On Thu, May 9, 2024 at 9:07 AM Tom Jones <thomasclinganjo...@gmail.com>
wrote:

> Has anyone considered what information the RP verifier should supply for
> FedCM to function well on the behalf of both the verifier and the user?
>

Can you expand on this a bit more? Selective disclosure came to mind to us
(e.g. an RP selectively asking for specific attributes), but maybe you have
something else in mind?


>
> thx ..Tom (mobile)
>
> On Thu, May 9, 2024, 8:06 AM Dick Hardt <dick.ha...@gmail.com> wrote:
>
>> The NASCAR problem is rooted in the RP does not know which provider(s)
>> the user has, so sites showed all the choices. FedCM only shows the
>> provider(s) the user has.
>>
>> On Thu, May 9, 2024 at 5:33 AM Warren Parad <wparad=
>> 40rhosys...@dmarc.ietf.org> wrote:
>>
>>> I think I'm still missing something, and I'm sure it was discussed
>>> somewhere and I just didn't see it. How will this help avoid the NASCAR
>>> problem, for sites when a user *signs up* or when the user *signs in on
>>> a new browser?*
>>>
>>> On Thu, May 9, 2024 at 1:07 AM Sam Goto <goto=
>>> 40google....@dmarc.ietf.org> wrote:
>>>
>>>>
>>>>
>>>> On Wed, May 8, 2024 at 3:50 PM Neil Madden <neil.e.mad...@gmail.com>
>>>> wrote:
>>>>
>>>>> On 8 May 2024, at 22:01, Joseph Heenan <jos...@authlete.com> wrote:
>>>>>
>>>>>
>>>>> On 8 May 2024, at 21:43, Sam Goto <g...@google.com> wrote:
>>>>>
>>>>>
>>>>>
>>>>> On Wed, May 8, 2024 at 1:34 PM Joseph Heenan <jos...@authlete.com>
>>>>> wrote:
>>>>>
>>>>>> Hi Neil
>>>>>>
>>>>>>
>>>>>> On 8 May 2024, at 18:45, Neil Madden <neil.e.mad...@gmail.com> wrote:
>>>>>>
>>>>>>
>>>>>> On 8 May 2024, at 17:52, Sam Goto <g...@google.com> wrote:
>>>>>>
>>>>>> On Wed, May 8, 2024 at 7:23 AM Neil Madden <neil.e.mad...@gmail.com>
>>>>>> wrote:
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>> In particular, the call to the accounts endpoint assumes that the
>>>>>>> IdP is willing to provide PII about the user to the browser. That seems
>>>>>>> questionable.
>>>>>>>
>>>>>>
>>>>>> Aside from a privacy/security threat model perspective (meaning, the
>>>>>> user agent already has visibility over every network request made 
>>>>>> available
>>>>>> to the content area)
>>>>>>
>>>>>>
>>>>>> Sure, but if I use the recommended auth code flow or encrypted ID
>>>>>> tokens, then PII is not exposed to the browser. And it’s not just the
>>>>>> browser itself in the current proposal, as the token is exposed to
>>>>>> javascript, of course, so the usual XSS risks.
>>>>>>
>>>>>>
>>>>>> Sam’s response here is fair, but also note that as far as I
>>>>>> understand it you can still use the authorization code flow or encrypted 
>>>>>> id
>>>>>> tokens with the FedCM API
>>>>>>
>>>>>
>>>>> That's correct: the browser doesn't open the response from the IdP to
>>>>> the RP, so it can, for example, be encrypted.
>>>>>
>>>>> I was assuming that Neil was referring to the fact that the
>>>>> id_assertion_endpoint (which contains the user's IdP's PII accounts
>>>>> <https://fedidcg.github.io/FedCM/#dictdef-identityprovideraccount>)
>>>>> become, suddenly, transparent to the browser.
>>>>>
>>>>>
>>>>> Oh yes, that’s true - but (I think) the data from the
>>>>> id_assertion_endpoint at least isn’t exposed to javascript and isn’t
>>>>> vulnerable to XSS?
>>>>>
>>>>>
>>>>> That depends on whether the IdP correctly enforces the presence of the
>>>>> sec-fetch-dest header. If it doesn’t then yes, it would be vulnerable.
>>>>> Presumably it’s also vulnerable on older/niche browsers that don’t block
>>>>> sec-* headers: caniuse.com reckons > 8% of users globally are using
>>>>> browsers that don’t understand any sec-fetch-* headers. I’m not sure when
>>>>> sec-* was added to the forbidden list.
>>>>>
>>>>> I guess, flipping this around, we might ask what is the legitimate
>>>>> purpose for which browsers need to access the user’s name, email address
>>>>> (both requires) and other identifying information? I’d have thought an
>>>>> identifier (possibly randomised) and some user-supplied account nickname
>>>>> would be sufficient.
>>>>>
>>>>
>>>> That's easier to answer: the browser needs name/email/picture to
>>>> construct an account chooser
>>>> <https://docs.google.com/presentation/d/1iURrPakaHgBfQ6mAefKijjxToiTTgBSPz1rtaV0od98/edit#slide=id.p>,
>>>> which is the UX that tested best with users by a far margin.
>>>>
>>>> Static/unpersonalized permission prompts - example
>>>> <https://www.cookiestatus.com/images/content/storage-access-api.jpg> in
>>>> Safari, example
>>>> <https://developers.google.com/static/privacy-sandbox/assets/images/storage-access-api-permission-prompt.png>
>>>> in Chrome - perform extremely poorly (in comparison to account choosers),
>>>> although have other benefits too (namely ergonomics and extensibility), so
>>>> Chrome (and others) expose that too in the form of the Storage Access
>>>> API
>>>> <https://developer.mozilla.org/en-US/docs/Web/API/Storage_Access_API>.
>>>>
>>>>
>>>>>
>>>>> — Neil
>>>>>
>>>>> _______________________________________________
>>>> OAuth mailing list -- oauth@ietf.org
>>>> To unsubscribe send an email to oauth-le...@ietf.org
>>>>
>>> _______________________________________________
>>> OAuth mailing list -- oauth@ietf.org
>>> To unsubscribe send an email to oauth-le...@ietf.org
>>>
>> _______________________________________________
>> OAuth mailing list -- oauth@ietf.org
>> To unsubscribe send an email to oauth-le...@ietf.org
>>
>
_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to