Thanks for the reply, Mike and Eran. I will go on with pure OAuth
implementation for now and if anything shows up will let you guys
know.

Thanks,
Monis Iqbal

On Jun 17, 10:57 pm, Mike Malone <mjmal...@gmail.com> wrote:
> Eran's right, there are ways around this, but I'm wondering what sort of
> mobile device you're working with that doesn't have the capacity to sign
> each request. It's really not that much overhead unless you're making
> hundreds or thousands of requests per second (which is unlikely on a mobile
> device). You may be overestimating the expense of generating a signature.
> I'd suggest giving signing a try before spending time coming up with a more
> "clever" solution ;). I'd definitely be interested in more details if you're
> really unable to sign requests due to resource constraints.
>
> Mike
>
> On Wed, Jun 17, 2009 at 5:15 AM, Eran Hammer-Lahav <e...@hueniverse.com>wrote:
>
>
>
> > One way is for the device to use a signing proxy on a server. Another is
> > for
> > you to use very short lived credentials and not require signatures - there
> > will still be a replay attack possible but the window of the attack will be
> > much smaller. Yahoo!'s BBAuth protocol works this way. But at this point
> > this will no longer be OAuth but some other protocol.
>
> > EHL
>
> > On 6/17/09 3:50 AM, "Monis" <monisiq...@gmail.com> wrote:
>
> > > Section 7 of OAuth Core directs us to 'sign' the requests even after
> > > we have received a granted access token.
> > > This signing ensures security with each request made to the SP.
>
> > > We have a case for implementing OAuth Consumers on mobile devices and
> > > the signing of each request to access protected resources could be
> > > costly, considering the sparse resources on the device.
>
> > > Can there be a way around this to not sign request every time and once
> > > we have an authorized access token, send it as is for future retrieval
> > > of protected resources?
> > > We understand that replay attacks are possible if we don't follow the
> > > unique nonce and timestamp constraints (Section 8) but we don't want
> > > the replay attacks either :)
>
> > > We also looked at OAuth Session extension, but again each request has
> > > to be signed in order to fetch protected content.
>
> > > Thanks,
> > > Monis Iqbal
>
>
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"OAuth" group.
To post to this group, send email to oauth@googlegroups.com
To unsubscribe from this group, send email to oauth+unsubscr...@googlegroups.com
For more options, visit this group at http://groups.google.com/group/oauth?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to