> -----Original Message-----
> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf
> Of Michael Thomas
> Sent: Wednesday, January 04, 2012 3:40 PM

> My concern is that putting on a veneer of "security" will lull people into
> thinking "Oh, it's safe to enter my credentials here because this is really
> twitterbook, not evilapp!". When I had to ask them directly to put their
> twitterbook credentials into my app, there at least wasn't any confusion that
> I had access to them.

This is ridiculous (e.g. the fact we are still discussing this).

First, end users know nothing about security or OAuth. Second, evil apps can 
create this veneer of security by faking a redirection flow with or without 
OAuth. Suggesting that OAuth (which is a de-facto web pattern for over a 
decade) makes anything worse is patently false.

The only thing we can possibly add to the threat model document is to mention 
that "OAuth does not provide any protection against malicious applications and 
that the end user is solely responsible for the trustworthiness of any native 
application installed". That is accurate (and completely obvious to the target 
audience of this document). It is not very helpful but if it will make you feel 
better (since no one else here seems to share your concerns), I have no 
objection to such one line added.

And again, to highlight the absurdity of your security claim, it is equally 
important to warn developers in earthquake-prone countries to put enough 
distance between the Approve and Deny buttons so that the user will not 
accidentally hit Approve during a tremor.

EHL



 

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to