Am 18.09.2010 01:28, schrieb Kris Selden:
Secrets on native apps are good!  The key is (no pun intended) that the secret 
not ship with the app.  Each client should register for its own client_id and 
secret when it is installed on the client machine.
Maybe I'm missing something but...

If it has no credentials, why does sending it credentials after it has been 
installed, prove the client app is trusted?  Isn't an installed app without 
credentials, an untrusted app?  How do you know when you register the client 
that it is the app you think it is?

What can the client you want to register do that a client you don't want to 
register can't after install?

How would say an iPhone client that I download register?  Push notifications?  
What if the end user hasn't enabled them? (I know a lot of people who turn them 
off) Also, if they've been hacked on a jailbroken phone 
(http://www.pushfix.info) are they really proving that the client is the client 
you think it is?

"The specification is very clear (as the article quotes) – don’t use client secrets 
in installed applications! The reason why the specification doesn’t say much more is 
because there is no solution. It does not exist for a distributed application unless you 
issue a different secret to each installation."
http://hueniverse.com/2010/09/all-this-twitter-oauth-security-nonsense/

Once the secret is installed isn't it still vulnerable after installation? Or 
is it because you can revoke the one abused secret (after detecting that it has 
been abused) without invalidating all the installed clients.

It seems like what would be ideal is if these mobile app marketplaces could 
install a unique client secret when an app is purchased. Otherwise I would 
think an untrusted app could just mimic a trusted app during registration.

that's a very interesting idea but it requires a strong trust relationship between app marketplace and authorization server.

In my opinion, client secrets dynamically issued by the OAuth authorization server might at most be a solution against session fixation attacks (cf. http://www.ietf.org/mail-archive/web/oauth/current/msg04358.html).

regards,
Torsten.


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to