Re: [OAUTH-WG] problem statement
Aiden Bell <aiden449@gmail.com> Tue, 06 September 2011 19:15 UTC
Return-Path: <aiden449@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AC0A221F8DA4 for <oauth@ietfa.amsl.com>; Tue, 6 Sep 2011 12:15:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.211
X-Spam-Level:
X-Spam-Status: No, score=-3.211 tagged_above=-999 required=5 tests=[AWL=0.387, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id buSq9zzA9bL7 for <oauth@ietfa.amsl.com>; Tue, 6 Sep 2011 12:15:34 -0700 (PDT)
Received: from mail-qw0-f52.google.com (mail-qw0-f52.google.com [209.85.216.52]) by ietfa.amsl.com (Postfix) with ESMTP id 269DF21F8D3A for <oauth@ietf.org>; Tue, 6 Sep 2011 12:15:33 -0700 (PDT)
Received: by qwb8 with SMTP id 8so5742987qwb.25 for <oauth@ietf.org>; Tue, 06 Sep 2011 12:17:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=t72Ba9u0k+WHfjP3QcVDMmhCWBLF7FBaVyFgIxwgdRM=; b=vW0/zwjq9rmyGxu2vFRlhXRx43/hjudA5shdvax1S0+qSR+htx02fjWyf6Fy/uzJGk zd4FYjKbnN2VM0yM7T7H47nZXUBQlHYa3IbgXLB7zloE25Xlm3SxS49tBUBwD0F9MeMU tUXdnS8GFMwb0doCJS3h3WpgmOgM10F6HeowY=
MIME-Version: 1.0
Received: by 10.229.71.161 with SMTP id h33mr4078545qcj.276.1315336640031; Tue, 06 Sep 2011 12:17:20 -0700 (PDT)
Received: by 10.229.249.71 with HTTP; Tue, 6 Sep 2011 12:17:19 -0700 (PDT)
Received: by 10.229.249.71 with HTTP; Tue, 6 Sep 2011 12:17:19 -0700 (PDT)
In-Reply-To: <CA8BBD69.193BE%eran@hueniverse.com>
References: <4E666D43.5030407@mtcc.com> <CA8BBD69.193BE%eran@hueniverse.com>
Date: Tue, 06 Sep 2011 20:17:19 +0100
Message-ID: <CA+5SmTVWkLz-qDx8EOSMYrbCTGN4fUN9TEXB8y2zjhHsDXduRQ@mail.gmail.com>
From: Aiden Bell <aiden449@gmail.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>, OAuth WG <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="0016e6505810306ac204ac4aadb7"
Subject: Re: [OAUTH-WG] problem statement
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Sep 2011 19:15:35 -0000
I agree. This is like saying SSL has an issue because it doesn't stop keyloggers. Not an oauth issue. sent from my android phone On Sep 6, 2011 8:14 PM, "Eran Hammer-Lahav" <eran@hueniverse.com> wrote: > You are one making the argument that no one should be installing apps. > > There is no known way to stop users from installing malware and viruses other than not letting them install anything off a whitelist. The problem you are describing has nothing to do with OAuth, its a fundamental problem with running untrusted code on your devices. Once you do that, yes, OAuth can be exploited but that's true for every authentication scheme when one side is compromised. > > My point, which you seems to miss, is that the same argument can be made against any other protocol. TLS offers your certain protections but they are all gone if you install a bad native app – following your logic people should not use TLS in apps either. > > I do not consider this an issue. > > EHL > > From: Michael Thomas <mike@mtcc.com<mailto:mike@mtcc.com>> > Date: Tue, 6 Sep 2011 11:58:11 -0700 > To: Eran Hammer-lahav <eran@hueniverse.com<mailto:eran@hueniverse.com>> > Cc: "igor.faynberg@alcatel-lucent.com<mailto: igor.faynberg@alcatel-lucent.com>" <igor.faynberg@alcatel-lucent.com<mailto: igor.faynberg@alcatel-lucent.com>>, "oauth@ietf.org<mailto:oauth@ietf.org>" <oauth@ietf.org<mailto:oauth@ietf.org>> > Subject: Re: [OAUTH-WG] problem statement > > Eran Hammer-Lahav wrote: > I'm dismissive of this being an OAuth problem. > > Which brings us back to my original problem: what is the problem it's trying to solve? > What are the assumptions it makes? What is its applicability? None of those are addressed > very well if at all in the drafts. I'm sure that I'm not the only one who would be very > surprised to hear that using oauth on a phone app is a bad idea. > > Put it this way: your favorite example of a photo printing service needing access to flickr. > It's ok if you do that from a browser, but not if the photo printer makes an app. How many users, > exactly, are going to know that they shouldn't do the second one? > > I think that's an oauth problem