[oauth] Re: Body Hash Extension

2009-11-04 Thread Mike Malone
I'd like to see an extension for body signing. It's pretty trivial to do, but having it standardized somewhere so that libraries can be written to handle it would be nice. Alternatively, you could just use HTTPS. Mike On Wed, Nov 4, 2009 at 1:56 PM, Brian Eaton wrote: > > On Wed, Nov 4, 2009 a

[oauth] Re: Support for 1.0 and 1.0a in parallel

2009-08-20 Thread Mike Malone
If the client provides the oauth_callback parameter when it asks for a request token then it's using the new flow. The oauth_callback parameter is required in 1.0a exactly for this reason. If the client doesn't want to provide a callback, or if the callback is provided some other way, the oauth_ca

[oauth] Re: Timing Attacks against OAuth implementations

2009-08-14 Thread Mike Malone
> I think the only affected implementation is the plain text signature, > which I really never thought should have been part of the standard in > the first place. Does anyone actually use that? Please explain. How does this effect plaintext any differently than the other signature methods? Mike

[oauth] Re: Timing Attacks against OAuth implementations

2009-08-14 Thread Mike Malone
>>> Seth, I actually think that enforcing nonces should make this attack >>> impossible for guessing OAuth signatures (assuming you enforce nonces >>> for malformed requests). If you can only get a good/bad response once >>> then you're out of luck. >> >> I was thinking that the attacker would be

[oauth] Re: Timing Attacks against OAuth implementations

2009-08-14 Thread Mike Malone
I'm no security expert, but I'm gunna go ahead and say that (IMO) this attack is at best a theoretical attack for the vast majority of OAuth installs. > Blaine or Kellan threw out a question about this vulnerability in an > OAuth context that I haven't had the time (nor do I have the > qualificat

[oauth] Re: Accessing protected resources with pre-signed header

2009-06-17 Thread Mike Malone
Eran's right, there are ways around this, but I'm wondering what sort of mobile device you're working with that doesn't have the capacity to sign each request. It's really not that much overhead unless you're making hundreds or thousands of requests per second (which is unlikely on a mobile device)

[oauth] Re: OAuth for RSS

2009-06-05 Thread Mike Malone
It'd be a huge win if Google Reader would support this. It would probably be enough to convince most other readers that they need to support it too. Google people, I know you're reading this. Do it! :) Mike On Thu, Jun 4, 2009 at 11:15 PM, John Panzer wrote: > On Thu, Jun 4, 2009 at 10:31 PM, C

[oauth] Re: Version Preference

2009-05-01 Thread Mike Malone
FWIW, if we're still tallying votes, I vote for option 1. On Fri, May 1, 2009 at 2:34 PM, Eran Hammer-Lahav wrote: > > That was not what I did. I was just explaining how this process works and I > clearly stated the need (and the full historical record) of getting to > decisions by consensus. Thi

[oauth] Re: An OAuth attack on Consumer implementations

2009-04-30 Thread Mike Malone
On Thu, Apr 30, 2009 at 2:14 PM, Owen Evans wrote: > Ok but can I just confirm that the only way to do late binding is to have > some parameter in the callback that identifies which Request Token was > authorised/denied? Just want to make my understanding clear as there's > nothing in the spec th

[oauth] Re: An OAuth attack on Consumer implementations

2009-04-30 Thread Mike Malone
esn't receive > the call-back and relies on the user to tell the application that the step > is complete there's no way of the application knowing which request token > was authorised and must have a link between the user and request token prior > to sending the user to the

[oauth] Re: An OAuth attack on Consumer implementations

2009-04-30 Thread Mike Malone
On Thu, Apr 30, 2009 at 11:59 AM, Josh Roesslein wrote: > Here is some pseudo python code of what I have in mind for a more higher > level library: http://pastie.org/464241 > > This is not a final design, there are other details I have left out, but it > demonstrates the flow for the consumer of a

[oauth] Re: An OAuth attack on Consumer implementations

2009-04-30 Thread Mike Malone
> I hadn't thought of late binding as the path of least resistance, so > perhaps I'm making a bigger deal of this than I need to, although it > occurs to me that some developers will be tempted to store the request > token in the current session, which is really easy in most > environments, and doe

[oauth] Re: OAuth Core 1.0 Rev A, Draft 1

2009-04-30 Thread Mike Malone
On Thu, Apr 30, 2009 at 10:57 AM, Blaine Cook wrote: > > On Thu, Apr 30, 2009 at 6:54 PM, Mike Malone wrote: > > > > This would break the web flow for 1.0 (non Rev. A) consumers. > > I think that's the desired behaviour, though? So long as service > providers co

[oauth] Re: OAuth Core 1.0 Rev A, Draft 1

2009-04-30 Thread Mike Malone
> From Eran's summary of the proposal there are three ways to close the loop: > > (1) Verifier + Callback > (2) Verifier + Manual entry > (3) No verifier + manual 'continue' > > The options for the SP would be: > > oauth_callback in 1st step: > > - Present with value - do (1) > - Present with empty

