Framing this as an OAuth issue is wrong. In your scenario:

1. Install bad app
2. Do protocol X
3. Bad things happen

X can be anything. For example, the app can add a root cert to your os and 
break TLS protection. 

EHL

On Sep 6, 2011, at 11:50, "Michael Thomas" <m...@mtcc.com> wrote:

> William Mills wrote:
>> OAuth doesn't solve this problem, and can't.  Generally the question is 
>> whether the app appears to come from a reputable source, and nowadays 
>> whether it's signed (in windows land) or otherwize certified by the 
>> provider.
>> 
>> If you manage to solve this problem in a real way I'd be interested in 
>> investing in your company.
> 
> Then what I don't see anywhere is that oauth is not applicable to embedded
> web objects, and that end users should *never* trust oauth in a, say, phone
> app. As far as I can tell, the server deploying oauth can't tell that it's
> being misused, so this is all on the shoulders of the end user.
> 
> It sure looks like oauth is easily subverted in the real world.
> 
> Mike
> 
>> 
>> ------------------------------------------------------------------------
>> *From:* Michael Thomas <m...@mtcc.com>
>> *To:* Eran Hammer-Lahav <e...@hueniverse.com>
>> *Cc:* "oauth@ietf.org" <oauth@ietf.org>
>> *Sent:* Tuesday, September 6, 2011 11:34 AM
>> *Subject:* Re: [OAUTH-WG] problem statement
>> 
>> Eran Hammer-Lahav wrote:
>>> Don't install crap on you device or computer. OAuth is the least of 
>> your concern if you install bad software.
>>> If there was a solution to this we would not need an antivirus.
>> 
>> How exactly does an end user know what is "crap" or not? Or are you just 
>> dismissive of apps in
>> general? I don't think that apple and google are going to close up shop 
>> because it breaks oauth's
>> trust model.
>> 
>> Mike
>> 
>>> 
>>> EHL
>>> On Sep 6, 2011, at 11:23, "Michael Thomas" <m...@mtcc.com 
>> <mailto:m...@mtcc.com>> wrote:
>>> 
>>>> Eran Hammer-Lahav wrote:
>>>>> I agree. If you are going to install a native app, you better trust 
>> it not to do bad things. Grabbing your password is the least interesting 
>> thing such an app can abuse. I don't see any need to change the v2 draft.
>>>> How, exactly, is the user supposed to protect themselves against 
>> rogue apps?
>>>> It sounds like the solution is to tell them to never use oauth in an 
>> app at all.
>>>> 
>>>> Is oauth only intended to be used on standalone trustable web 
>> browsers? I don't recall
>>>> seeing that anywhere.
>>>> 
>>>> Mike
>>>> 
>>>>> EHL
>>>>> 
>>>>> On Sep 6, 2011, at 11:10, "Igor Faynberg" 
>> <igor.faynb...@alcatel-lucent.com 
>> <mailto:igor.faynb...@alcatel-lucent.com>> wrote:
>>>>> 
>>>>>> Mike,
>>>>>> 
>>>>>> You've got the problem statement right: allowing the user to 
>> authorize  resource access to another party without divulging user's 
>> credentials is the objective of OAuth. You are also right in that the 
>> attack you have described defies the whole purpose of OAuth.  I do not 
>> think though that it is related to OAuth per se.
>>>>>> 
>>>>>> To this end, the security work led by Torsten has thoroughly 
>> analyzed the protocol and specified protection against multiple protocol 
>> attacks.  From what you described, it appears to me that the attack you 
>> mention is not related to the protocol but rather to the user's 
>> environment.  There is no possible protection from key loggers that a 
>> protocol can implement. I could be mistaken; in any case, it looks like 
>> the problem rests with the implementation of WebView.
>>>>>> 
>>>>>> If I am wrong, I would appreciate a detailed description of what 
>> happened.
>>>>>> 
>>>>>> Igor
>>>>>> 
>>>>>> On 9/6/2011 1:40 PM, Michael Thomas wrote:
>>>>>>> Hi all,
>>>>>>> 
>>>>>>> Barry suggested that I might subscribe and explain what I sent him.
>>>>>>> 
>>>>>>> My basic problem is that in neither the protocol nor the threats 
>> drafts,
>>>>>>> I can't seem to find what problem is actually trying to be solved 
>> with
>>>>>>> oauth, and what assumptions you're making about various elements.
>>>>>>> 
>>>>>>> Here's what I did. I've written an app, and I wanted re-integrate the
>>>>>>> ability to send tweets after they deprecated Basic. So the app has a
>>>>>>> webView (android, iphone...) which it obviously completely controls.
>>>>>>> With oauth, the webview UA will ultimately redirect off to Twitter's
>>>>>>> site to collect the user's credentials and grant my app's backend an
>>>>>>> access token (sorry if I get terminology screwed up, i'm just coming
>>>>>>> up to speed).
>>>>>>> 
>>>>>>> What occurs to me is that webview affords exactly zero protection 
>> from
>>>>>>> my client (ie, the app) from getting the user's twitter 
>> credentials. All
>>>>>>> I have to do is set up a keypress handler on that webview and in 
>> a few
>>>>>>> minutes of hacking I have a key logger. etc.
>>>>>>> 
>>>>>>> So what I can't tell is whether this is a "problem" or not, because I
>>>>>>> don't know what problem you're trying to solve. If the object of 
>> oauth
>>>>>>> isn't to keep user/server credentials out of the hands of a third 
>> party,
>>>>>>> then what is it trying to solve? Is there an expectation that the
>>>>>>> UA is trusted by the user/server? What happens when that's not 
>> the case?
>>>>>>> 
>>>>>>> Regardless of whether I'm misunderstanding, it would sure be nice 
>> to have
>>>>>>> both the problem and your assumptions laid out, hopefully with 
>> some prominence
>>>>>>> so you don't get these sort of dumb questions.
>>>>>>> 
>>>>>>> Mike
>>>>>>> _______________________________________________
>>>>>>> OAuth mailing list
>>>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth
>> 
>> 
> 
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to