Re: [OAUTH-WG] Preventing phishing attacks with auth server verification?
William Mills <wmills@yahoo-inc.com> Tue, 06 December 2011 18:10 UTC
Return-Path: <wmills@yahoo-inc.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4960721F8C06 for <oauth@ietfa.amsl.com>; Tue, 6 Dec 2011 10:10:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.548
X-Spam-Level:
X-Spam-Status: No, score=-17.548 tagged_above=-999 required=5 tests=[AWL=0.050, BAYES_00=-2.599, HTML_MESSAGE=0.001, USER_IN_DEF_WHITELIST=-15]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4BROYCYM6YxQ for <oauth@ietfa.amsl.com>; Tue, 6 Dec 2011 10:10:52 -0800 (PST)
Received: from nm14-vm0.bullet.mail.ac4.yahoo.com (nm14-vm0.bullet.mail.ac4.yahoo.com [98.139.52.234]) by ietfa.amsl.com (Postfix) with SMTP id 0D79C21F8BEF for <oauth@ietf.org>; Tue, 6 Dec 2011 10:10:16 -0800 (PST)
Received: from [98.139.52.188] by nm14.bullet.mail.ac4.yahoo.com with NNFMP; 06 Dec 2011 18:10:05 -0000
Received: from [98.139.52.159] by tm1.bullet.mail.ac4.yahoo.com with NNFMP; 06 Dec 2011 18:10:05 -0000
Received: from [127.0.0.1] by omp1042.mail.ac4.yahoo.com with NNFMP; 06 Dec 2011 18:10:05 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 402039.53642.bm@omp1042.mail.ac4.yahoo.com
Received: (qmail 69827 invoked by uid 60001); 6 Dec 2011 18:10:05 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo-inc.com; s=ginc1024; t=1323195004; bh=2Eryy/G4RD2CCQ81JPIT7hpmtB4oOqJm2Kw9kQ5AfWs=; h=X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=YawlWB8YaJ+YJ0H1gx/eVPTsvH3jgDnwmL2HYCctcZwnkVUCznUjGPtkNmDFMRQFRdXVVih7o/RgwZX05VdXD3yfPGzJYf8qeAqxMphmCVoaKVj4SDrQ0YC8Ss+DiAr59+F1XUsm+GHZRsTkOxrQN5MkEgVyY9/JlU57tMHp7yE=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=ginc1024; d=yahoo-inc.com; h=X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=rnccdIyfhgEG1J9EHACTQerRfVcBybL9BTJ7ETStzes1U4WtNExpNXPB07y7fcWWzD6PBIu6QbGF/iowveK7QjLFTy5Fy0y1ehYOXW+gOayGxLmK938OZkSK9Qz+2JXmrkyyoYWLccIR1QH65FBc/Hg3cehjU8ip2T7b6zcO4C8=;
X-YMail-OSG: gns_yWQVM1kG4dX53bpAX0eEfkLJ7f5G6tTscyJUWeR.mqv _c7iGfZa4OoSmaBBMtLk.SsCAb1wbzh_fnUMqDoBjt1TvS_kkLTI2j5mqqv_ 6HKCmZjja74oVn39eEN4LP6.L.RlixAWkvs.X01jf1yeuogikPiEwJt.NEm_ kqgc46zcVf4x2ZX1WBuzhuRelUSmr4kquRRaAgcbZg1HUCjshz9Uzvq.nrgb M.T4jbU6ewmpZzwHMOC7YlBJDU6AbBZhK81yrmkIOvpkiPPo4Wx.AMa6fnX7 15RVhnldI2wm7efD2dqHF63qlwrKIkAZmVw4qeAZqYQFmzaR5aG4yfChYXWT NLZqQiAIyz6aVQqdfGXarBJbIkNhMjzXSn1nBt6QGIGey49tcDl6Z7KUsUO_ 4OSHfVU8MMHuFfoWPcmc2Qa_CDNggs092T8c4msX3YE7i7hSXG6p9NFUa6YN hOdUPKlI-
Received: from [99.31.212.42] by web31812.mail.mud.yahoo.com via HTTP; Tue, 06 Dec 2011 10:10:04 PST
X-RocketYMMF: william_john_mills
X-Mailer: YahooMailWebService/0.8.116.331537
References: <CAGBSGjqbgYoQzP9GxZn=6RCFnzbH+tDVVgePtY+12dkRV8oPsg@mail.gmail.com>
Message-ID: <1323195004.74431.YahooMailNeo@web31812.mail.mud.yahoo.com>
Date: Tue, 06 Dec 2011 10:10:04 -0800
From: William Mills <wmills@yahoo-inc.com>
To: Aaron Parecki <aaron@parecki.com>, OAuth WG <oauth@ietf.org>
In-Reply-To: <CAGBSGjqbgYoQzP9GxZn=6RCFnzbH+tDVVgePtY+12dkRV8oPsg@mail.gmail.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="1458549034-1924750945-1323195004=:74431"
Subject: Re: [OAUTH-WG] Preventing phishing attacks with auth server verification?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills@yahoo-inc.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Dec 2011 18:10:57 -0000
An OAuth authentication server can implement that in the Web UI, no need to include it in the spec. ________________________________ From: Aaron Parecki <aaron@parecki.com> To: OAuth WG <oauth@ietf.org> Sent: Tuesday, December 6, 2011 9:42 AM Subject: [OAUTH-WG] Preventing phishing attacks with auth server verification? Has there been any discussion about supporting a 2-stage login similar to what many banks are doing, where they show you an image or a word that you previously chose so that you can verify you're talking to the right server? For example, when I log in to my bank I first enter my username. Then they show me my secret word, and if I recognize it, I enter my password. This gives me a chance to verify the server I'm logging in to really is my bank, and not a third party intercepting my login attempt. It seems that this would be a nice way to solve the security concern around embedded user agents in mobile apps. I realize this would not be part of the OAuth spec since this describes how to sign in to the authorization server. But I'm curious if this would allow native apps (especially mobile apps) to safely use an embedded browser to complete the OAuth flow? Or is the general consensus that opening an external browser is better because the user may already be signed in in that session? Aaron Parecki Geoloqi.com _______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth
- [OAUTH-WG] Preventing phishing attacks with auth … Aaron Parecki
- Re: [OAUTH-WG] Preventing phishing attacks with a… William Mills