eventually be the only method of authentication  
 available.
 When that happens, developers of open source clients will be  
 forced to
 reveal their Consumer Key Secret.

 This is a very real problem; open-source developers of desktop  
 clients
 will have to reveal their Consumer Key Secret.

 Can we keep this discussion focused on the technical issues at  
 hand,
 rather than snarking about one another's motives?  It's not
 productive.

 Regards,
 Duane


 On Jul 1, 10:57 am, Andrew Badera and...@badera.us wrote:
 Not what I said in the least, but it's interesting that you should
 interpret it that way.

 Re-read what I said.

 If someone is open sourcing something, in the true spirit of open
 source, they shouldn't care about getting credit in the source
 parameter.

 Thanks you and good night, I'm here all week, try the veal, don't
 forget to tip your waitresses and angry developers.



 On Wed, Jul 1, 2009 at 10:50 AM, Cameron  
 Kaiserspec...@floodgap.com
 wrote:

 Yes, but don't distribute it. Obviously config files are human
 readable, but you blank out secrets before publishing them.

 People using open source libraries will have to get their own  
 keys.
 So, either you really are contributing in the spirit of open  
 source,
 and you don't care about getting credit, or you're doing it  
 for self
 promotional purposes, and the conversation is moot anyhow.

 That's an asinine statement. So everybody who doesn't make  
 their open
 source software anonymous is a publicity whore?

 --
 
 personal:http://www.cameronkaiser.com/--
  Cameron Kaiser * Floodgap Systems *www.floodgap.com*
 ckai...@floodgap.com
 -- In memory of John Banner
 ---




 --
 Internets. Serious business.



[twitter-dev] Re: Security Best Practices

2009-07-01 Thread Matt Sanford


Hello again,

I do not recommend having individual end users register for  
consumer keys/secrets [1] under any circumstances. So, with that out  
of the way, let us focus the discussion a bit more. What can we change  
about OAuth that would make this better? A complete technical [2][3]  
discussion on what we could add that would make this better is  
welcomed. More than welcome, it's pretty much required before we can  
help.
The PIN flow was the first addition to address the inherent  
insecurity of the consumer key/secret all desktop applications [3].  
This stopped applications from being able to collect tokens by using  
the consumer key/secret and a confidence scam (phishing like GoodApp  
needs you to re-approve us). It sounds like there is a fervent need  
for something more … what do people suggest? We're working hard on the  
problem but many of you are working from the consumer standpoint and  
probably have great feedback.
Please, take your time and write a well thought out reply. One- 
line snarky comments, while fun to write and sometimes to read, steal  
time from everyone reading the list, including all of the Twitter API  
engineers. They also make the list look less inviting to new comers.


Thanks;
 – Matt Sanford / @mzsanford
 Twitter Dev

[1] - People installing an instance of your server-side app are not  
'end users', but other developers

[2] - Not open-source hand waving.
[3] - Closed source desktop apps have the same problem. Reverse  
engineering is not stopped when you don't include the source.


On Jul 1, 2009, at 9:33 AM, DWRoelands wrote:



Actually, since Twitter has said that Basic Auth will eventually go
away, OAuth is going to be the only choice for authentication.
Twitter has forced the choice by implementing OAuth in the way that
they did.

Why should a user who chooses to support open source by using an open-
source Twitter client be punished by having to go through extra hoops
that users of closed-source clients don't have to endure?

Forcing users of open source Twitter clients to register their
individual installations as Twitter applications is not a viable
solution.  Matt Sanford has even said so.

No one is asking for easy.  I just want open source Twitter desktop
clients to be able to compete with closed-source versions when it
comes to security.  Right now, that's not possible because of
Twitter's implementation of OAuth.

Regards,
Duane

On Jul 1, 11:23 am, Andrew Badera and...@badera.us wrote:
But that's the choice you're forced to make by OAuth, not Twitter.  
And

it is YOUR choice. Personally, I would probably use the conventional
mechanisms of open source: mailing lists, special interest and user
groups. Pound the pavement and promote yourself. Who said it was  
going

to be easy?




[twitter-dev] Re: Security Best Practices

2009-07-01 Thread DWRoelands

I'm not sure that Twitter exposes any API or web service that allows
you to programatically register a new application (which you need to
do to receive the Consumer Key and Consumer Key Secret).

Even if you could, that still requires the end user to compile the
source with a modified build process.  Requiring Windows users to
compile source code in order to use the app is not a great solution.

Any solution to the problem should be as transparent to the user as
possible.  They shouldn't be burdened with extra steps or procedures
because they chose an open source client.


On Jul 1, 12:39 pm, Bruce Brown bruce1...@cox.net wrote:
 How difficult is it to, as part of the build, check for a key file, if  
 it doesn't exist, go to Twitter and do the stuff to get the tokens,  
 parse the tokens and save in the key file, and then continue on with  
 the build. Seems easy enuff.


[twitter-dev] Re: Security Best Practices

2009-07-01 Thread Abraham Williams

I think this got lost under all the mess:

On Wed, Jul 1, 2009 at 10:15, Abraham Williams4bra...@gmail.com wrote:
 A technical solution I see working is a modified PIN flow where
 instead of a 6 digit PIN the user gets a 20 character token that acts
 as consumer token. No harder then using PIN flow but each desktop
 install would have a unique consumer sub token that could still be
 tied into the global consumer token.

 Abraham



-- 
Abraham Williams | Community Evangelist | http://web608.org
Hacker | http://abrah.am | http://twitter.com/abraham
Project | http://fireeagle.labs.poseurtech.com
This email is: [ ] blogable [x] ask first [ ] private.


[twitter-dev] Re: How-To: Load the Twitter XML into a VB.Net XML Document...

2009-07-01 Thread Bojan Rajkovic

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
 
DWRoelands wrote:
 Obrzut:
 My application does exactly what you say is impossible.  The user
 authenticates via the web browser, then my desktop application
 completes the process using the six-digit PIN.

