IMO, we're getting very off topic here. The WebAuthn text is not part of
the draft being called for adoption.

On Thu, Sep 5, 2024 at 2:15 AM Neil Madden <neil.e.mad...@gmail.com> wrote:

> On 5 Sep 2024, at 05:45, David Waite <da...@alkaline-solutions.com> wrote:
> >
> > 
> >
> >> On Sep 4, 2024, at 4:27 PM, Neil Madden <neil.e.mad...@gmail.com>
> wrote:
> >>
> >>> On 4 Sep 2024, at 22:48, Watson Ladd <watsonbl...@gmail.com> wrote:
> >>>
> >>> I can always grab the cookie jar off the user browser if I have that
> >>> level of access.
> >>
> >> USB access is not privileged, but that’s beside the point.
> >
> >>
> >> Put another way, the phishing-resistance of WebAuthn only really makes
> sense in a world of sandboxed apps: web apps, mobile apps. Any spec that
> encourages the use of OAuth auth flows outside of such sandboxed
> environments, as this one potentially does, is going to make defending
> against phishing harder.
> >
> > The client is not an identified/authenticated component in the
> architecture, so there is a user trust required in using a client - that
> the client actually is an agent acting in the user’s interest rather than
> acting maliciously.
> >
> > Platforms have the ability to provide specific API for these
> interactions to become a trustworthy client, and to block privileged access
> (including access to speak directly to hardware) behind audited
> entitlements to prevent from installed software acting as a malicious
> client.
>
> Right, this is what I mean by sandboxed.
>
> >
> > Note that some platforms also provide entitlements and heuristics for
> password manager access - however, as a knowledge-based system the platform
> cannot really prevent malicious applications from still attempting to
> manipulate their way to credential phishing.
> >
> >>
> >> (I’d also question why first-party apps need a standardised API for
> this anyway: they can do whatever they like using proprietary APIs already).
> >
> > I would struggle to come up with standards-track RFCs which would not be
> able to instead be accomplished with proprietary APIs. The editors and
> working groups found value in peer review and in interoperability.
>
> Standards are for promoting interoperability, not for getting free peer
> review of private APIs.
>
> >
> > I have seen the pitfalls of a proprietary approach to this and would say
> peer review is important. My primary concern is whether we can have a
> clients that authenticate against multiple implementing ASes based solely
> on this work. Profiling authentication methods like passkey-based
> authentication would go a long way toward alleviating that concern.
> >
> > -DW
>
> _______________________________________________
> OAuth mailing list -- oauth@ietf.org
> To unsubscribe send an email to oauth-le...@ietf.org
>
_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to