Re: [OAUTH-WG] problem statement

Michael Thomas <mike@mtcc.com> Tue, 06 September 2011 18:26 UTC

Return-Path: <mike@mtcc.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E755E21F8D01 for <oauth@ietfa.amsl.com>; Tue, 6 Sep 2011 11:26:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id U5fRzdtXxYao for <oauth@ietfa.amsl.com>; Tue, 6 Sep 2011 11:26:55 -0700 (PDT)
Received: from mtcc.com (mtcc.com [50.0.18.224]) by ietfa.amsl.com (Postfix) with ESMTP id AC77821F8CF5 for <oauth@ietf.org>; Tue, 6 Sep 2011 11:26:50 -0700 (PDT)
Received: from piolinux.mtcc.com (65-165-164-246.volcano.net [65.165.164.246]) (authenticated bits=0) by mtcc.com (8.14.3/8.14.3) with ESMTP id p86ISaKP002619 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 6 Sep 2011 11:28:37 -0700
Message-ID: <4E66664F.3010900@mtcc.com>
Date: Tue, 06 Sep 2011 11:28:31 -0700
From: Michael Thomas <mike@mtcc.com>
User-Agent: Thunderbird 2.0.0.14 (X11/20080501)
MIME-Version: 1.0
To: John Kemp <john@jkemp.net>
References: <4E665B25.6090709@mtcc.com> <F5DE9F34-EF45-4C72-8257-A019AF2ABBB2@jkemp.net>
In-Reply-To: <F5DE9F34-EF45-4C72-8257-A019AF2ABBB2@jkemp.net>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=1331; t=1315333718; x=1316197718; c=relaxed/simple; s=thundersaddle.kirkwood; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version; d=mtcc.com; i=mike@mtcc.com; z=From:=20Michael=20Thomas=20<mike@mtcc.com> |Subject:=20Re=3A=20[OAUTH-WG]=20problem=20statement |Sender:=20 |To:=20John=20Kemp=20<john@jkemp.net> |Content-Type:=20text/plain=3B=20charset=3DISO-8859-1=3B=20 format=3Dflowed |Content-Transfer-Encoding:=207bit |MIME-Version:=201.0; bh=xVAhCVacTgfy2vdCjYgy/KBVZWzoXarlBrjay4gkdx0=; b=ghWkLh0y4sD8gMKCuEjIKDTPpz3SRnOkLYNz2T6cFkp3wmMnIN58vy/pio 6FN1n7eGpGM0Mbfl0mm4qEIRRXltUEbSPVp5JwUAOaY0jkPpwQ541OKLbieY Ehzm/3eadjbkJQEnI7P5I4C/LMbXBA3QA7dXDZQ+hQteMgaKQA9lA=;
Authentication-Results: ; v=0.1; dkim=pass header.i=mike@mtcc.com ( sig from mtcc.com/thundersaddle.kirkwood verified; ); dkim-asp=pass header.From=mike@mtcc.com
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] problem statement
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Sep 2011 18:26:56 -0000

John Kemp wrote:
>> Regardless of whether I'm misunderstanding, it would sure be nice to have
>> both the problem and your assumptions laid out, hopefully with some prominence
>> so you don't get these sort of dumb questions.
> 
> One point I would mention first is that your question isn't dumb ;) 
> 
> But, as I noted, OAuth seeks to avoid the requirement for a user to share her username/password at one web application with another. That being said, there are lots of ways to get that wrong, and the way of resolving those is to implement OAuth-based applications using the security features available in their specific environments, as these vary quite a lot. OAuth provides a number of different protocol flows to help with that, and "security considerations" that discuss known security threats within various environments. By careful reading, you can determine which flow is appropriate for your application, and which security features should be used to avoid the threats to your application.

So to take this back to the concrete (I'm new here, so abstractions are hard): are you saying that Twitter
got it wrong? My app can't be the one that's wrong because my app is the potential attacker. If it was
Twitter, what did they do wrong? If not, who got what wrong that allows this situation to occur?

Mike