Re: [OAUTH-WG] Redirects

David Recordon <recordond@gmail.com> Fri, 07 May 2010 06:16 UTC

Return-Path: <recordond@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 606203A6998 for <oauth@core3.amsl.com>; Thu, 6 May 2010 23:16:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.558
X-Spam-Level:
X-Spam-Status: No, score=-1.558 tagged_above=-999 required=5 tests=[AWL=-0.449, BAYES_05=-1.11, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wsn3fV8A0qQp for <oauth@core3.amsl.com>; Thu, 6 May 2010 23:16:02 -0700 (PDT)
Received: from mail-iw0-f189.google.com (mail-iw0-f189.google.com [209.85.223.189]) by core3.amsl.com (Postfix) with ESMTP id 571E43A68C3 for <oauth@ietf.org>; Thu, 6 May 2010 23:15:37 -0700 (PDT)
Received: by iwn27 with SMTP id 27so1037746iwn.5 for <oauth@ietf.org>; Thu, 06 May 2010 23:15:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:received:in-reply-to :references:date:message-id:subject:from:to:cc:content-type; bh=p+delsrRER29iByD2EkWOaA4dek9EJMoio8U0RgprCY=; b=KmjvIpE8dFWkeC3IR0dm7MW3ZSzwFvSJ6FBwGUUFSe3vGSHV6wSmmelGrGCgwDioTu DQCozjWGVn8Fjw1q7f3Y6qPfxJnUtJbyfBaHhV6i8oSZ9onLHyq7tDbHS7LoFAUJFC+I T6ZIN9eetXvGzs4oZVS+m9NC4FGN12DrDqCSg=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=SdJ8bc++zCsmVIwH+GhUD+afgpRVOgs2kOGJ7B9mnbLVCRNGK1N015z5yfXWp6+vfp AwNB9ya49u33ZdGdLWVt2H2LHcwaHPBy0MIgpXBlpAoHus1pRkMxGcti5lmcohbp2cde GkJYETKboV5xR3ANNEJVt4RUc5eSJ0pTVjiHw=
MIME-Version: 1.0
Received: by 10.231.147.21 with SMTP id j21mr4302010ibv.65.1273212914083; Thu, 06 May 2010 23:15:14 -0700 (PDT)
Received: by 10.231.183.195 with HTTP; Thu, 6 May 2010 23:15:14 -0700 (PDT)
In-Reply-To: <255B9BB34FB7D647A506DC292726F6E112631B26C0@WSMSG3153V.srv.dir.telstra.com>
References: <255B9BB34FB7D647A506DC292726F6E11263073D6D@WSMSG3153V.srv.dir.telstra.com> <q2hfd6741651005062105y46152452x370fac0dd12d55c6@mail.gmail.com> <255B9BB34FB7D647A506DC292726F6E112631B257D@WSMSG3153V.srv.dir.telstra.com> <v2nfd6741651005062235g211564dfr6aaf6a72bf4dfaa@mail.gmail.com> <255B9BB34FB7D647A506DC292726F6E112631B26C0@WSMSG3153V.srv.dir.telstra.com>
Date: Thu, 06 May 2010 23:15:14 -0700
Message-ID: <v2qfd6741651005062315rfc3bcde1mee4c22a40de852fe@mail.gmail.com>
From: David Recordon <recordond@gmail.com>
To: "Manger, James H" <James.H.Manger@team.telstra.com>
Content-Type: multipart/alternative; boundary="0016e64758ae77a9b80485fafb82"
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Redirects
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 May 2010 06:16:03 -0000

Don't you have larger problems if your protected resources are compromised?
You might want to revoke access tokens or take the Google/Yahoo! model of
them expiring frequently with refresh tokens.


On Thu, May 6, 2010 at 11:09 PM, Manger, James H <
James.H.Manger@team.telstra.com> wrote:

>  David said:
>
> > Why wouldn't the client send the token with the new request? If I'm
> trying to access https://api.example.com/pr?access_token=loin21op and I
> get a 301 response, I'll need to follow that if I want any chance of
> accessing the protected resource.
>
>
>
>
>
> If https://api.example.com/pr?access_token=loin21op responses with
> “Location: http://evil.com/log” should the client get http://evil.com/logor
> http://evil.com/log?access_token=loin21op? Surely the later is potentially
> insecure. I don’t think we can assume (mandate) that services only redirect
> to “good” sites. We certainly can’t assume (mandate) that links in the
> content on the response are to “good” sites.
>
>
>
> The answer is a bit easier if the token is passed as a query param (like
> with Facebook) -- as the client could rely on the service to include or omit
> the token param in the redirect/link URI as appropriate. It is less obvious
> with an Authorization header, or POST is used.
>
>
>
> --
>
> James Manger
>