On Sep 6, 2011, at 4:10 PM, Michael Thomas wrote:

> John Kemp wrote:
>> On Sep 6, 2011, at 3:49 PM, Michael Thomas wrote:
>>> Except in the desktop web world, I choose from a *tiny* set of browsers:
>>> chrome, firefox, opera, and, uh, ie. To a lesser or greater extent, I don't
>>> expect that the browsers themselves are malicious. Which is a pretty ok
>>> assumption.
>> It is? I would certainly question it. The WebKit WebView is embeddable in 
>> the C/C++ programming languages and APIs are available for that on most 
>> platforms - all are open to the same attacks you mention. How about the 
>> plugins you get for your browser from various places - they could have key 
>> loggers too. It's also possible for an app delivered from a server to 
>> present a login form that looks like it is from Twitter, but is actually 
>> from an attacker site. Such attacks are very common indeed, and don't 
>> require a key logger. They do require the user to "trust" the app though, 
>> just as the user would need to trust the key logger he installed.
> 
> I didn't say they weren't embeddable elsewhere. I just gave my example. And 
> if I don't
> use plugins, the browser is relatively trustable, especially in comparison to 
> standalone
> apps -- on desktop *or* phone, etc.

Again, I disagree. As a user, I should pay attention to the sites I visit - as 
much as I should pay attention to the apps I download.

> 
> 
>>> With embedded web views, that assumption goes out the window. There are
>>> 100's of thousands of apps, all of which can use webviews. I have no way
>>> to know if a given app is evil or not, and *lots* of apps provide facebook
>>> and twitter integration. Not because they're evil, but because that's what's
>>> expected by users. So the use model of oauth in this case is *very* 
>>> different
>>> than the desktop use case.
>> I disagree. If anything, because desktop machines tend to be less 
>> 'locked-down' than mobile platforms (app stores for desktops followed app 
>> stores for mobile platforms), they are more widely open to abuse.
> 
> I can tell you from experience that Android absolutely doesn't check anything 
> of this
> sort, and it would take extremely deep voodoo for Apple to do the same: they 
> never see
> source.

I believe that both Apple and Google *do attempt* to prevent malware from 
getting into their stores. 
 
> 
> So the reality is that neither are trustable.

This I agree with ;)

> 
>>> But I'm being told that use cases aren't the problem of oauth. I'd say that
>>> there has all along been a hidden assumption that the browser was
>>> a trusted entity.
>> The point is simply that if you can subvert the actual platform, then OAuth 
>> problems are the least of your worries (as a user).
> 
> People keep saying that to deflect criticism, but I don't buy it. Other 
> protocols aren't
> availing an attacker to user credentials to third party servers by simply 
> snooping on the
> webview key traffic in an otherwise completely normal use pattern.

HTTP Auth? Web form login? 

> 
> Have you ever signed on to facebook in an app before?

Frankly, not too often, no, since these apps usually ask for far more authority 
than I believe is necessary for the purpose of using the app.

- John

> 
> Mike
> 
>> - John
>>> Since it isn't always, it should be very explicit in the
>>> protocol, threats, and security considerations of what could happen if it's
>>> not.
>>> 
>>> Mike, frankly this is why apps do suck but i'm not king of the world
>>> 
>>>> -- Justin
>>>> On Tue, 2011-09-06 at 15:28 -0400, Michael Thomas wrote:
>>>>> Melinda Shore wrote:
>>>>>> On 09/06/2011 11:11 AM, Jill Burrows wrote:
>>>>>>> I repeat, it is not an OAuth problem.
>>>>>> If I'm reading Mike correctly (and if I'm not it won't be the
>>>>>> first time I've misunderstood him), he's not really asking for
>>>>>> OAUTH to solve this particular problem but to clarify the
>>>>>> documents and beef up discussions of what is and is not in
>>>>>> scope.  He read the document and couldn't figure out whether
>>>>>> or not this particular problem is the business of the working
>>>>>> group.
>>>>> I'm fairly certain that if somebody were deploying oauth for their servers
>>>>> that unless the document told me that oauth doesn't provide protection
>>>>> against third party snooping if it's embedded in any app, most people 
>>>>> wouldn't
>>>>> have a clue that that was a dangerous assumption.
>>>>> 
>>>>> What this says is that oauth only works in one use case, and that only the
>>>>> user can tell the difference. Given the proliferation of phone apps and
>>>>> embedded webviews, it seems that the original assumptions of oauth are
>>>>> no longer up to date.
>>>>> 
>>>>> Mike
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
> 

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to