We have native clients using the first 3 as well with good success

-cmort


On 4/4/11 2:00 PM, "Brian Eaton" <bea...@google.com> wrote:

On Mon, Apr 4, 2011 at 1:06 PM, Phil Hunt <phil.h...@oracle.com> wrote:
> Very quickly here is the attack...
> 1) Paul starts dance at good Client &  good AS, App requests authorization. 
> Note: outbound call is secure, but returned redirect is not.

For the record, we haven't had particular problems with installed apps
finding secure callback URLs.  We've got mobile clients using the
following approaches:

- using custom URL schemes.
   I gather this is forbidden by spec, but it prevents the attack at least.

- using https URLs hosted at Google, in a web view
   Mobile apps watch the URL (you can do this with embedded web views)
and read the authorization code that way.

- using https URLs hosted at third-party web sites, in a web view
   These are typically static or very simple web sites that are used
just to transfer control back to the mobile app.

- using https URLs hosted at Google, in the default browser rather
than a web view
    There are various tricks that you can use to pick up the
authorization code from the default browser.  They are all ugly, but
they work.

Cheers,
Brian
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to