Re: [OAUTH-WG] Security Considerations Section Proposal -02
Eran Hammer-Lahav <eran@hueniverse.com> Thu, 07 April 2011 16:37 UTC
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C348828C164 for <oauth@core3.amsl.com>; Thu, 7 Apr 2011 09:37:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.649
X-Spam-Level:
X-Spam-Status: No, score=-2.649 tagged_above=-999 required=5 tests=[AWL=-0.050, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JSJhv3YCWct4 for <oauth@core3.amsl.com>; Thu, 7 Apr 2011 09:37:43 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id A6E7828C15F for <oauth@ietf.org>; Thu, 7 Apr 2011 09:37:43 -0700 (PDT)
Received: (qmail 11066 invoked from network); 7 Apr 2011 16:39:28 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 7 Apr 2011 16:39:27 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Thu, 7 Apr 2011 09:39:13 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Oleg Gryb <oleg@gryb.info>, Torsten Lodderstedt <torsten@lodderstedt.net>, OAuth WG <oauth@ietf.org>
Date: Thu, 07 Apr 2011 09:39:04 -0700
Thread-Topic: [OAUTH-WG] Security Considerations Section Proposal -02
Thread-Index: Acv1QfqeS3hFXZydT06yfvZgkwTUxAAADz6A
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465664E24B@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <4D9D6759.3070904@lodderstedt.net> <901760.92438.qm@web37603.mail.mud.yahoo.com>
In-Reply-To: <901760.92438.qm@web37603.mail.mud.yahoo.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Security Considerations Section Proposal -02
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Apr 2011 16:37:45 -0000
Please hold off on editorial feedback. Trying to figure out section numbers after the move is just too annoying. EHL > -----Original Message----- > From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf > Of Oleg Gryb > Sent: Thursday, April 07, 2011 9:37 AM > To: Torsten Lodderstedt; OAuth WG > Subject: Re: [OAUTH-WG] Security Considerations Section Proposal -02 > > Definitions > "they can seamlessly make use of it capabilities" - its? > > 2.3 "Application developers MUST NOT store access tokens in non-transient > memory". > What is non-transient memory? Is non-persistent cookie non-transient? Do > we know how all browsers store their non-persistent cookies? > What if my non-persistent cookie is swapped to a HD along with my user > agent by OS? > > Consider alternative. Application developers MUST limit the life time and > accessibility of access tokens in the same way how they protect other secrets > on their clients. A 'secure' and 'HTTPOnly' attributes MUST be used if an > access token is stored in a cookie. > > 2.6. > > "MUST NOT be > transmitted in clear: access tokens" > > It contrdicts to the results of our "MUST" vs "SHOULD" discussion. If we have > SHOULD in the spec, we should use the same here. > > 2.9. > "It is strongly RECOMMENDED that native application developers use > external browsers instead of browsers embedded in the application for > performing the end-user authorization process. External browsers > offer a familiar usage experience and a trusted environment, in which > users can confirm the authentictity of the site" > > I'm not sure why we're writing this. Was it proven that embedded browsers > are less secure than external. Did anyone analyze all mobile proprietary > "external" > and "internal" browsers. Please provide evidence or remove the whole > paragraph (if such evidence doesn't exist) > > 2.10. > "The authorization server operators SHOULD require..." > Can this SHOULD be changed to MUST? If it was already discussed, please > ignore and let me know where. > > > > > ----- Original Message ---- > > From: Torsten Lodderstedt <torsten@lodderstedt.net> > > To: OAuth WG <oauth@ietf.org> > > Sent: Thu, April 7, 2011 12:27:21 AM > > Subject: [OAUTH-WG] Security Considerations Section Proposal -02 > > > > Hi all, > > > > I just posted a new revision of the proposed text for the core draft's > >security considerations section > >(http://tools.ietf.org/html/draft-lodderstedt-oauth-securityconsiderations- > 02). > > > > The text makes some strong statements wrt client secrets/authentication, > >HTTPS, refresh tokens and other topics. This is to facilitate a clear and > >understandable specification while also considering (and supporting) _all_ > >relevant use cases (e.g. native apps). > > > > Since this is the last major building block of the draft, we would like to > >include this text as soon as possible. > > > > So please give your feedback soon! > > > > thanks in advance, > > Torsten. > > _______________________________________________ > > OAuth mailing list > > OAuth@ietf.org > > https://www.ietf.org/mailman/listinfo/oauth > > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth
- [OAUTH-WG] Security Considerations Section Propos… Torsten Lodderstedt
- Re: [OAUTH-WG] Security Considerations Section Pr… Eran Hammer-Lahav
- Re: [OAUTH-WG] Security Considerations Section Pr… Oleg Gryb
- Re: [OAUTH-WG] Security Considerations Section Pr… Eran Hammer-Lahav
- Re: [OAUTH-WG] Security Considerations Section Pr… Torsten Lodderstedt