There were two others in my first note on this thread, one on UI
redress, another on automated repeat approvals.

On Mon, May 11, 2009 at 11:45 AM, Eran Hammer-Lahav <e...@hueniverse.com> wrote:
>
> Cool. Are there any other new security consideration sections we need to add, 
> or is this the only one?
>
> EHL
>
>> -----Original Message-----
>> From: oauth@googlegroups.com [mailto:oa...@googlegroups.com] On Behalf
>> Of Brian Eaton
>> Sent: Friday, May 08, 2009 3:39 PM
>> To: oauth@googlegroups.com
>> Subject: [oauth] Re: Request for new Security Considerations text
>>
>>
>> I like it.
>>
>> On Fri, May 8, 2009 at 3:35 PM, Darren Bounds <dar...@cliqset.com>
>> wrote:
>> >
>> > I'm good with that. So we're left with:
>> >
>> > Cross-Site Request Forgery (CSRF) Attacks
>> >
>> > Cross-Site Request Forgery (CSRF) is a web-based attack whereby HTTP
>> > requests are transmitted from a user that the website trusts or has
>> > authenticated.
>> >
>> > CSRF attacks on OAuth approvals can allow an attacker to obtain
>> > authorization to OAuth protected resources without the consent of the
>> > resource owner.  Service Providers should strongly consider best
>> > practices in CSRF prevention at all OAuth endpoints.
>> >
>> > CSRF attacks on OAuth callback URLs hosted by Consumers are also
>> > possible. Consumers should prevent CSRF attacks on OAuth callback
>> URLs
>> > by verifying that the user at the consumer site intended to complete
>> > the OAuth negotiation with the service provider.
>> >
>> >
>> > Darren
>> > On Fri, May 8, 2009 at 6:28 PM, Brian Eaton <bea...@google.com>
>> wrote:
>> >>
>> >> On Fri, May 8, 2009 at 3:16 PM, Darren Bounds <dar...@cliqset.com>
>> wrote:
>> >>> While that's nice to have, I do not believe it's necessary to foil
>> the
>> >>> attack. Acting purely on the identity of the user completes the
>> OAuth
>> >>> dance is enough and can still be considered a secure consumer
>> >>> implementation.
>> >>
>> >> Not unless there is a user consent page presented before the
>> consumer
>> >> completes the linkage.  You need some kind of user consent at the
>> >> consumer side to verify that the user really intended to link the SP
>> >> account to the consumer account.
>> >>
>> >> This is not totally out of the realms of normal CSRF protection, but
>> >> it is a bit subtle.  How about this:
>> >>
>> >> "CSRF attacks on OAuth callback URLs hosted by Consumers are also
>> >> possible.  Consumers should prevent CSRF attacks on OAuth callback
>> >> URLs by verifying that the user at the consumer site intended to
>> >> complete the OAuth negotiation with the service provider."
>> >>
>> >> User intent can be divined in one of two ways:
>> >> 1) "mixed binding", where you make sure the user who started the
>> >> process and the user who finished it are the same.
>> >> 2) "late binding", where the consumer asks the user whether they
>> want
>> >> to link their account.
>> >>
>> >> There are real-world examples of late binding being very useful as a
>> >> UI optimization:
>> >> http://code.google.com/apis/gadgets/docs/oauth.html#skip_popup
>> >>
>> >> Cheers,
>> >> Brian
>> >>
>> >> >
>> >>
>> >
>> >
>> >
>> > --
>> > darren bounds
>> > dar...@cliqset.com
>> >
>> > >
>> >
>>
>>
>
> >
>

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"OAuth" group.
To post to this group, send email to oauth@googlegroups.com
To unsubscribe from this group, send email to oauth+unsubscr...@googlegroups.com
For more options, visit this group at http://groups.google.com/group/oauth?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to