The other related use case here is the Google Apps marketplace model for
sitewide app auth:

http://code.google.com/apis/accounts/docs/OAuth.html#GoogleAppsOAuth

http://www.google.com/support/a/bin/answer.py?hl=en&answer=162105



On Mon, Mar 22, 2010 at 3:03 PM, Ethan Jewett <esjew...@gmail.com> wrote:

> On Fri, Mar 19, 2010 at 6:21 PM, Brian Eaton <bea...@google.com> wrote:
> >
> > The gadget tells the container *where* to send the request.  So if
> > OpenSocial gadgets supported PLAINTEXT, a malicious gadget author, or
> > a malicious user of a gadget (they are pure javascript) could tell the
> > container "please send a request to
> > https://www.example.com/log_my_secret";.
> >
> > And the container would then leak the secret to www.example.com.
>
> I've got to be missing something in the OpenSocial specification, but
> in my mind the container *must* be keeping track of which secrets
> belong to which domain, even for the signing case. Signing a request
> to a random domain with a random secret isn't going to work, so the
> application must be taking requests from gadgets and doing some
> matching to secrets based on the URL. This matching (done correctly -
> a big "if") should preclude leaking secrets.
>
> In any case, this is probably neither here nor there. I agree with
> your assessment of the two main interesting Open Social use cases.
> Especially the idea that it is an example of a type of trusted
> containers that can protect secrets from other applications or mediate
> for an application in a not-as-highly-trusted environment.
>
> Ethan
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to