I agree. If you are going to install a native app, you better trust it not to 
do bad things. Grabbing your password is the least interesting thing such an 
app can abuse. I don't see any need to change the v2 draft. 

EHL

On Sep 6, 2011, at 11:10, "Igor Faynberg" <igor.faynb...@alcatel-lucent.com> 
wrote:

> Mike,
> 
> You've got the problem statement right: allowing the user to authorize  
> resource access to another party without divulging user's credentials is 
> the objective of OAuth. You are also right in that the attack you have 
> described defies the whole purpose of OAuth.  I do not think though that 
> it is related to OAuth per se.
> 
> To this end, the security work led by Torsten has thoroughly analyzed 
> the protocol and specified protection against multiple protocol 
> attacks.  From what you described, it appears to me that the attack you 
> mention is not related to the protocol but rather to the user's 
> environment.  There is no possible protection from key loggers that a 
> protocol can implement. I could be mistaken; in any case, it looks like 
> the problem rests with the implementation of WebView.
> 
> If I am wrong, I would appreciate a detailed description of what happened.
> 
> Igor
> 
> On 9/6/2011 1:40 PM, Michael Thomas wrote:
>> Hi all,
>> 
>> Barry suggested that I might subscribe and explain what I sent him.
>> 
>> My basic problem is that in neither the protocol nor the threats drafts,
>> I can't seem to find what problem is actually trying to be solved with
>> oauth, and what assumptions you're making about various elements.
>> 
>> Here's what I did. I've written an app, and I wanted re-integrate the
>> ability to send tweets after they deprecated Basic. So the app has a
>> webView (android, iphone...) which it obviously completely controls.
>> With oauth, the webview UA will ultimately redirect off to Twitter's
>> site to collect the user's credentials and grant my app's backend an
>> access token (sorry if I get terminology screwed up, i'm just coming
>> up to speed).
>> 
>> What occurs to me is that webview affords exactly zero protection from
>> my client (ie, the app) from getting the user's twitter credentials. All
>> I have to do is set up a keypress handler on that webview and in a few
>> minutes of hacking I have a key logger. etc.
>> 
>> So what I can't tell is whether this is a "problem" or not, because I
>> don't know what problem you're trying to solve. If the object of oauth
>> isn't to keep user/server credentials out of the hands of a third party,
>> then what is it trying to solve? Is there an expectation that the
>> UA is trusted by the user/server? What happens when that's not the case?
>> 
>> Regardless of whether I'm misunderstanding, it would sure be nice to have
>> both the problem and your assumptions laid out, hopefully with some 
>> prominence
>> so you don't get these sort of dumb questions.
>> 
>> Mike
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to