Re: [OAUTH-WG] to TLS or not on redirect on consumer websites :: security considerations

2011-04-02 Thread Dick Hardt
On 2011-04-02, at 11:13 AM, Francisco Corella wrote: > > > Another example I mentioned earlier is when the client does > > not expose the protected resources back to the bearer of the > > code. For example, a Twitter application sending you emails > > when someone stops following you. Since all i

Re: [OAUTH-WG] moving to Security Area

2011-04-02 Thread Dick Hardt
I also am confused by change like this when we are at WGLC. I was under the impression that once the WG finished last call, the IETF security mafia experts would be reviewing the spec -- so it is unclear what advantage this has for getting the spec finished. On 2011-04-02, at 12:58 PM, David Re

Re: [OAUTH-WG] moving to Security Area

2011-04-02 Thread David Recordon
I can't say I understand this change when we're so close to being finished. On Fri, Apr 1, 2011 at 12:25 AM, Peter Saint-Andre wrote: > As discussed in the WG session at Prague just now, in discussion with > the Security Area Directors I have decided to move the OAuth Working > Group from the App

Re: [OAUTH-WG] Authorization code security issue (reframed)

2011-04-02 Thread Skylar Woodward
On Apr 2, 2011, at 3:19 PM, Phillip Hunt wrote: > If we take the current implementers as evidence it shows we have little or no > security either due to misunderstandings or business decisions to accept risk > for flexibility. > This type of language is also not helpful for moving us forward.

Re: [OAUTH-WG] Authorization code security issue (reframed)

2011-04-02 Thread Eran Hammer-Lahav
I don’t think a SHOULD leads to more than 2-3 lines clearly warning against a MITM attack on the authorization code or the returned script (implicit grant). The attack is simple and the warning is equally simple. Different components of the protocol have different security issues and complexity

Re: [OAUTH-WG] Authorization code security issue (reframed)

2011-04-02 Thread Phillip Hunt
For the record, I can except SHOULD. But my very strong feeling is this leads to much more lengthy and complicated language. I believe we have already crossed the line where it is no longer easy for deployers to figure out if deployments are secure. It is now a spec challenging to even subject

Re: [OAUTH-WG] to TLS or not on redirect on consumer websites :: security considerations

2011-04-02 Thread Eran Hammer-Lahav
> -Original Message- > From: Francisco Corella [mailto:fcore...@pomcor.com] > Sent: Saturday, April 02, 2011 11:14 AM > To: Dick Hardt; Skylar Woodward; Phillip Hunt; Eran Hammer-Lahav > Cc: OAuth WG; Karen P. Lewison > Subject: RE: to TLS or not on redirect on consumer websites :: securi

Re: [OAUTH-WG] Authorization code security issue (reframed)

2011-04-02 Thread Eran Hammer-Lahav
I don't think your statement that 'the IETF should endorse lack of security' is accurate or helpful. I completely rejects the notion that a SHOULD with strong language explaining the risk is any less "secure" than a MUST. The only impact of using a MUST vs. a SHOULD is that companies deploying

Re: [OAUTH-WG] Authorization code security issue (reframed)

2011-04-02 Thread David Recordon
If this is changed to a MUST, Facebook will be in violation of the specification moving forward. It is untenable to require all of our *client* developers to implement TLS endpoints though we certainly support developers who wish to do so. This is very different than offerring our entire API (and n

Re: [OAUTH-WG] to TLS or not on redirect on consumer websites :: security considerations

2011-04-02 Thread Francisco Corella
> Another example I mentioned earlier is when the client does > not expose the protected resources back to the bearer of the > code. For example, a Twitter application sending you emails > when someone stops following you. Since all it does is get > the code and then uses it internally (no user log

Re: [OAUTH-WG] Authorization code security issue (reframed)

2011-04-02 Thread Francisco Corella
Eran, > Google, Facebook, and Yahoo! already indicated they will not enforce > such a MUST. I could not get a clear answer from Twitter. > > However, no one representing this companies has bothered to express > this view on the list, and to express how they would like the > specification to handl

Re: [OAUTH-WG] to TLS or not on redirect on consumer websites :: security considerations

2011-04-02 Thread Eran Hammer-Lahav
Another example I mentioned earlier is when the client does not expose the protected resources back to the bearer of the code. For example, a Twitter application sending you emails when someone stops following you. Since all it does is get the code and then uses it internally (no user login func

Re: [OAUTH-WG] Authorization code security issue (reframed)

2011-04-02 Thread Eran Hammer-Lahav
Google, Facebook, and Yahoo! already indicated they will not enforce such a MUST. I could not get a clear answer from Twitter. However, no one representing this companies has bothered to express this view on the list, and to express how they would like the specification to handle this case. Thi

[OAUTH-WG] to TLS or not on redirect on consumer websites :: security considerations

2011-04-02 Thread Dick Hardt
As has been pointed out in the discussions, if a website does not employe TLS on connections on other connections, having TLS on the redirect does not add security. Depending on the resource grant being given, the nature of the website, not running TLS may be an acceptable security tradeoff. N

Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt

2011-04-02 Thread Francisco Corella
Skylar, > I'm going to summarize (hopefully faithfully) the attacks > referenced here, with the hope of attempting to sum up the > scope of attacks being documented. Thank you for reading and summarizing the attacks. > On Apr 1, 2011, at 1:29 PM, Francisco Corella wrote: > > > Skylar, > > > > >