What do you think such a warning would accomplish? There are no ways to 
mitigate malware (bad client or otherwise), and using passwords make it even 
easier. 

End users are not going to read the specification and service providers have 
absolutely no alternatives.

As for the example, the issue you described with accepting every CA is 
completely irrelavent because changing the root certificates will be done in 
secrecy by the installed malware. 

I have not seen any argument showing how such a warming makes any difference in 
deploying OAuth (or not).

Can you propose text and show how it mau affect implementation?

EHL


On Sep 6, 2011, at 17:50, "Melinda Shore" <melinda.sh...@gmail.com> wrote:

> On 09/06/2011 04:23 PM, Peter Saint-Andre wrote:
>> I just looked at the most recent specifications for TLS (RFC 5246) and
>> secure shell (RFC 4253), which I think we'd all agree are two quite
>> successful security technologies. Neither of those specs says anything
>> about not protecting humans users from malicious clients that perform
>> keylogging to capture security-critical data the user might enter.
> 
> I think there's an argument to be made that the user interface
> is sufficiently different that those might not be a great model.
> But it's also the case that there have been security problems
> with both that may or may not have been avoided in part by
> putting in warnings not to trust every crappy, random CA
> certificate that wafts by, or not to respond "Sure - thanks!"
> to every ssh host key you're offered.
> 
> Melinda
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to