because oauth makes it *seem* like you're protected from > the third party, whereas if the app itself asked for your login credentials there would > be far less confusion. So in that sense, oauth is making things worse, not better. > > Mike > > EHL > On Sep 6, 2011, at 11:35, "Michael Thomas" <mike@mtcc.com<mailto: mike@mtcc.com>> wrote: > Eran Hammer-Lahav wrote: > Don't install crap on you device or computer. OAuth is the least of your concern if you install bad software. > > If there was a solution to this we would not need an antivirus. > How exactly does an end user know what is "crap" or not? Or are you just dismissive of apps in > general? I don't think that apple and google are going to close up shop because it breaks oauth's > trust model. > > Mike > > EHL > > On Sep 6, 2011, at 11:23, "Michael Thomas" <mike@mtcc.com<mailto: mike@mtcc.com>> wrote: > > Eran Hammer-Lahav wrote: > I agree. If you are going to install a native app, you better trust it not to do bad things. Grabbing your password is the least interesting thing such an app can abuse. I don't see any need to change the v2 draft. > How, exactly, is the user supposed to protect themselves against rogue apps? > It sounds like the solution is to tell them to never use oauth in an app at all. > > Is oauth only intended to be used on standalone trustable web browsers? I don't recall > seeing that anywhere. > > Mike > > EHL > > On Sep 6, 2011, at 11:10, "Igor Faynberg" < igor.faynberg@alcatel-lucent.com<mailto:igor.faynberg@alcatel-lucent.com>> wrote: > > Mike, > > You've got the problem statement right: allowing the user to authorize > resource access to another party without divulging user's credentials is > the objective of OAuth. You are also right in that the attack you have > described defies the whole purpose of OAuth. I do not think though that > it is related to OAuth per se. > > To this end, the security work led by Torsten has thoroughly analyzed > the protocol and specified protection against multiple protocol > attacks. From what you described, it appears to me that the attack you > mention is not related to the protocol but rather to the user's > environment. There is no possible protection from key loggers that a > protocol can implement. I could be mistaken; in any case, it looks like > the problem rests with the implementation of WebView. > > If I am wrong, I would appreciate a detailed description of what happened. > > Igor > > On 9/6/2011 1:40 PM, Michael Thomas wrote: > Hi all, > > Barry suggested that I might subscribe and explain what I sent him. > > My basic problem is that in neither the protocol nor the threats drafts, > I can't seem to find what problem is actually trying to be solved with > oauth, and what assumptions you're making about various elements. > > Here's what I did. I've written an app, and I wanted re-integrate the > ability to send tweets after they deprecated Basic. So the app has a > webView (android, iphone...) which it obviously completely controls. > With oauth, the webview UA will ultimately redirect off to Twitter's > site to collect the user's credentials and grant my app's backend an > access token (sorry if I get terminology screwed up, i'm just coming > up to speed). > > What occurs to me is that webview affords exactly zero protection from > my client (ie, the app) from getting the user's twitter credentials. All > I have to do is set up a keypress handler on that webview and in a few > minutes of hacking I have a key logger. etc. > > So what I can't tell is whether this is a "problem" or not, because I > don't know what problem you're trying to solve. If the object of oauth > isn't to keep user/server credentials out of the hands of a third party, > then what is it trying to solve? Is there an expectation that the > UA is trusted by the user/server? What happens when that's not the case? > > Regardless of whether I'm misunderstanding, it would sure be nice to have > both the problem and your assumptions laid out, hopefully with some > prominence > so you don't get these sort of dumb questions. > > Mike > _______________________________________________ > OAuth mailing list > OAuth@ietf.org<mailto:OAuth@ietf.org> > https://www.ietf.org/mailman/listinfo/oauth > _______________________________________________ > OAuth mailing list > OAuth@ietf.org<mailto:OAuth@ietf.org> > https://www.ietf.org/mailman/listinfo/oauth > _______________________________________________ > OAuth mailing list > OAuth@ietf.org<mailto:OAuth@ietf.org> > https://www.ietf.org/mailman/listinfo/oauth > >
