Re: [OAUTH-WG] Issue: 'username' parameter proposal
Evan Gilbert <uidude@google.com> Tue, 20 April 2010 00:17 UTC
Return-Path: <uidude@google.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 799593A685A for <oauth@core3.amsl.com>; Mon, 19 Apr 2010 17:17:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.719
X-Spam-Level:
X-Spam-Status: No, score=-105.719 tagged_above=-999 required=5 tests=[AWL=0.257, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ne7FUW4Sd4eI for <oauth@core3.amsl.com>; Mon, 19 Apr 2010 17:17:13 -0700 (PDT)
Received: from smtp-out.google.com (smtp-out.google.com [216.239.44.51]) by core3.amsl.com (Postfix) with ESMTP id 20A9F3A6874 for <oauth@ietf.org>; Mon, 19 Apr 2010 17:17:13 -0700 (PDT)
Received: from kpbe16.cbf.corp.google.com (kpbe16.cbf.corp.google.com [172.25.105.80]) by smtp-out.google.com with ESMTP id o3K0H149022039 for <oauth@ietf.org>; Mon, 19 Apr 2010 17:17:02 -0700
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1271722622; bh=hY+wyD3pGcPi92BrPdbr2wC3c0I=; h=MIME-Version:In-Reply-To:References:From:Date:Message-ID:Subject: To:Cc:Content-Type; b=T46+JaVloX5w8MNGreb7s9a92c1eujYoVPxmaYcIsqMY3Uk+P96f+m9CyiI50Ju0Z bUl44IjvUExPfxQ8UrNUA==
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns; h=mime-version:in-reply-to:references:from:date:message-id: subject:to:cc:content-type:x-system-of-record; b=d5kR4bRSsvw0zWTyBW3GYei7EOaChrbRuyfFwfBx/ttfiuJgTJQyZXNtmp4HcyGJf ougwv04XDPbXuJaJhRHfQ==
Received: from qyk26 (qyk26.prod.google.com [10.241.83.154]) by kpbe16.cbf.corp.google.com with ESMTP id o3K0GkL4006421 for <oauth@ietf.org>; Mon, 19 Apr 2010 17:17:00 -0700
Received: by qyk26 with SMTP id 26so5686553qyk.19 for <oauth@ietf.org>; Mon, 19 Apr 2010 17:17:00 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.229.16.148 with HTTP; Mon, 19 Apr 2010 17:16:40 -0700 (PDT)
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723438E5C7F163@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <r2pc8689b661004190833tf46085bayb92b840acf080bb4@mail.gmail.com> <C7F1C6AC.327EE%eran@hueniverse.com> <u2jc8689b661004191006hc3c7fb3eid09feafd57d2fd8a@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E723438E5C7F163@P3PW5EX1MB01.EX1.SECURESERVER.NET>
From: Evan Gilbert <uidude@google.com>
Date: Mon, 19 Apr 2010 17:16:40 -0700
Received: by 10.229.218.21 with SMTP id ho21mr2008568qcb.79.1271722620175; Mon, 19 Apr 2010 17:17:00 -0700 (PDT)
Message-ID: <o2wc8689b661004191716o69966d5di900c07737d3be568@mail.gmail.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
Content-Type: multipart/alternative; boundary="0016362842fa07452704849ffff4"
X-System-Of-Record: true
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Issue: 'username' parameter proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Apr 2010 00:17:15 -0000
On Mon, Apr 19, 2010 at 10:58 AM, Eran Hammer-Lahav <eran@hueniverse.com>wrote: > Thanks. That makes sense. > > > > My concern is that the client will ask for a specific username but an > attacker will change that request before it hits the server. The server then > asks the (wrong) user to authenticate and returns a token. The client has no > way of knowing it got an access token for the wrong user. Does requiring > that the server returns the token with the username solves this? Is this a > real issue? > This particular attack wasn't of concern to me, for a few of reasons: - The request is HTTPS, hard to modify the request before it hits the server - There are probably other, more dangerous attacks if you can modify request parameters (for example, you can modify the client_id and get the user to authorize the wrong app) I'm willing to be convinced otherwise > > > I have no objections to this proposal but wanted to see some discussion and > support from others before adding it to the spec. > > > > EHL > > > > *From:* Evan Gilbert [mailto:uidude@google.com] > *Sent:* Monday, April 19, 2010 10:06 AM > *To:* Eran Hammer-Lahav > *Cc:* OAuth WG > > *Subject:* Re: [OAUTH-WG] Issue: 'username' parameter proposal > > > > User 1 is logged into Client site > > User 2 is logged into IDP site > > > > This can happen quite frequently, as client sites often have long-lived > cookies and may only be visited by one user on a shared computer. > > > > Right now client site has no way to ask for a token for User 1, and end > result will be that User 1 starts seeing User 2's data. > > > > On Mon, Apr 19, 2010 at 8:37 AM, Eran Hammer-Lahav <eran@hueniverse.com> > wrote: > > How can they both be logged in? I have never seen a case where two users > can be both logged into to the same service at the same time... > > EHL > > > > > On 4/19/10 8:33 AM, "Evan Gilbert" <uidude@google.com> wrote: > > More details on this enhancement. > > Goal: Make sure you get an access token for the right user in immediate > mode. > > Use case where we have problems if we don't have username parameter: > > 1. Bob is logged into a web site as bob@IDP.com. > 2. Mary (his wife) is logged into IDP on the same computer as > mary@IDP.com > 3. A request is made to get an access token via the User-Agent flow in > immediate mode (or with any redirect without prompting the user) > 4. -ob now has an access token for Mary and (posts activities, > schedules events, gets contacts) as Mary > 5. Hilarity ensues > > > Secondary goal: Provide a hint for non-immediate mode > > On Thu, Apr 15, 2010 at 11:55 AM, Eran Hammer-Lahav <eran@hueniverse.com> > wrote: > > Evan Gilbert proposed a 'username' request parameter to allow the client to > limit the end user to authenticate using the provided authorization server > identifier. The proposal has not been discussed or supported by others, and > has not received a security review. > > Proposal: Obtain further discussion and support from others, as well as a > security review of the proposal. Otherwise, do nothing. > > EHL > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth > > > > >
- [OAUTH-WG] Issue: 'username' parameter proposal Eran Hammer-Lahav
- Re: [OAUTH-WG] Issue: 'username' parameter propos… Eran Hammer-Lahav
- Re: [OAUTH-WG] Issue: 'username' parameter propos… Evan Gilbert
- Re: [OAUTH-WG] Issue: 'username' parameter propos… Evan Gilbert
- Re: [OAUTH-WG] Issue: 'username' parameter propos… Marius Scurtescu
- Re: [OAUTH-WG] Issue: 'username' parameter propos… Eran Hammer-Lahav
- Re: [OAUTH-WG] Issue: 'username' parameter propos… Torsten Lodderstedt
- Re: [OAUTH-WG] Issue: 'username' parameter propos… Eran Hammer-Lahav
- Re: [OAUTH-WG] Issue: 'username' parameter propos… Torsten Lodderstedt
- Re: [OAUTH-WG] Issue: 'username' parameter propos… Brian Eaton
- Re: [OAUTH-WG] Issue: 'username' parameter propos… Evan Gilbert
- Re: [OAUTH-WG] Issue: 'username' parameter propos… Torsten Lodderstedt
- Re: [OAUTH-WG] Issue: 'username' parameter propos… Eran Hammer-Lahav
- Re: [OAUTH-WG] Issue: 'username' parameter propos… Joseph Smarr
- Re: [OAUTH-WG] Issue: 'username' parameter propos… Eran Hammer-Lahav
- Re: [OAUTH-WG] Issue: 'username' parameter propos… Brian Eaton
- Re: [OAUTH-WG] Issue: 'username' parameter propos… Eran Hammer-Lahav
- Re: [OAUTH-WG] Issue: 'username' parameter propos… Brian Eaton
- Re: [OAUTH-WG] Issue: 'username' parameter propos… Torsten Lodderstedt
- Re: [OAUTH-WG] Issue: 'username' parameter propos… Eran Hammer-Lahav
- Re: [OAUTH-WG] Issue: 'username' parameter propos… Torsten Lodderstedt
- Re: [OAUTH-WG] Issue: 'username' parameter propos… Eve Maler
- Re: [OAUTH-WG] Issue: 'username' parameter propos… Eran Hammer-Lahav
- Re: [OAUTH-WG] Issue: 'username' parameter propos… Eve Maler
- [OAUTH-WG] Autonomous clients and resource owners… Eve Maler
- Re: [OAUTH-WG] Autonomous clients and resource ow… Foiles, Doug
- Re: [OAUTH-WG] Autonomous clients and resource ow… Chuck Mortimore
- Re: [OAUTH-WG] Autonomous clients and resource ow… Eve Maler
- Re: [OAUTH-WG] Autonomous clients and resource ow… Torsten Lodderstedt
- Re: [OAUTH-WG] Autonomous clients and resource ow… Brian Eaton
- Re: [OAUTH-WG] Autonomous clients and resource ow… Torsten Lodderstedt
- Re: [OAUTH-WG] Autonomous clients and resource ow… Chuck Mortimore
- Re: [OAUTH-WG] Autonomous clients and resource ow… Keenan, Bill
- Re: [OAUTH-WG] Autonomous clients and resource ow… Chuck Mortimore
- Re: [OAUTH-WG] Autonomous clients and resource ow… Foiles, Doug
- Re: [OAUTH-WG] Autonomous clients and resource ow… Eran Hammer-Lahav
- Re: [OAUTH-WG] Autonomous clients and resource ow… Foiles, Doug
- Re: [OAUTH-WG] Autonomous clients and resource ow… Eran Hammer-Lahav
- Re: [OAUTH-WG] Autonomous clients and resource ow… Foiles, Doug
- Re: [OAUTH-WG] Autonomous clients and resource ow… Brian Eaton