[oauth] Re: An OAuth attack on Consumer implementations

2009-04-30 Thread Mike Malone
On Thu, Apr 30, 2009 at 10:12 AM, Jesse Myers wrote: > > I can't say that I agree. What do you disagree with? Eran said early binding would be addressed in the security considerations section. The fact of the matter is that a lot of developers are going to > encounter OAuth for the first time

[oauth] Re: OAuth Core 1.0 Rev A, Draft 1

2009-04-30 Thread Mike Malone
> So I guess the proposal is: > > oauth_callback in 1st step: > > - Present with value - include verifier in callback and require to exchange > tokens > - Present with empty value - display verifier to user and require to > exchange tokens > - Not included in request - no verifier requirement if al

[oauth] Re: OAuth Security Advisory

2009-04-24 Thread Mike Malone
> > Personally, I don't think a callback nonce is going to do much at all > to stop people from carrying out this attack. I've already said this > twice in this thread, and I'll say it again: > Still not sure we're on the same page with the callback nonce suggestion. Let me explain again (I'm goin

[oauth] Re: OAuth Security Advisory

2009-04-24 Thread Mike Malone
On Thu, Apr 23, 2009 at 11:43 PM, Manish Pandit wrote: > > > > On Apr 23, 11:04 pm, Josh Fraser wrote: > > Leah, > > > > > * > > > 2. No callback request parameter > > > * > > > > What if we make the callback optional? Consumers can either: > > > > a) leave it out altogether in which case the r

[oauth] Re: OAuth Security Advisory

2009-04-23 Thread Mike Malone
On Thu, Apr 23, 2009 at 3:00 PM, Zachary Voase wrote: > > 2) The following sentence is a monster: we need to ensure that the > user who initiated the consumer's request for the request token is the > same as the one who's authorizing it on the provider. This is a much > harder problem to solve, be

[oauth] Re: OAuth Security Advisory

2009-04-23 Thread Mike Malone
On Thu, Apr 23, 2009 at 12:03 PM, Brian Eaton wrote: > > On Thu, Apr 23, 2009 at 11:54 AM, Mike Malone wrote: > > In the manual case the user is already typing the request token key > > manually. > > The manual case is not a good user experience, and it isn't nece

[oauth] Re: OAuth Security Advisory

2009-04-23 Thread Mike Malone
On Thu, Apr 23, 2009 at 11:52 AM, Brian Eaton wrote: > > On Thu, Apr 23, 2009 at 11:46 AM, Mike Malone wrote: > > The other difference is that it seems you're not issuing a callback token > > for the manual case, where there's no callback URL. I think you need a &

[oauth] Re: OAuth Security Advisory

2009-04-23 Thread Mike Malone
ges to the oauth_callback will be caught by the > signature. The final step of checking the callback_token prevents other > man-in-the-middle style attacks after the user has been returned to the > consumer app. Does this sound like what you're suggesting? > > Thanks; > – Ma

[oauth] Re: OAuth Security Advisory

2009-04-23 Thread Mike Malone
How bout this... Instead of the provider signing the callback URL, the consumer signs the redirect to the SP using its consumer and request tokens. This will prevent an attacker from changing the callback URL, but still allow the consumer to specify any redirect URL it wants (provided the SP accep

[oauth] Re: Handling nonce and timestamp

2009-04-15 Thread Mike Malone
Depending on your use case that may work, but in practice I think loosening up the constraint requiring timestamps to be monotonically increasing makes sense. Sometimes it is convenient to generate URIs for later use, and other requests may be executed between the time such URIs are created and the

[oauth] Re: authorized access by url alone?

2009-04-15 Thread Mike Malone
;> >> Great -- just what I was hoping to hear. I didn't want to start >> implementing if there was a known deal-breaker that I was not seeing. >> The caveats you mention, while important, are not deal breakers give >> what we need. >> >> --peter >&

[oauth] Re: authorized access by url alone?

2009-04-14 Thread Mike Malone
Yea, that would work, some caveats apply though. First, it sounds like you may not need all of OAuth, but if you want to take advantage of the existing libraries and whatnot the extra OAuth features probably won't cause any problems. As you said, you'll want to generate signed OAuth URIs for the

[oauth] Re: Is 4-legged OAuth possible?

2009-03-27 Thread Mike Malone
this topic at > http://www.hueniverse.com/hueniverse/2009/03/more-thoughts-on-oauth-access-sharing.html > > > > > > > > *From:* oauth@googlegroups.com [mailto:oa...@googlegroups.com] *On Behalf > Of *Mike Malone > *Sent:* Friday, March 27, 2009 12:57 AM > *To:* oauth@google

[oauth] Re: Is 4-legged OAuth possible?

2009-03-27 Thread Mike Malone
Good post, Eran, but if you removed the token/consumer matching requirement entirely, and encouraged sharing token credentials, wouldn't we essentially be in the same boat we're currently in with usernames and passwords? (Ok, that may be a bit of an exaggeration, but we'd still be giving up a lot o

[oauth] Re: Is 4-legged OAuth possible?

2009-03-26 Thread Mike Malone
You can kind of delegate individual requests with OAuth, depending on what the use case is, by generating a signed URI and handing it off to a fourth party to use. In the TweetDeck/TwitPic case, TweetDeck could generate a signed URI for POSTing the desired tweet, then pass the URI off to TwitPic t