 There's no need to fix any XML that comes from Twitter, and there's
 no need to process any HTML from a web page.

 I'd be happy to help you work through the issues you're having with
 your application, but please stop insisting that you're smarter than
 everyone else here.

 Bojan:
 Obrzut's right about the GetAccessToken() call in the Twarp code.
 GetAccessToken accepts the PIN as an Int; that should be a string so
 that leading zeroes don't get stripped.  I haven't seen any PINs with
 a leading zero, but that doesn't mean they don't occur. :)

 --Duane

 On Jul 1, 8:00 am, Obrzut sa...@peyoteuk.com wrote:
 If you state otherwise - that you CAN use a TCP Client after already
 authenticating your VB.Net web browser - you are wrong.
Duane,

That's right, I did not think about that. Alternatively, I could
provide an overload that takes a string, and force the padding to 6
digits for the integer overloads. Operator overloading is a wonderful
thing when it comes to providing choice.

Regards,
Bojan
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
 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=9XAP
-END PGP SIGNATURE-



[twitter-dev] Re: Security Best Practices

2009-07-01 Thread DWRoelands

Mark,

Thanks for weighing in.  Much appreciated.  Here are my thoughts.

I see two separate issues here: User Authentication vs. Application
Authentication.

User Authentication: Ensuring that the Twitter user is who they say
they are.
Application Authentication: Ensuring that the Application is who it
says it is (i.e. the tweet is really coming from TweetDeck and not
some other application pretending to be TweetDeck).

User Authentication:
I understand that Basic Auth, as is, is not a secure solution.
Transmitting unencrypted credentials in the clear is never a great
idea.  What about combining Basic Auth with a form of public/private
key encryption?  Using PGP as an example, Twitter could publish it's
public PGP key.  Applications using Basic Auth would have to encrypt
the username and password with that key and submit the encrypted
username and password as the Basic Auth credentials.  Twitter decrypts
them server side and processes authentication normally.  Developers
wouldn't have to include any sensitive information in their source
code, and the credentials would always be transmitted in an encrypted
fashion.  PGP is a fairly robust standard, with lots of free resources
available to the development community across many languages.

Application Authentication:
This is a thornier issue that I'm not sure how to solve without having
to bundle some sort of sensitive information in the source code of an
application.  However, I think the issue becomes more manageable if
User Authentication is separated from Application Authentication.

I have no doubt that many of the folks on this list have good ideas on
how to solve the second problem.

Thoughts

Regards,
Duane

On Jul 1, 12:46 pm, Matt Sanford m...@twitter.com wrote:

      Please, take your time and write a well thought out reply. One-
 line snarky comments, while fun to write and sometimes to read, steal  
 time from everyone reading the list, including all of the Twitter API  
 engineers. They also make the list look less inviting to new comers.


[twitter-dev] Re: Use Twitter for login oauth/authenticate method

2009-07-01 Thread Isaiah Carew


I'm still not sure I understand the option.  Is there any reason why  
someone would choose NOT to check this box currently?


Also, if you are in the process of redesigning the auth page, could I  
make a request:
Could there be a super-lightweight version for mobile?  No images, no  
scripts, inline css, fluid width, etc.


Maybe it already exists and I'm doing something wrong.  Feel free to  
point me in the right direction too.  ;-)


Isaiah

On Jul 1, 2009, at 7:50 AM, Matt Sanford wrote:



Hi Arnaud,

   That option during application creation is really more trouble  
that it is worth. Right now applications that have that option  
checked include an extra sentence to tell users the application will  
be using twitter for login, that's all. In the future we may  
restrict the /oauth/authenticate call to applications that have  
specifically chosen the option, so I recommend that any application  
using 'Sing in with Twitter' check the check box. We're also working  
on redesigning the authorization page and might do more with that  
value then.
   We will announce before hand if we make any changes, like  
requiring that value to use the authenticate method. It's not  
something we'll definitely do but it is something that may come up  
in the medium term you should be aware of.


Thanks;
– Matt Sanford / @mzsanford
Twitter Dev

On Jul 1, 2009, at 4:26 AM, Arnaud wrote:



Hello,

I’m using the oauth/authenticate method (one click login) and I was
wondering if I had to check the Use Twitter for login option in my
application options. The application is Browser based (using a
callback URL) .

I’m quite confused with this option as I don’t really understand what
it is standing for?

All the best,
Arnaud.






[twitter-dev] Re: Use Twitter for login oauth/authenticate method

2009-07-01 Thread Matt Sanford


Hi there,

A mobile version does not exist but it's on the roadmap.

— Matt

On Jul 1, 2009, at 10:21 AM, Isaiah Carew wrote:



I'm still not sure I understand the option.  Is there any reason why  
someone would choose NOT to check this box currently?


Also, if you are in the process of redesigning the auth page, could  
I make a request:
Could there be a super-lightweight version for mobile?  No images,  
no scripts, inline css, fluid width, etc.


Maybe it already exists and I'm doing something wrong.  Feel free to  
point me in the right direction too.  ;-)


Isaiah

On Jul 1, 2009, at 7:50 AM, Matt Sanford wrote:



Hi Arnaud,

   That option during application creation is really more trouble  
that it is worth. Right now applications that have that option  
checked include an extra sentence to tell users the application  
will be using twitter for login, that's all. In the future we may  
restrict the /oauth/authenticate call to applications that have  
specifically chosen the option, so I recommend that any application  
using 'Sing in with Twitter' check the check box. We're also  
working on redesigning the authorization page and might do more  
with that value then.
   We will announce before hand if we make any changes, like  
requiring that value to use the authenticate method. It's not  
something we'll definitely do but it is something that may come up  
in the medium term you should be aware of.


Thanks;
– Matt Sanford / @mzsanford
Twitter Dev

On Jul 1, 2009, at 4:26 AM, Arnaud wrote:



Hello,

I’m using the oauth/authenticate method (one click login) and I was
wondering if I had to check the Use Twitter for login option in my
application options. The application is Browser based (using a
callback URL) .

