On Thu, Feb 18, 2010 at 8:02 PM, Eran Hammer-Lahav <e...@hueniverse.com> wrote:
> Can you apply this (without too much detail) to both WRAP and OAuth 1.0a? I 
> think it
> would be useful to see how each comply with these goals (which look pretty 
> important to me).

In OAuth 1.0a, every system that needs to create or verify signatures
needs access to long-lived secrets.

This gives implementers a choice:
- let all their machines have those secrets, which increases attack surface
- add more RPCs (and thus latency and availability headaches) to every request

OAuth 1.0a also encourages servers to keep secrets in plaintext, which
creates exposure from other directions.  There may be some tricks you
can do to avoid this, but they are non-trivial.  (I'm not even sure
they would work, haven't thought them through entirely.)

Token revocation in OAuth 1.0a is also tricky, as it forces another
database lookup on every request.

WRAP doesn't do those things.

(Not saying this is the end-all/be-all of security for WRAP or OAuth.
Just additional security considerations.)

Cheers,
Brian
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to