Re: [twitter-dev] Unexplored Dark Underbelly of OAuth
Hi Dewald, This is a known issue with protecting resources in desktop / mobile applications in general. I myself have brought it up in the OAuth spec list and you can feel free to read the thread referenced below. The consensus, which I agree with is, that while it is impossible to completely safe guard OAuth key material from a would-be client-side bad guy, OAuth still has significant advantages over other, more traditional authorization options on the desktop. 1) OAuth requests generally do not have the ability to change or reset user passwords (the most common form of local authentication. Generally authentication of last resort.); 2) OAuth authorization tokens may be easily revoked. That said, it is a risk, and as with any authorization and/or authentication implementation, developers should familiarize themselves with them. Further reading at: http://groups.google.com/group/oauth-objective-c/browse_thread/thread/6f56c98510bc89ce On Thu, Dec 10, 2009 at 9:09 PM, Dewald Pretorius dpr...@gmail.com wrote: OAuth poses a very real risk for any downloadable application. Think TweetDeck. Think Tweetie. Etc. I'm not an expert at OAuth, but if my understanding is correct, then an application will either have to include its Consumer Key Secret in its compiled code (which most will probably do), or dynamically request it from its host server (which breaks offline usage). Now, will there be hackers and scammers that will decompile TweetDeck's code to get their grubby hands on its Consumer Key Secret? You bet your bottom dollar there will be. Many. Once they have that, they can spam the living shits out of Twitter, and there is nothing, NOTHING, Twitter can do to stop it. TweetDeck cannot request or generate a new Consumer Key Secret, because that breaks all its currently installed apps. Twitter cannot block by app because they will disable all legitimate TweetDeck users. And they cannot block by IP address, if the scammers are clever in their use of proxies. Just a thought... Dewald -- darren bounds dar...@cliqset.com
Re: [twitter-dev] Unexplored Dark Underbelly of OAuth
On Thu, Dec 10, 2009 at 06:09:10PM -0800, Dewald Pretorius wrote: Now, will there be hackers and scammers that will decompile TweetDeck's code to get their grubby hands on its Consumer Key Secret? You bet your bottom dollar there will be. Many. Once they have that, they can spam the living shits out of Twitter, and there is nothing, NOTHING, Twitter can do to stop it. Twitter or anyone else. This is the same basic issue as that faced by DRM manufacturers: It is fundamentally impossible for me to allow you to cryptographically authenticate yourself without providing the necessary crypto keys and algorithms to you in some form. Once I have done so, there is no way to prevent you from using them in ways other than those which I intended. -- Dave Sherohman
Re: [twitter-dev] Unexplored Dark Underbelly of OAuth
Nothing new, this has been argued about/discussed before. Life is a series of trade-offs ... ∞ Andy Badera ∞ +1 518-641-1280 Google Voice ∞ This email is: [ ] bloggable [x] ask first [ ] private ∞ Google me: http://www.google.com/search?q=andrew%20badera On Thu, Dec 10, 2009 at 9:09 PM, Dewald Pretorius dpr...@gmail.com wrote: OAuth poses a very real risk for any downloadable application. Think TweetDeck. Think Tweetie. Etc. I'm not an expert at OAuth, but if my understanding is correct, then an application will either have to include its Consumer Key Secret in its compiled code (which most will probably do), or dynamically request it from its host server (which breaks offline usage). Now, will there be hackers and scammers that will decompile TweetDeck's code to get their grubby hands on its Consumer Key Secret? You bet your bottom dollar there will be. Many. Once they have that, they can spam the living shits out of Twitter, and there is nothing, NOTHING, Twitter can do to stop it. TweetDeck cannot request or generate a new Consumer Key Secret, because that breaks all its currently installed apps. Twitter cannot block by app because they will disable all legitimate TweetDeck users. And they cannot block by IP address, if the scammers are clever in their use of proxies. Just a thought... Dewald