I’m quite confused with this option as I don’t really understand  
what

it is standing for?

All the best,
Arnaud.








[twitter-dev] Re: Security Best Practices

2009-07-01 Thread Support


Matt,

Thanks for weighing in and hopefully taming this snarl.  As the person  
who might have posed the question originally, I figured I at least  
owed a bit of constructive critique.



What can we change about OAuth that would make this better?


1) User experience - it's been echoed a number of times in this board,  
so i won't beat the dead horse...   much...but basic auth *is*  
much simpler for the user.
The reason is obvious:  oauth requires a browser. In many platforms  
(especially mobile) that's a painful burden.


The PIN code seems to be ignoring the elephant in the room.  It solves  
some problems, but at a further cost to the user experience, giving an  
even larger advantage to existing basic-auth apps.
You've made the pill even more effective, but so bitter that your  
patients can't swallow it.


Providing a scheme that does not require a browser is an obvious way  
to cut this gordian knot.



2) Application authentication - if your goal is to *identify* each  
open source application in a *trusted* way, then I think you could be  
in for an uphill battle.  There are obvious technical challenges,  
however the larger problem is that in OSS there is no way to define  
each application.  There will be many binaries for different  
platforms and people will fork it on github just because they can.   
You cannot identify each of these variants as the same when they could  
be different.


And that places a burden on the user experience.  When a user grants  
access to application x -- what does that mean exactly?  Just that  
binary?  Just this release?  Only from a specific trusted company?   
How do you explain to the user where this subtle line is drawn in a  
box he'll click through in less than a second?


I personally don't see an obvious solution to this problem.  It seems  
to be a UI challenge and a technical challenge.  In cases like that it  
seems prudent to question your goals and check feasibility.



Isaiah

YourHead Software
supp...@yourhead.com
http://www.yourhead.com



On Jul 1, 2009, at 9:46 AM, Matt Sanford wrote:



Hello again,

   I do not recommend having individual end users register for  
consumer keys/secrets [1] under any circumstances. So, with that out  
of the way, let us focus the discussion a bit more. What can we  
change about OAuth that would make this better? A complete technical  
[2][3] discussion on what we could add that would make this better  
is welcomed. More than welcome, it's pretty much required before we  
can help.
   The PIN flow was the first addition to address the inherent  
insecurity of the consumer key/secret all desktop applications [3].  
This stopped applications from being able to collect tokens by using  
the consumer key/secret and a confidence scam (phishing like  
GoodApp needs you to re-approve us). It sounds like there is a  
fervent need for something more … what do people suggest? We're  
working hard on the problem but many of you are working from the  
consumer standpoint and probably have great feedback.
   Please, take your time and write a well thought out reply. One- 
line snarky comments, while fun to write and sometimes to read,  
steal time from everyone reading the list, including all of the  
Twitter API engineers. They also make the list look less inviting to  
new comers.


Thanks;
– Matt Sanford / @mzsanford
Twitter Dev

[1] - People installing an instance of your server-side app are not  
'end users', but other developers

[2] - Not open-source hand waving.
[3] - Closed source desktop apps have the same problem. Reverse  
engineering is not stopped when you don't include the source.


On Jul 1, 2009, at 9:33 AM, DWRoelands wrote:



Actually, since Twitter has said that Basic Auth will eventually go
away, OAuth is going to be the only choice for authentication.
Twitter has forced the choice by implementing OAuth in the way that
they did.

Why should a user who chooses to support open source by using an  
open-

source Twitter client be punished by having to go through extra hoops
that users of closed-source clients don't have to endure?

Forcing users of open source Twitter clients to register their
individual installations as Twitter applications is not a viable
solution.  Matt Sanford has even said so.

No one is asking for easy.  I just want open source Twitter desktop
clients to be able to compete with closed-source versions when it
comes to security.  Right now, that's not possible because of
Twitter's implementation of OAuth.

Regards,
Duane

On Jul 1, 11:23 am, Andrew Badera and...@badera.us wrote:
But that's the choice you're forced to make by OAuth, not Twitter.  
And

it is YOUR choice. Personally, I would probably use the conventional
mechanisms of open source: mailing lists, special interest and user
groups. Pound the pavement and promote yourself. Who said it was  
going

to be easy?






[twitter-dev] Re: Use Twitter for login oauth/authenticate method

2009-07-01 Thread Support


Super!

Thanks,
Isaiah

YourHead Software
supp...@yourhead.com
http://www.yourhead.com



On Jul 1, 2009, at 10:23 AM, Matt Sanford wrote:



Hi there,

   A mobile version does not exist but it's on the roadmap.

— Matt

On Jul 1, 2009, at 10:21 AM, Isaiah Carew wrote:



I'm still not sure I understand the option.  Is there any reason  
why someone would choose NOT to check this box currently?


Also, if you are in the process of redesigning the auth page, could  
I make a request:
Could there be a super-lightweight version for mobile?  No images,  
no scripts, inline css, fluid width, etc.


Maybe it already exists and I'm doing something wrong.  Feel free  
to point me in the right direction too.  ;-)


Isaiah

On Jul 1, 2009, at 7:50 AM, Matt Sanford wrote:



Hi Arnaud,

  That option during application creation is really more trouble  
that it is worth. Right now applications that have that option  
checked include an extra sentence to tell users the application  
will be using twitter for login, that's all. In the future we may  
restrict the /oauth/authenticate call to applications that have  
specifically chosen the option, so I recommend that any  
application using 'Sing in with Twitter' check the check box.  
We're also working on redesigning the authorization page and might  
do more with that value then.
  We will announce before hand if we make any changes, like  
requiring that value to use the authenticate method. It's not  
something we'll definitely do but it is something that may come up  
in the medium term you should be aware of.


Thanks;
– Matt Sanford / @mzsanford
   Twitter Dev

On Jul 1, 2009, at 4:26 AM, Arnaud wrote:



Hello,

I’m using the oauth/authenticate method (one click login) and I was
wondering if I had to check the Use Twitter for login option in  
my

application options. The application is Browser based (using a
callback URL) .

I’m quite confused with this option as I don’t really understand  
what

it is standing for?

All the best,
Arnaud.










[twitter-dev] Re: Security Best Practices

2009-07-01 Thread Neil Ellis
On a completely separate note, your website is stunning, did you  
design it yourself? If not may I ask who were your designers.

All the best
Neil
http://www.peepwl.com

On 1 Jul 2009, at 20:22, Support wrote:


 Matt,

 Thanks for weighing in and hopefully taming this snarl.  As the  
 person who might have posed the question originally, I figured I at  
 least owed a bit of constructive critique.

 What can we change about OAuth that would make this better?

 1) User experience - it's been echoed a number of times in this  
 board, so i won't beat the dead horse...   much...but basic auth  
 *is* much simpler for the user.
 The reason is obvious:  oauth requires a browser. In many platforms  
 (especially mobile) that's a painful burden.

 The PIN code seems to be ignoring the elephant in the room.  It  
 solves some problems, but at a further cost to the user experience,  
 giving an even larger advantage to existing basic-auth apps.
 You've made the pill even more effective, but so bitter that your  
 patients can't swallow it.

 Providing a scheme that does not require a browser is an obvious way  
 to cut this gordian knot.


 2) Application authentication - if your goal is to *identify* each  
 open source application in a *trusted* way, then I think you could  
 be in for an uphill battle.  There are obvious technical challenges,  
 however the larger problem is that in OSS there is no way to define  
 each application.  There will be many binaries for different  
 platforms and people will fork it on github just because they can.   
 You cannot identify each of these variants as the same when they  
 could be different.

 And that places a burden on the user experience.  When a user grants  
 access to application x -- what does that mean exactly?  Just that  
 binary?  Just this release?  Only from a specific trusted company?   
 How do you explain to the user where this subtle line is drawn in a  
 box he'll click through in less than a second?

 I personally don't see an obvious solution to this problem.  It  
 seems to be a UI challenge and a technical challenge.  In cases like  
 that it seems prudent to question your goals and check feasibility.


 Isaiah

 YourHead Software
 supp...@yourhead.com
 http://www.yourhead.com



 On Jul 1, 2009, at 9:46 AM, Matt Sanford wrote:


 Hello again,

I do not recommend having individual end users register for  
 consumer keys/secrets [1] under any circumstances. So, with that  
 out of the way, let us focus the discussion a bit more. What can we  
 change about OAuth that would make this better? A complete  
 technical [2][3] discussion on what we could add that would make  
 this better is welcomed. More than welcome, it's pretty much  
 required before we can help.
The PIN flow was the first addition to address the inherent  
 insecurity of the consumer key/secret all desktop applications [3].  
 This stopped applications from being able to collect tokens by  
 using the consumer key/secret and a confidence scam (phishing like  
 GoodApp needs you to re-approve us). It sounds like there is a  
 fervent need for something more … what do people suggest? We're  
 working hard on the problem but many of you are working from the  
 consumer standpoint and probably have great feedback.
Please, take your time and write a well thought out reply. One- 
 line snarky comments, while fun to write and sometimes to read,  
 steal time from everyone reading the list, including all of the  
 Twitter API engineers. They also make the list look less inviting  
 to new comers.

 Thanks;
 – Matt Sanford / @mzsanford
 Twitter Dev

 [1] - People installing an instance of your server-side app are not  
 'end users', but other developers
 [2] - Not open-source hand waving.
 [3] - Closed source desktop apps have the same problem. Reverse  
 engineering is not stopped when you don't include the source.

 On Jul 1, 2009, at 9:33 AM, DWRoelands wrote:


 Actually, since Twitter has said that Basic Auth will eventually go
 away, OAuth is going to be the only choice for authentication.
 Twitter has forced the choice by implementing OAuth in the way that
 they did.

 Why should a user who chooses to support open source by using an  
 open-
 source Twitter client be punished by having to go through extra  
 hoops
 that users of closed-source clients don't have to endure?

 Forcing users of open source Twitter clients to register their
 individual installations as Twitter applications is not a viable
 solution.  Matt Sanford has even said so.

 No one is asking for easy.  I just want open source Twitter  
 desktop
 clients to be able to compete with closed-source versions when it
 comes to security.  Right now, that's not possible because of
 Twitter's implementation of OAuth.

 Regards,
 Duane

 On Jul 1, 11:23 am, Andrew Badera and...@badera.us wrote:
 But that's the choice you're forced to make by OAuth, not  
 Twitter. And
 it is YOUR choice. Personally, I 

[twitter-dev] Re: Security Best Practices

2009-07-01 Thread Matt Sanford



On Jul 1, 2009, at 10:17 AM, DWRoelands wrote:



Mark,

Thanks for weighing in.  Much appreciated.  Here are my thoughts.

I see two separate issues here: User Authentication vs. Application
Authentication.

User Authentication: Ensuring that the Twitter user is who they say
they are.
Application Authentication: Ensuring that the Application is who it
says it is (i.e. the tweet is really coming from TweetDeck and not
some other application pretending to be TweetDeck).

User Authentication:
I understand that Basic Auth, as is, is not a secure solution.
Transmitting unencrypted credentials in the clear is never a great
idea.  What about combining Basic Auth with a form of public/private
key encryption?  Using PGP as an example, Twitter could publish it's
public PGP key.  Applications using Basic Auth would have to encrypt
the username and password with that key and submit the encrypted
username and password as the Basic Auth credentials.  Twitter decrypts
them server side and processes authentication normally.  Developers
wouldn't have to include any sensitive information in their source
code, and the credentials would always be transmitted in an encrypted
fashion.  PGP is a fairly robust standard, with lots of free resources
available to the development community across many languages.


