Re: [OAUTH-WG] Security Considerations Section Proposal -02

Eran Hammer-Lahav <eran@hueniverse.com> Thu, 07 April 2011 16:37 UTC

Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C348828C164 for <oauth@core3.amsl.com>; Thu, 7 Apr 2011 09:37:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.649
X-Spam-Level:
X-Spam-Status: No, score=-2.649 tagged_above=-999 required=5 tests=[AWL=-0.050, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JSJhv3YCWct4 for <oauth@core3.amsl.com>; Thu, 7 Apr 2011 09:37:43 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id A6E7828C15F for <oauth@ietf.org>; Thu, 7 Apr 2011 09:37:43 -0700 (PDT)
Received: (qmail 11066 invoked from network); 7 Apr 2011 16:39:28 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 7 Apr 2011 16:39:27 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Thu, 7 Apr 2011 09:39:13 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Oleg Gryb <oleg@gryb.info>, Torsten Lodderstedt <torsten@lodderstedt.net>, OAuth WG <oauth@ietf.org>
Date: Thu, 07 Apr 2011 09:39:04 -0700
Thread-Topic: [OAUTH-WG] Security Considerations Section Proposal -02
Thread-Index: Acv1QfqeS3hFXZydT06yfvZgkwTUxAAADz6A
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465664E24B@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <4D9D6759.3070904@lodderstedt.net> <901760.92438.qm@web37603.mail.mud.yahoo.com>
In-Reply-To: <901760.92438.qm@web37603.mail.mud.yahoo.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Security Considerations Section Proposal -02
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Apr 2011 16:37:45 -0000

Please hold off on editorial feedback. Trying to figure out section numbers after the move is just too annoying.

EHL

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Oleg Gryb
> Sent: Thursday, April 07, 2011 9:37 AM
> To: Torsten Lodderstedt; OAuth WG
> Subject: Re: [OAUTH-WG] Security Considerations Section Proposal -02
> 
> Definitions
> "they can seamlessly make use of it capabilities" - its?
> 
> 2.3 "Application developers MUST NOT store access tokens in non-transient
>    memory".
> What is non-transient memory? Is non-persistent cookie non-transient? Do
> we know how all browsers store their non-persistent cookies?
> What if my non-persistent cookie is swapped to a HD along with my user
> agent by OS?
> 
> Consider alternative. Application developers MUST limit the life time and
> accessibility of access tokens in the same way how they protect other secrets
> on their clients. A 'secure' and 'HTTPOnly' attributes MUST be used if an
> access token is stored in a cookie.
> 
> 2.6.
> 
> "MUST NOT be
>    transmitted in clear: access tokens"
> 
> It contrdicts to the results of our "MUST" vs "SHOULD" discussion. If we have
> SHOULD in the spec, we should use the same here.
> 
> 2.9.
> "It is strongly RECOMMENDED that native application developers use
>    external browsers instead of browsers embedded in the application for
>    performing the end-user authorization process.  External browsers
>    offer a familiar usage experience and a trusted environment, in which
>    users can confirm the authentictity of the site"
> 
> I'm not sure why we're writing this. Was it proven that embedded browsers
> are less secure than external. Did anyone analyze all mobile proprietary
> "external"
> and "internal" browsers. Please provide evidence or remove the whole
> paragraph (if such evidence doesn't exist)
> 
> 2.10.
> "The authorization server operators SHOULD require..."
> Can this SHOULD be changed to MUST? If it was already discussed, please
> ignore and let me know where.
> 
> 
> 
> 
> ----- Original Message ----
> > From: Torsten Lodderstedt <torsten@lodderstedt.net>
> > To: OAuth WG <oauth@ietf.org>
> > Sent: Thu, April 7, 2011 12:27:21 AM
> > Subject: [OAUTH-WG] Security Considerations Section Proposal -02
> >
> > Hi all,
> >
> > I just posted a new revision of the proposed text for the core  draft's
> >security considerations section
> >(http://tools.ietf.org/html/draft-lodderstedt-oauth-securityconsiderations-
> 02).
> >
> > The  text makes some strong statements wrt client secrets/authentication,
> >HTTPS,  refresh tokens and other topics. This is to facilitate a clear and
> >understandable specification while also considering (and supporting) _all_
> >relevant use cases (e.g. native apps).
> >
> > Since this is the last major  building block of the draft, we would like to
> >include this text as soon as  possible.
> >
> > So please give your feedback soon!
> >
> > thanks in  advance,
> > Torsten.
> > _______________________________________________
> > OAuth  mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> >
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth