Hi Brandon,

password hijacking is a serious problem for everyone. That's why both
MS365 and Google are deprecating basic auth...in their services only
so far.

I might add that the OAUTH mechanism is better than application
passwords due to the refresh mechanism, but not by much - it depends
on the providers ability to detect token hijacking, which so far has
proven to be as faulty as the good old login/plain mechanisms.
: https://mrd0x.com/stealing-tokens-from-office-applications/

OAUTH helps with that, if a user is phished out of his password, the
hacker will be faced with the 'New Device registration' page and he
hopefully can't get past that, but if the hacker steals the token
directly, we're back to square 1 pretty much. 

It's frustrating that both both MS & Google call LOGIN/PLAIN Insecure
& old but do nothing to speed up the large-scale adoption of OAUTH,
except for nudging users to move to their own services.

I'm sure you know that Outlook has hardcoded OAUTH login through 
https://accounts.google.com/.well-known/openid-configuration but for
no other provider. They probably did it either because of userbase
size or through a direct deal with Google. 

[What if / when will] the Gmail app also decide to no longer support
"Insecure auth" ?

Both MS/Google have major interests to kill off their competition so
what better way than to claim everyone is using insecure methods while
only offering secure connections to their own servers through their
client apps. That's what I meant by closing down the eco-system.

So pretty much the original question remains: Why don't the popular
client apps support 3rd party oauth implementations using the same
mechanisms they use for themselves ?

Cheers,
Scott

On Wednesday, 10/07/2024 at 02:36 Brandon Long wrote:









On Tue, Jul 9, 2024 at 7:20 PM Scott Q. via mailop  wrote:




 What exactly is missing for broad acceptance ?


https://openid.net/specs/openid-connect-discovery-1_0.html  defines
some pretty clear ways to autodiscover the endpoints.


MS & Google and Keycloak both offer this URL:


https://login.microsoftonline.com/domain.com/.well-known/openid-configuration
https://accounts.google.com/.well-known/openid-configuration


I believe the latest Yahoo mobile app won't even connect to imap/smtp
servers that don't have oauth2 support.

It seems as if the big guys are closing down the eco-system...



Or they have hundreds of millions of customers who routinely suffer
from password hijacking attacks on a scale that's hard to imagine and
regular password based
login for smtp/imap has almost no mechanisms to use any of the
advanced login behaviors that the eco-system has pushed, including
2FA, webauthn, and passkeys
not to mention more advanced risk assessment and barriers to bots and
hijacking attempts.  Using OAUTHBEARER punts the actual login to the
web (or OS built-in
oauth login supports) to protect customers.

I've seen arguments that some of these types of large scale attacks
are only possible due to the large scale providers existence... or in
some cases, the large
scale attacks and responses still allow a lot of small stuff through
and maybe a system with more providers of smaller sizes would suffer
less... maybe it would mean 
a larger number of anti-hijacking folks spread across such an
eco-system.  Or maybe a more various set of defenses across a larger
number of providers would make it more
complicated for attackers to concentrate their attacks... I'm not sure
that has proven true in the spam attack eco-system, though, so unclear
that would work in the hijacking one.

Another interesting case there would be APTs and high value targets,
that number of attacks is much smaller and more targeted, so may only
be up to larger systems to
have the attack exposure necessary to justify spending on defense
against it.

Anyways, hijacking, the slow agonizing death of password based auth,
and the solution for imap/smtp (that while open may be imperfectly so)
certainly have legitimate justification,
and tying that to "closing down the eco-system" seems odd... certainly
other providers can still offer password based auth, and it seems more
incumbent on them and the client folks
to figure out discovery.

Oh, and that's before you get the entire third party services thing
where you don't want your users giving random services their password,
oauth solve that problem... and then the
client-id validation is used to try and solve the cambridge analytica
/ unroll.me [1] problem of problematic third party services. 
Honestly that issue is more of a problem for
the open eco-system than the "big guys".  Let me access your email to
tell you which character trait you are from , what could
go wrong...

Brandon



Links:
------
[1] http://unroll.me
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to