Rather than breaking with the HTTP specification for Basic  
authentication we offer HTTP over SSL for encrypted access. That adds  
the benefits you enumerate above plus:


 * Requires very little coding from developers (most libraries  
support it)

 * Built on an open standard
 * Prevents re-using an Authentication header (even one encrypted) to  
essentially act like a user.
 * Bonus: Encrypts the contents so nobody else is reading your DMs on  
the wire




Application Authentication:
This is a thornier issue that I'm not sure how to solve without having
to bundle some sort of sensitive information in the source code of an
application.  However, I think the issue becomes more manageable if
User Authentication is separated from Application Authentication.


This seems to be the crux of the issue from what I can tell. Isaiah  
from youhead enumerated some of the difficulties with that, especially  
for open source.




I have no doubt that many of the folks on this list have good ideas on
how to solve the second problem.

Thoughts

Regards,
Duane

On Jul 1, 12:46 pm, Matt Sanford m...@twitter.com wrote:


 Please, take your time and write a well thought out reply. One-
line snarky comments, while fun to write and sometimes to read, steal
time from everyone reading the list, including all of the Twitter API
engineers. They also make the list look less inviting to new comers.




[twitter-dev] Re: off topic

2009-07-01 Thread Isaiah Carew


yep, just me,

thanks,
isaiah

p.s. subject changed to protect the on-topic folks.  @isaiah for  
more.  ;-)


On Jul 1, 2009, at 12:27 PM, Neil Ellis wrote:

On a completely separate note, your website is stunning, did you  
design it yourself? If not may I ask who were your designers.


All the best
Neil
http://www.peepwl.com

On 1 Jul 2009, at 20:22, Support wrote:



Matt,

Thanks for weighing in and hopefully taming this snarl.  As the  
person who might have posed the question originally, I figured I at  
least owed a bit of constructive critique.



What can we change about OAuth that would make this better?


1) User experience - it's been echoed a number of times in this  
board, so i won't beat the dead horse...   much...but basic  
auth *is* much simpler for the user.
The reason is obvious:  oauth requires a browser. In many platforms  
(especially mobile) that's a painful burden.


The PIN code seems to be ignoring the elephant in the room.  It  
solves some problems, but at a further cost to the user experience,  
giving an even larger advantage to existing basic-auth apps.
You've made the pill even more effective, but so bitter that your  
patients can't swallow it.


Providing a scheme that does not require a browser is an obvious  
way to cut this gordian knot.



2) Application authentication - if your goal is to *identify* each  
open source application in a *trusted* way, then I think you could  
be in for an uphill battle.  There are obvious technical  
challenges, however the larger problem is that in OSS there is no  
way to define each application.  There will be many binaries for  
different platforms and people will fork it on github just because  
they can.  You cannot identify each of these variants as the same  
when they could be different.


And that places a burden on the user experience.  When a user  
grants access to application x -- what does that mean exactly?   
Just that binary?  Just this release?  Only from a specific trusted  
company?  How do you explain to the user where this subtle line is  
drawn in a box he'll click through in less than a second?


I personally don't see an obvious solution to this problem.  It  
seems to be a UI challenge and a technical challenge.  In cases  
like that it seems prudent to question your goals and check  
feasibility.



Isaiah

YourHead Software
supp...@yourhead.com
http://www.yourhead.com



On Jul 1, 2009, at 9:46 AM, Matt Sanford wrote:



Hello again,

   I do not recommend having individual end users register for  
consumer keys/secrets [1] under any circumstances. So, with that  
out of the way, let us focus the discussion a bit more. What can  
we change about OAuth that would make this better? A complete  
technical [2][3] discussion on what we could add that would make  
this better is welcomed. More than welcome, it's pretty much  
required before we can help.
   The PIN flow was the first addition to address the inherent  
insecurity of the consumer key/secret all desktop applications  
[3]. This stopped applications from being able to collect tokens  
by using the consumer key/secret and a confidence scam (phishing  
like GoodApp needs you to re-approve us). It sounds like there  
is a fervent need for something more … what do people suggest?  
We're working hard on the problem but many of you are working from  
the consumer standpoint and probably have great feedback.
   Please, take your time and write a well thought out reply. One- 
line snarky comments, while fun to write and sometimes to read,  
steal time from everyone reading the list, including all of the  
Twitter API engineers. They also make the list look less inviting  
to new comers.


Thanks;
– Matt Sanford / @mzsanford
Twitter Dev

[1] - People installing an instance of your server-side app are  
not 'end users', but other developers

[2] - Not open-source hand waving.
[3] - Closed source desktop apps have the same problem. Reverse  
engineering is not stopped when you don't include the source.


On Jul 1, 2009, at 9:33 AM, DWRoelands wrote:



Actually, since Twitter has said that Basic Auth will eventually go
away, OAuth is going to be the only choice for authentication.
Twitter has forced the choice by implementing OAuth in the way that
they did.

Why should a user who chooses to support open source by using an  
open-
source Twitter client be punished by having to go through extra  
hoops

that users of closed-source clients don't have to endure?

Forcing users of open source Twitter clients to register their
individual installations as Twitter applications is not a viable
solution.  Matt Sanford has even said so.

No one is asking for easy.  I just want open source Twitter  
desktop

clients to be able to compete with closed-source versions when it
comes to security.  Right now, that's not possible because of
Twitter's implementation of OAuth.

Regards,
Duane

On Jul 1, 11:23 am, Andrew Badera and...@badera.us wrote:
But that's the 

[twitter-dev] searching for stocktwits (searching for $$)

2009-07-01 Thread Ryan

I'm using the API and am trying to search for stocktwits (those tweets
which contain the string $$ or $ followed by a ticker symbol). I
can easily search for $aapl for example, and it works fine. But if I
search for $$ the API never returns any results, so I must be
searching for it incorrectly. (Searching for %24%24 doesn't work any
better.) What is the correct string to search to get the desired
result?

Also is there a generic search term? as in $*** where the asterisk
is any character?

Thanks for the help.


