I posted to my blog about a significant implementation flaw made by people 
using Facebook's   OAuth 2 implementation.

I understand that Facebook is fixing it in there own code, but many clients are 
exploitable.

For those interested.
http://www.thread-safe.com/2012/04/followup-on-oauth-facebook-login.html

The flaw is not in the spec but in implementations. 

John B.

On 2012-04-17, at 4:45 PM, Stephen Farrell wrote:

> 
> Hi all,
> 
> A recent news article [1] was brought to my attention this week
> that's about a paper [2] which I've just read. While it mostly
> deals with implementation and integration flaws, I'm wondering
> if there's anything in there that could benefit any of the
> oauth drafts. Anyone had a look at that already?
> 
> Be interesting if any similar analysis has been done on any
> oauth 1.0 or 2.0 sites or implementations.
> 
> Ta,
> S.
> 
> [1] http://www.itbusiness.ca/it/client/en/CDN/News.asp?id=66741
> [2] https://research.microsoft.com/pubs/160659/websso-final.pdf
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to