> 
> Ironically all of these massive threads talking about impersonating 
> applications is probably just making more crackers aware that they can do 
> this. :-/

You're right!  Openness about security is really going to hurt us all!  
Everyone, quick, shhhhh!  The bad guys are stupid and will never figure it out 
if we just keep quiet!


OK, sorry, I couldn't resist the bait.  ;-)  Especially coming from someone 
that I know appreciates openness.  No, I don't actually feel that way.  I do 
actually see your point, but I think the value of discussing threats, so long 
as the discussions remain unspecific, are probably more valuable than they are 
detrimental.


Also, I think you have it right, that distribution of the source sans keys and 
the binary with keys is the way to go.  I completely agree that it's the 
obvious practical solution.  It's the one that took myself for my OSS OAuth 
code.


However, it also misses the point.  The point is that the keys not kept safe in 
any desktop app, and the challenges are double in open source apps.  Up until 
this point they've probably been safe enough because there have been few 
targets worth the effort of cracking.  I suspect that will change when the 
clients with many users enter the picture.  With many more users there are many 
more reasons why someone might want to spoof as a specific client.

I'd say its a pretty reasonable bet that one of the major desktop clients will 
be compromised within a year or so of implementing OAuth -- and will probably 
result in a lot of user frustration.  It seems like their will be ample 
motivation and little to prevent them.

Only time will tell, you're free to come and laugh at me if it doesn't happen.  
Bookmark this email, we'll check back in 18 months.  ;-)

Isaiah

Reply via email to