I agree with the factual information, but I disagree with the conclusion.

Indeed, there were postings from people who will "bake secrets into installed applications." But there have also been postings from people (like Torsten and me) who said they "will use real secrets and rely on them."

I don't see why the latter group has to be ignored, but I surely disagree that "people are going to ignore what the spec says on this."

Igor


On 6/16/2011 4:30 PM, Brian Eaton wrote:
On Thu, Jun 16, 2011 at 1:25 PM, Torsten Lodderstedt <tors...@lodderstedt.net <mailto:tors...@lodderstedt.net>> wrote:

    no I'm saying people will use real secrets and rely on them - just
    as with OAuth 1.0


=)

People are going to ignore what the spec says on this. If you read through the mailing list threads on this topic, you'll notice several people have stated quite clearly that they are going to be baking secrets into installed applications, and that they think they have reasonable mitigations in place for the security risk.

It's not that those people are dumb, either. They understand exactly what they are doing. And their native applications are not going to be any less secure because of the choices they are making.


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to