[twitter-dev] Re: searching for stocktwits (searching for $$)

2009-07-01 Thread Matt Sanford


Hi Ryan,

The search.twitter.com system does not support $$ or a wild-card  
for all stock symbols.


Thanks;
 – Matt Sanford / @mzsanford
 Twitter Dev

On Jul 1, 2009, at 1:49 PM, Ryan wrote:



I'm using the API and am trying to search for stocktwits (those tweets
which contain the string $$ or $ followed by a ticker symbol). I
can easily search for $aapl for example, and it works fine. But if I
search for $$ the API never returns any results, so I must be
searching for it incorrectly. (Searching for %24%24 doesn't work any
better.) What is the correct string to search to get the desired
result?

Also is there a generic search term? as in $*** where the asterisk
is any character?

Thanks for the help.




[twitter-dev] Re: off topic

2009-07-01 Thread Neil Ellis

Yep my mistake, will contact you off line.

On 1 Jul 2009, at 20:38, Isaiah Carew wrote:



yep, just me,

thanks,
isaiah

p.s. subject changed to protect the on-topic folks.  @isaiah for  
more.  ;-)


On Jul 1, 2009, at 12:27 PM, Neil Ellis wrote:

On a completely separate note, your website is stunning, did you  
design it yourself? If not may I ask who were your designers.


All the best
Neil
http://www.peepwl.com

On 1 Jul 2009, at 20:22, Support wrote:



Matt,

Thanks for weighing in and hopefully taming this snarl.  As the  
person who might have posed the question originally, I figured I  
at least owed a bit of constructive critique.



What can we change about OAuth that would make this better?


1) User experience - it's been echoed a number of times in this  
board, so i won't beat the dead horse...   much...but basic  
auth *is* much simpler for the user.
The reason is obvious:  oauth requires a browser. In many  
platforms (especially mobile) that's a painful burden.


The PIN code seems to be ignoring the elephant in the room.  It  
solves some problems, but at a further cost to the user  
experience, giving an even larger advantage to existing basic-auth  
apps.
You've made the pill even more effective, but so bitter that your  
patients can't swallow it.


Providing a scheme that does not require a browser is an obvious  
way to cut this gordian knot.



2) Application authentication - if your goal is to *identify* each  
open source application in a *trusted* way, then I think you could  
be in for an uphill battle.  There are obvious technical  
challenges, however the larger problem is that in OSS there is no  
way to define each application.  There will be many binaries for  
different platforms and people will fork it on github just because  
they can.  You cannot identify each of these variants as the same  
when they could be different.


And that places a burden on the user experience.  When a user  
grants access to application x -- what does that mean exactly?   
Just that binary?  Just this release?  Only from a specific  
trusted company?  How do you explain to the user where this subtle  
line is drawn in a box he'll click through in less than a second?


I personally don't see an obvious solution to this problem.  It  
seems to be a UI challenge and a technical challenge.  In cases  
like that it seems prudent to question your goals and check  
feasibility.



Isaiah

YourHead Software
supp...@yourhead.com
http://www.yourhead.com



On Jul 1, 2009, at 9:46 AM, Matt Sanford wrote:



Hello again,

   I do not recommend having individual end users register for  
consumer keys/secrets [1] under any circumstances. So, with that  
out of the way, let us focus the discussion a bit more. What can  
we change about OAuth that would make this better? A complete  
technical [2][3] discussion on what we could add that would make  
this better is welcomed. More than welcome, it's pretty much  
required before we can help.
   The PIN flow was the first addition to address the inherent  
insecurity of the consumer key/secret all desktop applications  
[3]. This stopped applications from being able to collect tokens  
by using the consumer key/secret and a confidence scam (phishing  
like GoodApp needs you to re-approve us). It sounds like there  
is a fervent need for something more … what do people suggest?  
We're working hard on the problem but many of you are working  
from the consumer standpoint and probably have great feedback.
   Please, take your time and write a well thought out reply. One- 
line snarky comments, while fun to write and sometimes to read,  
steal time from everyone reading the list, including all of the  
Twitter API engineers. They also make the list look less inviting  
to new comers.


Thanks;
– Matt Sanford / @mzsanford
Twitter Dev

[1] - People installing an instance of your server-side app are  
not 'end users', but other developers

[2] - Not open-source hand waving.
[3] - Closed source desktop apps have the same problem. Reverse  
engineering is not stopped when you don't include the source.


On Jul 1, 2009, at 9:33 AM, DWRoelands wrote:



Actually, since Twitter has said that Basic Auth will eventually  
go

away, OAuth is going to be the only choice for authentication.
Twitter has forced the choice by implementing OAuth in the way  
that

they did.

Why should a user who chooses to support open source by using an  
open-
source Twitter client be punished by having to go through extra  
hoops

that users of closed-source clients don't have to endure?

Forcing users of open source Twitter clients to register their
individual installations as Twitter applications is not a viable
solution.  Matt Sanford has even said so.

No one is asking for easy.  I just want open source Twitter  
desktop

clients to be able to compete with closed-source versions when it
comes to security.  Right now, that's not possible because of
Twitter's implementation of 

[twitter-dev] Re: Tweet threading

2009-07-01 Thread Scott Haneda


Hope this is not out of line, but this list has been pretty busy  
lately in traffic, and I am looking for a little hand holding on tweet  
threading... so bump  :)


On Jun 30, 2009, at 3:53 PM, Scott Haneda wrote:

I am finding near all apps I use with twitter in some way or another  
fail at threading a conversation.  Anyone have pointers for how to  
do this, based on the current twitter API, and whatever bugs have  
been uncovered, perhaps with workarounds?


Each tweet has a 'in_reply_to_status_id', if I understand, the  
existence of in_reply_to_status_id, means that the current tweet is  
a child of some parent.


tweet:
id = 1234
in_reply_to_status_id = 5678

In the above example, tweet #5678 would be the start of the  
conversation, and tweet #1234 would be the reply?


