On Wed, Apr 7, 2010 at 11:21 PM, Eran Hammer-Lahav <e...@hueniverse.com>wrote:

> I will leave this to the security folks to decide but it seems to me that
> if
> the client asks to limit the username of the end user granting access by
> specifying it in the request, the server must repeat that information when
> issuing such a token. Otherwise, an attacker can force a user to grant
> access to another account (for example, if they have both a personal and
> work accounts on the same server) without the client being able to detect
> it.
>
> In other words, if the client can demand an access token for a specific
> username, it should be able to have the absolute confidence (assuming it
> trusts the server) that the access token received has that attribute.
>

Note: I'm fine with adding a username in the response if it helps from the
security side. It's not clear to me that there's a security hole, but it
never hurts to provide more information in the response back.


> EHL
>
>
> On 4/7/10 10:46 PM, "Evan Gilbert" <uid...@google.com> wrote:
>
> >
> >
> >
> > On Wed, Apr 7, 2010 at 9:29 AM, John Panzer <jpan...@google.com> wrote:
> >> I'm assuming that tokens need not be bound to a specific user (typically
> they
> >> are, but imagine a secretary granting an app access to his boss's
> calendar
> >> and then leaving the company and therefore being removed from the
> calendar
> >> ACL, but the app still keeping access by virtue of the capability
> granted by
> >> the token).  In this case, the proposed wording seems kind of
> problematic for
> >> a MUST.
> >
> > Note that the "resource owner" in this case is the secretary, not his
> boss.
> > Resource owner is "An entity capable of granting access to a protected
> > resource."
> >
> > Since access tokens are bound to the resource owner ("A unique identifier
> used
> > by the client to make authenticated requests on behalf of the resource
> > owner."), I think in this case the system would have a clear way to
> revoke
> > access to the document.
> >
> > Updating the wording on the proposal slightly to clarify (also changing
> format
> > to new parameter formatting)
> >
> > Before:
> > username
> >   The resource owner's username. The authorization server MUST only send
> back
> > refresh tokens or access tokens for the user identified by username
> >
> > Current:
> > username
> >   OPTIONAL. The resource owner's username. The authorization server MUST
> only
> > send back refresh tokens or access tokens capable of making requests on
> behalf
> > of the user identified by username
> >
> >>
> >> On Wed, Apr 7, 2010 at 8:22 AM, Evan Gilbert <uid...@google.com> wrote:
> >>>
> >>>
> >>> On Wed, Apr 7, 2010 at 12:08 AM, Eran Hammer-Lahav <
> e...@hueniverse.com>
> >>> wrote:
> >>>> What about an attacker changing the username similar to the way a
> callback
> >>>> can be changed?
> >>>
> >>> I don't think there is a danger here.
> >>>
> >>> We still use all of the safeguards in place from the rest of the flow -
> >>> adding this parameter never log you in when omitting the parameter
> would not
> >>> have. It will just create more error responses.
> >>>
> >>>>
> >>>> EHL
> >>>>
> >>>>
> >>>>
> >>>> On 4/6/10 11:14 PM, "Evan Gilbert" <uid...@google.com
> >>>> <http://uid...@google.com> > wrote:
> >>>>
> >>>>>
> >>>>>
> >>>>> On Tue, Apr 6, 2010 at 11:07 PM, Eran Hammer-Lahav <
> e...@hueniverse.com
> >>>>> <http://e...@hueniverse.com> > wrote:
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>> On 4/6/10 5:24 PM, "Evan Gilbert" <uid...@google.com
> >>>>>> <http://uid...@google.com> > wrote:
> >>>>>>
> >>>>>>> Proposal:
> >>>>>>> In 2.4.1 & 2.4.2, add the following OPTIONAL parameter
> >>>>>>> username
> >>>>>>>   The resource owner's username. The authorization server MUST only
> send
> >>>>>>> back
> >>>>>>> refresh tokens or access tokens for the user identified by
> username.
> >>>>>>
> >>>>>> What are the security implications? How can the client know that the
> >>>>>> token
> >>>>>> it got is really for that user?
> >>>>>
> >>>>> Think the client has to trust the auth server, in the same way as
> with the
> >>>>> username + password profile. The auth server can always send back a
> scope
> >>>>> for a different user.
> >>>>>
> >>>>> Worst case is that there is an identity mismatch between client and
> the
> >>>>> identity implicit in the authorization token. This mismatch is
> already
> >>>>> possible, and I don't think the username parameter makes the problem
> >>>>> worse.
> >>>>>
> >>>>>>
> >>>>>> EHL
> >>>>>>
> >>>>>
> >>>>>
> >>>
> >>>
> >>> _______________________________________________
> >>> OAuth mailing list
> >>> OAuth@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/oauth
> >>>
> >>
> >
> >
>
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to