Luke,

Thanks for answering. Sorry, for been paranoid, but I think that you'll have 
more qs in regards of your frame-based-cross-domain-secret-sharing solution.

The thing is that each time when a web app with sensitive info can be run in a 
frame, security people would advice to break that frame-reads-other-frame-data 
logic, because it can lead to violation of same origin policy.

I think Torsten's suggestion is correct: somebody would need to "threat model" 
the current UA flow.

Alternatively, you might want to consider creating yet another "safer UA flow" 
where access token will not be passed in a URL. It might require using dynamic 
pages generated by a server, but if somebody wants to implement a more secure 
solution, they'll at least have a choice.

 



>
>From: Luke Shepard <lshep...@facebook.com>
>To: Oleg Gryb <o...@gryb.info>
>Cc: Torsten Lodderstedt <tors...@lodderstedt.net>; David Recordon 
><record...@gmail.com>; Naitik Shah <nai...@facebook.com>; OAuth WG 
><oauth@ietf.org>
>Sent: Tue, August 10, 2010 10:23:56 AM
>Subject: Re: [OAUTH-WG] Quick survey: fragment vs. query
>
>
>Here are the possible URLs:
>
>
>http://static.facebook.com/connect/xd_proxy.php#code=10alkji&access_token=lzipa3p
>
>http://static.facebook.com/connect/xd_proxy.php?code=10alkji#access_token=lzipa3p
>
>
>
>Those who already use this flow in production (including Google, Facebook, 
>Twitter, and others) typically work like this:
>
>
>- Parent frame initiates the transaction by spawning a popup or an iframe
>- Response comes back to a static relay file (like the xd_proxy.php above)
>- The relay interprets the URL, parses out arguments, and hands them to the 
>parent frame
>- Parent frame then does what it wants. this could be making an API call via 
>JSONP, handing info to the server via Ajax, or something else.
>
>
>Because the relay file is static, it isn't going to interpret the code 
>regardless, even if it is sent in the query parameter. So since the client 
>will 
>handle it anyway, the fragment is better for two reasons:
>
>
>1/ Less code for the JS to just pull it out of the fragment
>2/ More efficient, as the relay file can be cached on the client. If you 
>include 
>a code then you degrade performance because it busts the cache every time.
>
>
>
>
>On Aug 10, 2010, at 9:35 AM, Oleg Gryb wrote:
>
>I was trying to understand that too (see "Is user agent profile secure" 
>thread). 
>The answers that I've got were:
>>
>>
>>1. It's already coded this way.
>>2. It's the most efficient way of doing that, because that relay.html page is 
>>static and can be cached by a browser.
>>
>>None of the answers above looks very convincing to me, but that's where UA is 
>>now. 
>>
>>From: Torsten Lodderstedt <tors...@lodderstedt.net>
>>
>>Can someone pls. explain why code and token should both be returned in the 
>>fragment?
>>>
>>>
>>>
>>>regards,
>>>Torsten.
>>>
>>_______________________________________________
>>OAuth mailing list
>>OAuth@ietf.org
>>https://www.ietf.org/mailman/listinfo/oauth
>>
>


      
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to