What has me stumped:
http://twitter.com/criticalmassey/status/2383870573

Clearly a reply to something @ahem said, which started here:
http://twitter.com/Ahem/status/2382725245

However, if I search.twitter.com for @ahem, I can get this  
conversation:

http://dl.getdropbox.com/u/340087/Drops/06.30.09/twitter-b06e01bd-154810.png
But it is missing the parent, the start of the thread.

I can see the master parent here:
http://search.twitter.com/search?max_id=2410761989page=2q=+from%3Aahemrpp=10
But threading is not an option.

Having a hard time wrapping my head around what the limitations of  
threading are.  Any suggestions on how to better understand this  
would be most appreciated.


Ideally, what I am looking for, is to take any tweet, determine what  
other replies there are to it, and get back to the parent,  
displaying all children.  I would like to avoid any ambiguous tweet  
searches that are not based on a message-id, and could pollute the  
results with inaccurate threading.


--
Scott * If you contact me off list replace talklists@ with scott@ *



[twitter-dev] Re: User Clone Profiles

2009-07-01 Thread Slicey

Thanks

On Jun 29, 3:10 am, Abraham Williams 4bra...@gmail.com wrote:
 Pretty much. 
 Usehttp://apiwiki.twitter.com/Twitter-REST-API-Method%3A-users%C2%A0show
 to get all their profile info.



 On Sat, Jun 27, 2009 at 09:11, Sliceysli...@live.co.uk wrote:

  I'm building a site which allows a user to add an audio clip to their
  twitter page.
  eg. A user types in their username and uploads an audio clip and the
  title. This then gets stored into a database, along with a unique
  generated number/letter code.
  I want it so a user can see their audio clip on their twitter page. So
  my question is, Is it possible to automatically clone the users
  twitter page just from their username?
  eg. The users profile will be accessible like this:
 http://mysite.co.uk/twitter.php?pwd=n41MO
  It will then generate their profile from the code in the database
  matching to the related username.

  Is this possible? If so how?

  Thanks.

 --
 Abraham Williams | Community Evangelist |http://web608.org
 Hacker |http://abrah.am|http://twitter.com/abraham
 Project |http://fireeagle.labs.poseurtech.com
 This email is: [ ] blogable [x] ask first [ ] private.


[twitter-dev] Re: Profile image urls - how to update

2009-07-01 Thread Francis Shanahan

Has there been any update or advance on how to keep Profile Images up
to date? They're driving my nuts, especially with the Iran green-
overlay nonsense.

-fs



On May 22, 12:36 pm, Ollie Parsley olliedud...@googlemail.com wrote:
 Haven't figured out caching yet. Thats on the agenda after a weekend
 break :)

 Ollie

 On May 22, 11:56 am, Neil Ellis neilellis1...@googlemail.com wrote:

  Good call Ollie, caching?

  On 22 May 2009, at 11:11, Ollie Parsley wrote:

   I put a very quick app together called Twavatars that creates a
   static URL to aprofileimage. The request does an API call and
   streams the image from the S3 url. This does make theimagesload
   slower but it is only a temporary solution untill there is an official
   solution. So it is fine when displaying a couple of avatars, if you
   displaying lots of avatars it will be tediously slow.

   My avatar (@ollieparsley) 
   -http://twavatars.ollieparsley.com/user/10721822?s=thumb
   orhttp://twavatars.ollieparsley.com/user/ollieparsley?s=normal

  http://twavatars.ollieparsley.comformore info if anyone is
   interested.

   Ollie

   On May 22, 2:24 am, Abraham Williams 4bra...@gmail.com wrote:
   Speaking of static avatar URLs... how about Gravatar[1] support?

   [1]http://en.gravatar.com/

   On Thu, May 21, 2009 at 18:14, Doug Williams d...@twitter.com  
   wrote:
   Thanks for your patience guys -- we realize the benefits of  
   predictable
   static URLs. It's unfortunately kind of back-burner work but we're  
   getting
   to it. As most of you can tell, the image uploading logic needs a  
   lot of
   love.
   Cheers,
   Doug

   --

   Doug Williams
   Twitter Platform Support
  http://twitter.com/dougw

   On Thu, May 21, 2009 at 4:38 PM, Tim Haines tmhai...@gmail.com  
   wrote:

   Hi Clint,

   Thanks for that.  I've added myself to the watchlist.  I saw a  
   similar
   note from 2007, so was hoping it was already done - but 'a month or
   so' sounds good to me.

   Tim.

   On May 21, 10:24 pm, Clint Shryock cts...@gmail.com wrote:
   the API team is in the process of re-engineering this  
   functionality: in
   the
   future the currentprofileimage will have a static URL.see:
  http://code.google.com/p/twitter-api/issues/detail?id=497#c8

   +Clint

   On Thu, May 21, 2009 at 6:11 AM, Tim Haines tmhai...@gmail.com  
   wrote:

   Hey there,

   I'm cachingprofileimage urls.  I'm finding quite a bit of  
   churn, and
   have started wondering how I'm going to keep them up to date.

   Is there anyway to predict or determine aprofileimage url  
   from a
   screen name or something?  The url's provided all seem to  
   contain part
   of the original file name - which of course is impossible to  
   guess.

   If there's not a way to determine them from the screen name, is  
   there
   an easy way to get a bulk update of the image urls?

   Cheers,

   Tim.

   --
   Abraham Williams |http://the.hackerconundrum.com
   Hacker |http://abrah.am|http://twitter.com/abraham
   Project |http://fireeagle.labs.poseurtech.com
   This email is: [ ] blogable [x] ask first [ ] private.
   Sent from San Francisco, California, United States


[twitter-dev] Twitter search XML Dataset

2009-07-01 Thread Raza

Hello everyone
in my application i am trying to pull xml dataset using following link

http://search.twitter.com/search.atom?lang=enrpp=150q=+google

Problem is i cant get more than 100 results in the tables even though
i have given 150 rpp. can someone please explain why is that?


thanks
--
Raza


[twitter-dev] Re: Search twitter for within certain timestamp

2009-07-01 Thread Mehroz Raza
Thanks for your replay guys i menage to it using Published feild in XML
results.

i have another problem if you guys can help me there.


in my application i am trying to pull xml dataset using following link

http://search.twitter.com/search.atom?lang=enrpp=150q=+google

Problem is i cant get more than 100 results in the tables even though i have
given 150 rpp. can you please explain why is that?




