Hi Marc,

You're right, the report I referred to is not a formal analysis.

Thanks for the reference to the your lab's analysis of OAuth 1.0a.  I had a 
quick look at it, and at the Canetti tutorial on the underlying methodology 
that the paper refers to.  It's interesting, but so complicated!

It's a pity that your colleagues missed the flaw in OAuth 1.0a.  In section 5.4 
they say "We assume that the Consumer and Service Providers have public keys 
(and certificates) and that the end-user communicates with theses server 
entities over secure channels (SSL/TLS)".  If instead of assuming it they had 
checked the spec they would have seen that that's not true for the consumer, 
and they would have been able to claim an important practical result :-)

Francisco

--- On Sat, 5/14/11, Mark Mcgloin <mark.mcgl...@ie.ibm.com> wrote:

From: Mark Mcgloin <mark.mcgl...@ie.ibm.com>
Subject: Re: [OAUTH-WG] Formal security protocol analysis of OAuth 2.0
To: fcore...@pomcor.com
Cc: oauth@ietf.org
Date: Saturday, May 14, 2011, 11:09 AM

Hi Francisco

Yes, I have seen that report in the past and it is good and informative but
is not a substitute for formal analysis. Here is another example of the
type of analysis I am looking for, this one covering Oauth 1.0a from our
research lab

http://domino.watson.ibm.com/library/cyberdig.nsf/papers/B0D33665257DD3A0852576410043BCDD/$File/rc24856.pdf


Regards
Mark


Francisco Corella <fcore...@pomcor.com> wrote on 13/05/2011 17:58:01:

> Francisco Corella <fcore...@pomcor.com>
> 13/05/2011 17:58
>
> Please respond to
> fcore...@pomcor.com
>
> To
>
> oauth@ietf.org, Mark Mcgloin/Ireland/IBM@IBMIE
>
> cc
>
> Subject
>
> Re: [OAUTH-WG] Formal security protocol analysis of OAuth 2.0
>
> We wrote a security analysis of double redirection protocols that
> has a section on OAuth 2.0 as of draft 11.  You can find it at
> http://pomcor.com/techreports/DoubleRedirection.pdf
>
> Francisco
>
> --- On Fri, 5/13/11, Mark Mcgloin <mark.mcgl...@ie.ibm.com> wrote:
>
> From: Mark Mcgloin <mark.mcgl...@ie.ibm.com>
> Subject: [OAUTH-WG] Formal security protocol analysis of OAuth 2.0
> To: oauth@ietf.org
> Date: Friday, May 13, 2011, 10:40 AM

>
> Does anyone know of a formal security protocol analysis that has been
> carried out for OAuth 2.0?
>
> I could only find analysis done against 1.0a, like this one:
>
> http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5762765
>
>
> thanks
> Mark
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to