Re: [OAUTH-WG] popular apps that use appauth?

Vittorio Bertocci <Vittorio@auth0.com> Mon, 25 February 2019 11:56 UTC

Return-Path: <vittorio.bertocci@auth0.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AF3AB130DE7 for <oauth@ietfa.amsl.com>; Mon, 25 Feb 2019 03:56:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=auth0.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ukSFM22TEJ2F for <oauth@ietfa.amsl.com>; Mon, 25 Feb 2019 03:56:22 -0800 (PST)
Received: from mail-lj1-x232.google.com (mail-lj1-x232.google.com [IPv6:2a00:1450:4864:20::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 81BAC1200B3 for <oauth@ietf.org>; Mon, 25 Feb 2019 03:56:21 -0800 (PST)
Received: by mail-lj1-x232.google.com with SMTP id d14so7106154ljl.9 for <oauth@ietf.org>; Mon, 25 Feb 2019 03:56:21 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=auth0.com; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=k22aYvbU4wWwac2LUykTtOg1PvBk6IW11Er2AzVExSw=; b=IxG6abCDrzeMLiJt78QRRzteJAoThQhjqfAejUNvaiFhmiCkznZSgFFOQV5NqUBLtC uKPJvz5bhMhC7HvoYO3pmJScqKzJsoG8vVicTi3Cta/56KhLA9E3cStvAtjTj1oXT8V+ vT37fh5kZyqhMcYdOcLSfTDA6jyDqgGfQiD4xNHdVbPPCKd2qrlrDonI0DsNis+ZLh7q GjNADqukGzZvAc3Afyb2/PWuXgrA/Vr8SJA/Ufd0m+whvA/meTaVz7mtIkE/bOnaAXDx 0h2HQhW5LyNGsmleShWUKb4lCtRqSkzxginJtvm72W1vZiwBHknSScH4EBa5zf/cBOPI UC+g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=k22aYvbU4wWwac2LUykTtOg1PvBk6IW11Er2AzVExSw=; b=BSzb16uPO/r4vVSBhU6hlNueBZB1wtcN3z//UTn/mXm2QqROyvq7OYCBiXYOlrb8RY Y65QLJRM8ok3WsTrBs8AqYQ6/3yR6VoU3gg+z5QqBY29ZcgCmsD1bRRJ9H4AKCb4fwfr q0yxHmohWxqj8jV17e4ik10skSN2mOHx11uANzm8T64mqqS1bX7BB7NfK1j5Dqo1CFNa 6PgB03FvfY20AB4wBwttxRXdqc2PHYq+7KKiuo97hWHBJwefVJ6Lxa5RZ8hUlvuPWYZ6 /OQVHxF4aX5/JMC2CfPhI4LTSX+8s+DJM/hpdpQPaI7Zc1N8O6hO4Dcw2RNLkf04n943 ypUA==
X-Gm-Message-State: AHQUAua4VQyFFIqcE0E0FiAjE7y2A7Uj0w67MVa2Y+v96Jwkpcfb+Eq6 fLvmGRfb9vViuxjOu912jVRHUKV7qXLEYG09s1CpvA==
X-Google-Smtp-Source: AHgI3IbeyU80pLjYf+jVSdYp9nt4oNKCeFbuE/4ZZTTrKNkPaOZe+1IHAomBC6t2cutrhmCrte7mOqrtsuq3+2Oh81U=
X-Received: by 2002:a2e:131a:: with SMTP id 26-v6mr9301766ljt.107.1551095778761; Mon, 25 Feb 2019 03:56:18 -0800 (PST)
MIME-Version: 1.0
References: <67bf27b0-e7d6-4710-ba6e-f46809d60d77@getmailbird.com> <CAO7Ng+v7vCy_cnm00YryN11P5JZngm5R51pBJ5+rQYBF43yz1A@mail.gmail.com> <5dda37c0-e3c5-5e64-347b-25d561072232@ve7jtb.com> <c6f71d94-12f4-4f99-b373-c9f815325da1@getmailbird.com> <CAAP42hCO4m=tmj3omgg+EH2CguF_OVocUzbSwnWRnyb2MQZYVQ@mail.gmail.com> <CCD4D46C-E6EC-4FD2-871B-C969756F9552@alkaline-solutions.com> <CAO_FVe4Aj16zoqg7L+W=cagKY0S5egf8byaHcXTSFM9tnau5iw@mail.gmail.com> <CAO7Ng+tVxwWOFk+frNj-4HTeyQeHownbg4qWgro-xPp_Lo1nqA@mail.gmail.com>
In-Reply-To: <CAO7Ng+tVxwWOFk+frNj-4HTeyQeHownbg4qWgro-xPp_Lo1nqA@mail.gmail.com>
From: Vittorio Bertocci <Vittorio@auth0.com>
Date: Mon, 25 Feb 2019 03:56:09 -0800
Message-ID: <CAO_FVe7h6nG2E5jNxv6exNS9Y527D13ScXKydd-ateYFmi51QQ@mail.gmail.com>
To: Dominick Baier <dbaier@leastprivilege.com>
Cc: David Waite <david@alkaline-solutions.com>, William Denniss <wdenniss@google.com>, oauth <oauth@ietf.org>
Content-Type: multipart/related; boundary="000000000000e894ca0582b6a070"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/BJHG8lRzPZK3W__WNGS5su6NvKQ>
Subject: Re: [OAUTH-WG] popular apps that use appauth?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Feb 2019 11:56:26 -0000

