On 2010-03-07, at 12:13 PM, Ethan Jewett wrote:

> My point is only that bearer-tokens over an insecure channel seem to
> be always *less* secure or *as* secure (but never *more* secure) than
> using a signature approach over an insecure channel. As such, I'm
> uncomfortable taking away an existing, widely implemented, and usually
> more secure approach for authentication over an insecure channel
> (OAuth 1.0a signing) and replacing it with a less secure approach
> (bearer tokens w/o SSL/TLS).


This prompts me to argue that allowing signatures is worse than bearer tokens. 
(I'm adding to the conversation here, I don't consider myself a security expert)


1) The server needs to manage state for the nonces, and properly implement 
nonce management. This added complexity can lead to additional security holes 
in the server. I'd be curious on what penetration testing has been done on 
existing OAuth deployments.

2) Client signed tokens are no more secure in MITM attacks than bearer tokens 
for on-the-fly attacks. If the attacker can disrupt the channel, the attacker 
can take the signed token and use it to make a valid call just as if it was a 
bearer token. Imagine the attacker disrupting every other request, and using 
the valid token to make an API call. The Client does not know an attack is 
going on it thinks it is having to repeat every other call, and the Server 
likely thinks the connection is flaky.

3) Deployments are made assuming there is more security than bearer tokens. 
People deploy OAuth in situations where they would not deploy a bearer token 
architecture because they think the signatures prevent attacks.

-- Dick
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to