- Re: [OAUTH-WG] problem statement Paul Madsen
- Re: [OAUTH-WG] problem statement Eran Hammer-Lahav
- Re: [OAUTH-WG] problem statement John Kemp
- Re: [OAUTH-WG] problem statement Michael Thomas
- [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement Igor Faynberg
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement William Mills
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement Eran Hammer-Lahav
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement William Mills
- Re: [OAUTH-WG] problem statement Eran Hammer-Lahav
- Re: [OAUTH-WG] problem statement Justin Richer
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement Eran Hammer-Lahav
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement Jill Burrows
- Re: [OAUTH-WG] problem statement Eran Hammer-Lahav
- Re: [OAUTH-WG] problem statement Aiden Bell
- Re: [OAUTH-WG] problem statement Melinda Shore
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement Eran Hammer-Lahav
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement Aiden Bell
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement Justin Richer
- Re: [OAUTH-WG] problem statement Igor Faynberg
- Re: [OAUTH-WG] problem statement Igor Faynberg
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement Igor Faynberg
- Re: [OAUTH-WG] problem statement John Kemp
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement John Kemp
- Re: [OAUTH-WG] problem statement William Mills
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement John Kemp
- Re: [OAUTH-WG] problem statement Melinda Shore
- Re: [OAUTH-WG] problem statement Eran Hammer-Lahav
- Re: [OAUTH-WG] problem statement Aiden Bell
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement Eran Hammer-Lahav
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement Eran Hammer-Lahav
- Re: [OAUTH-WG] problem statement Melinda Shore
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement Eran Hammer-Lahav
- Re: [OAUTH-WG] problem statement Peter Saint-Andre
- Re: [OAUTH-WG] problem statement Melinda Shore
- Re: [OAUTH-WG] problem statement Peter Saint-Andre
- Re: [OAUTH-WG] problem statement Eran Hammer-Lahav
- Re: [OAUTH-WG] problem statement Peter Saint-Andre
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement Eran Hammer-Lahav
- Re: [OAUTH-WG] problem statement William Mills
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement Eran Hammer-Lahav
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement Manger, James H
- Re: [OAUTH-WG] problem statement Justin Richer
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement Igor Faynberg
- Re: [OAUTH-WG] problem statement John Kemp
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement Igor Faynberg
- Re: [OAUTH-WG] problem statement David Waite
- Re: [OAUTH-WG] problem statement Phil Hunt
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement Melinda Shore
- Re: [OAUTH-WG] problem statement Peter Saint-Andre
- Re: [OAUTH-WG] problem statement Eran Hammer-Lahav
- Re: [OAUTH-WG] problem statement Aiden Bell
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement Aiden Bell
- Re: [OAUTH-WG] problem statement Peter Saint-Andre
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement Eran Hammer-Lahav
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement Melinda Shore
- Re: [OAUTH-WG] problem statement Ben Niven-Jenkins
- Re: [OAUTH-WG] problem statement Michael Thomas
- Re: [OAUTH-WG] problem statement David Recordon
- Re: [OAUTH-WG] problem statement Thomas Hardjono
- Re: [OAUTH-WG] problem statement Phil Hunt