The callbacks do avoid the loopback, which is great, but the usability
remains harder than mobile and the embedded case: the auth tab appears
among others, the modal windows remain a possibility, etc - the level of
sophistication of the target audience of the github app can definitely
(hopefully?) navigate those challenges, but for consumer grade apps they
can be blockers. When decision makers are presented with concrete support
costs from customer calls vs possible security issues, it's often hard to
make a case for the latter.

[image: image.png]

On Mon, Feb 25, 2019 at 3:40 AM Dominick Baier <dbaier@leastprivilege.com>
wrote:

> A good example of a desktop application using browser authentication is
> Github for Desktop.
>
> They use custom URLs/callbacks for both OSX and Windows. Works very well.
>
> ———
> Dominick
>
> On 25. February 2019 at 11:48:20, Vittorio Bertocci (
> vittorio=40auth0.com@dmarc.ietf.org) wrote:
>
> Ahh, as John knows this is a big pet peeve for me :)
>
> Although that's all true on mobile, on desktop things are more
> complicated.
>
>    - Using a system browser on the desktop (Linux/Mac/Windows) means that
>    you don't control the experience (there might be modal dialogs occluding
>    the browser or any other Z order windows factors; the browser instance
>    might have already other tabs open; the default browser of any particular
>    machine can be different; users might need to take steps to get back to the
>    app; etc)
>    - Use of loopback adapters is banned by many big enterprises on their
>    machines
>    - The big security advantages of the approach on mobile, where apps
>    are all nicely sandboxed, is not as pronounced in an environment where the
>    user login session in the machine is the main security boundary (think
>    keylogger attaching to the main windows events pump, or a debugger - all
>    stuff not possible on mobile but viable on desktops)
>
> True, it would be fantastic if desktop OSes would offer system browser
> features comparable to what's available on iOS and Android - but today that
> doesn't appear to be the case. And the inability to leverage existing
> sessions when using embedded views on the desktop is a true pain. But
> judging from the behavior of the most popular desktop apps in market
> (Office, Slack, Adobe Reader, Visual Studio, even the Google Drive app for
> Mac...) losing the ability to access cookies is less of a nuisance for
> users than all of the above. And considering that desktop machines usually
> have their own way of identifying devices, that is also not much of a
> factor for desktop apps.
>
> The best practice has been discussed for the last 4 years and still all of
> the big apps above remain on embedded: it is however telling that the
> mobile apps from the same vendors all embraced the system browser approach.
> Since the native best practices came out, I have been working with desktop
> developers dealing with this cognitive dissonance of the best practice
> saying something that is very hard to put in practice. I understand that it
> is well intentioned and it is easier to give one single advice for both
> mobile and desktop, but while the necessary features and experiences are
> lacking on the desktop I am not sure how much of a difference it is making
> in that use case.
>
>
>
> On Mon, Feb 25, 2019 at 12:59 AM David Waite <david@alkaline-solutions.com>
> wrote:
>
>>
>> > On Feb 24, 2019, at 10:43 AM, William Denniss <wdenniss=
>> 40google.com@dmarc.ietf.org> wrote:
>> >
>> > For 1P sign-in, there are several good reasons to go with
>> ASWebAuthenticationSession, like syncing the signed-in session with Safari
>> and using it if it already exists.
>>
>> With enterprise 3P, you’ll have to use some web agent for authentication
>> pretty much no matter what, and you’ll almost certainly get pressure to use
>> ASWebAuthenticationSession, and/or potentially lose deals to competitors
>> during product evaluations. It is simply what is required for robust
>> integration into a corporate infrastructure.
>>
>> For 1P on iOS, it depends on the complexity of authentication for first
>> party. If you are just doing password and maybe SMS-based challenges, there
>> is decent enough native app integration for password sharing and SMS
>> keyboard for that to keep conversions high, even with having to
>> authenticate twice.
>>
>> However, if you want to authenticate the device (even pseudonymously with
>> session cookies) or do other factors, the authentication is simpler with
>> ASWebAuthenticationSession. Which means your life will be easier if you
>> have more complex authentication requirements anywhere on your roadmap to
>> just start off using ASWebAuthenticationSession.
>>
>> It is likely that future authentication technologies like WebAuthn will
>> not work with an embedded web view. The ability to arbitrarily inject
>> javascript means that apps can phish webauthn responses for domains via
>> embedded web views.
>>
>> -DW
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>