OAuth does not use any real "login credentials", if you consider login
credentials as a username/password set. Unless you're using xAuth, I
don't think you'll need to worry too much.

On Jun 17, 4:17 am, Jonathon Hill <jhill9...@gmail.com> wrote:
> I'm trying to get approval from PayPal to use their Preapproval API,
> and to do so my application must meet several requirements. I won't
> post the entire list here, because it isn't applicable to Twitter,
> however since users log in to my application via Twitter OAuth several
> of them are applicable:
>
> ----
>
> A1. User passwords must conform to industry best practices for content
>
> Generally, the length should be at least 6 characters, and contain at
> least one alpha and one numeric. Candidate passwords which meet the
> static syntactical requirements should also be passed across a
> dictionary of common passwords, and rules – no passwords of
> “blink182”, or passwords which are the same as the user-ID, for
> example.
>
> ----
>
> A6. A control must be implemented that prevents the brute force attack
> of login credentials.
>
> A common attack against web sites is to attempt to login in with a
> variety of different commonly used passwords for a given login id.
> There must be some method used to ensure that one is unable to perform
> this sort of attack. A common solution is to lock login attempts on an
> account for some period of time. In order to ensure that these
> mechanisms do not generate a means of denial of service attacks
> against accounts, these lockouts should cancel after a period of time
> (a few hours is typical).
>
> ----
>
> A7. A control must be implemented that prevents brute force guessing
> of passwords, especially if the attack is originating from a botnet.
>
> Typically, this will require collecting metadata about logons, logging
> them into a central log store, and then performing real-time analytics
> against that data. If a brute force attack is detected, a strong
> CAPTCHA (resistant against machine/scripted attacks) would be switched
> on. There are other implementation techniques, but this is the least
> invasive from a user experience perspective. Note – this is
> conceptually and functionally different from A6.
>
> ----
>
> B1. Login credentials must only be collected on pages that implement
> https with Extended Validation (EV) certificates.
>
> In order to allow customers to verify that they are truly connected to
> the partner site and to encourage general good practices, login
> credentials must be collected on pages that are https enabled, and
> using Extended Validation (EV) certificates.
>
> ----
>
> So, my questions are:
>
> 1. Would you guys be willing to add to your API to allow enforcing
> tighter password requirements as needed?
>
> 2. Will you upgrade your SSL certificate on api.twitter.com to one
> with Extended Validation? It seems like this would be relatively easy
> and inexpensive to do, and beneficial to all.
>
> 3. How doeshttps://api.twitter.com/oauth/authenticaterespond to
> brute-force attacks on login credentials?
>
> Thanks!
>
> Jonathon Hill
> @compwright
> @rainmakerapp

Reply via email to