Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011

2012-01-05 Thread George Fletcher
The problem is that even if the Authorization Server only gives out credentials to "trusted clients", those clients can be "hacked" and the credentials compromised allowing for impersonation of the "trusted client". Obviously, protecting the credentials is easier if the client is a web server w

Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011

2012-01-05 Thread Michael Thomas
On 01/05/2012 08:37 AM, William Mills wrote: It relies on the marketplace to do this. The current model is that apps are not validated first, they are pulled if found to be hostile. You're making a recommendation here about how an app marketplace should behave to be trustworthy, and I think

Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011

2012-01-05 Thread William Mills
It relies on the marketplace to do this.  The current model is that apps are not validated first, they are pulled if found to be hostile.   You're making a recommendation here about how an app marketplace should behave to be trustworthy, and I think that's beyond the scope of users and client de

Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011

2012-01-05 Thread William Mills
There's going to be a whole class of apps tat will be in violation of "Client applications SHOULD avoid directly asking users for the their credentials.".  We know that already, because the password grant exists and we have real use cases for it.  I think we should strikes that sentence and mov

Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011

2012-01-05 Thread Michael Thomas
On 01/05/2012 07:54 AM, Justin Richer wrote: However, the contention about native apps that Mike brings up is misleading for one key reason: if the user's browser is compromised (which is the attack vector in question), then all OAuth-backed webapps will *also* be compromised, since the bad p

Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011

2012-01-05 Thread Justin Richer
I'm OK with the threat document including a line this this, or Eran's proposed text, in the introduction to what OAuth can and can't do. It's important to set scope appropriately. (and I am very sorry for that pun) However, the contention about native apps that Mike brings up is misleading for

Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011

2012-01-05 Thread Michael Thomas
The wording you propose is unacceptable. It is a rehash of the same misleading nonsense that is in there now. In particular #1 and #3 that say in effect "bad guys really should be good" are silly and unhelpful. #2 has possibilities, but in its current form gives absolutely no guidance as to what m

Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011

2012-01-05 Thread Mark Mcgloin
Why do you think this William? Apple does it? Google android market had to pull 30 apps recently because they contained malware. There are automated tools that will do some sanity checks on apps and it is only advice, i.e. 'could' Mark > William Mills > > " o Client applications could be val

Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011

2012-01-05 Thread Mark Mcgloin
Having read the suggested wording from Eran, William and Michael, I think Eran's description is the most succinct and relevant: "OAuth does not provide any protection against malicious applications and that the end user is solely responsible for the trustworthiness of any native application install