On Tue, Jun 30, 2009 at 6:14 PM, Doug Williams d...@twitter.com wrote:

 Raza,
 Twitter search only gives since: and until: operators granularity at the
 day level. Any parsing on more specific (hour, day, second) timeframes is
 left to the client.

 Thanks,
 Doug





 On Tue, Jun 30, 2009 at 2:41 PM, Raza mahrozer...@gmail.com wrote:


 Hi,

 I am trying to search the twitter like


 http://search.twitter.com/search.atom?lang=enq=+google+since%3A2009-06-30+until%3A2009-06-30+

 what i want to do is to search giving date in the format -MM-DD
 HH:MI:SS...

 how can i do that?

 thanks
 Raza





-- 
Best Regards,
Muhammad Mahroze Raza,
Software Engineer,
The Resource Group (Private) Limited,
Lahore, Pakistan.
mailto:mahroze.r...@trgcustomersolutions.com
Mob +92-322-4426410
P (Pak) +92-42-111-874-874 Ext 2617
P (US)  +1-202-289-9898 Ext 2617


[twitter-dev] Re: Twitter search XML Dataset

2009-07-01 Thread Abraham Williams

If you look at: http://apiwiki.twitter.com/Twitter-Search-API-Method%3A-search

You will find that rpp only supports up to 100.

Abraham
On Wed, Jul 1, 2009 at 20:17, Razamahrozer...@gmail.com wrote:

 Hello everyone
 in my application i am trying to pull xml dataset using following link

 http://search.twitter.com/search.atom?lang=enrpp=150q=+google

 Problem is i cant get more than 100 results in the tables even though
 i have given 150 rpp. can someone please explain why is that?


 thanks
 --
 Raza



-- 
Abraham Williams | Community Evangelist | http://web608.org
Hacker | http://abrah.am | http://twitter.com/abraham
Project | http://fireeagle.labs.poseurtech.com
This email is: [ ] blogable [x] ask first [ ] private.


[twitter-dev] daily follow/unfollow/update limit

2009-07-01 Thread Developer In London
I saw on the API documentation the daily limit is 1000 per day. But it seems
its lower then that. Is it a %age based limit?

Thanks

Nayeem


[twitter-dev] Re: Use Twitter for login oauth/authenticate method

2009-07-01 Thread Arnaud

Ok, great. I'll let it check, so.
By the way, OAuth is working like a charm here. Great job you did
there! I'm happy to have finally switched to it.

All the best,
Arnaud.


On Jul 1, 4:50 pm, Matt Sanford m...@twitter.com wrote:
 Hi Arnaud,

      That option during application creation is really more trouble  
 that it is worth. Right now applications that have that option checked  
 include an extra sentence to tell users the application will be using  
 twitter for login, that's all. In the future we may restrict the /
 oauth/authenticate call to applications that have specifically chosen  
 the option, so I recommend that any application using 'Sing in with  
 Twitter' check the check box. We're also working on redesigning the  
 authorization page and might do more with that value then.
      We will announce before hand if we make any changes, like  
 requiring that value to use the authenticate method. It's not  
 something we'll definitely do but it is something that may come up in  
 the medium term you should be aware of.

 Thanks;
   – Matt Sanford / @mzsanford
       Twitter Dev

 On Jul 1, 2009, at 4:26 AM, Arnaud wrote:





  Hello,

  I’m using the oauth/authenticate method (one click login) and I was
  wondering if I had to check the Use Twitter for login option in my
  application options. The application is Browser based (using a
  callback URL) .

  I’m quite confused with this option as I don’t really understand what
  it is standing for?

  All the best,
  Arnaud.


[twitter-dev] Re: Tweet threading

2009-07-01 Thread Arnaud

Take a look on the app I'm workig on, Twitoaster: http://twitoaster.com

The threading part is not that hard. Recursive function jumping from
parents to parents.
You should use the getMentions method, instead of hiting the search
API. You'll get the full object that way, so you won't have to use the
show/statuses method.

All the best,
Arnaud.

On Jul 1, 12:53 am, Scott Haneda talkli...@newgeo.com wrote:
 I am finding near all apps I use with twitter in some way or another  
 fail at threading a conversation.  Anyone have pointers for how to do  
 this, based on the current twitter API, and whatever bugs have been  
 uncovered, perhaps with workarounds?

 Each tweet has a 'in_reply_to_status_id', if I understand, the  
 existence of in_reply_to_status_id, means that the current tweet is a  
 child of some parent.

 tweet:
         id = 1234
         in_reply_to_status_id = 5678

 In the above example, tweet #5678 would be the start of the  
 conversation, and tweet #1234 would be the reply?

 What has me stumped:http://twitter.com/criticalmassey/status/2383870573

 Clearly a reply to something @ahem said, which started 
 here:http://twitter.com/Ahem/status/2382725245

 However, if I search.twitter.com for @ahem, I can get this 
 conversation:http://dl.getdropbox.com/u/340087/Drops/06.30.09/twitter-b06e01bd-154...
 But it is missing the parent, the start of the thread.

 I can see the master parent 
 here:http://search.twitter.com/search?max_id=2410761989page=2q=+from%3Aa...
 But threading is not an option.

 Having a hard time wrapping my head around what the limitations of  
 threading are.  Any suggestions on how to better understand this would  
 be most appreciated.

 Ideally, what I am looking for, is to take any tweet, determine what  
 other replies there are to it, and get back to the parent, displaying  
 all children.  I would like to avoid any ambiguous tweet searches that  
 are not based on a message-id, and could pollute the results with  
 inaccurate threading.
 --
 Scott * If you contact me off list replace talklists@ with scott@ *