Re: [OAUTH-WG] Text for Native Applications

2011-06-16 Thread Torsten Lodderstedt
Behalf Of Torsten Lodderstedt Sent: Thursday, June 02, 2011 5:00 AM To: Skylar Woodward Cc: oauth@ietf.org Subject: Re: [OAUTH-WG] Text for Native Applications Dave, Skylar, the assumption of the OAuth 2.0 security threat model (http://tools.ietf.org/html/draft-lodderstedt-oauth-security- 01#section-4.1

Re: [OAUTH-WG] Text for Native Applications

2011-06-03 Thread William J. Mills
+1 From: Torsten Lodderstedt To: Skylar Woodward ; Dave Nelson Cc: "oauth@ietf.org" Sent: Friday, June 3, 2011 1:58 AM Subject: Re: [OAUTH-WG] Text for Native Applications +1 Skylar Woodward schrieb: This may be true for a "secret&qu

Re: [OAUTH-WG] Text for Native Applications

2011-06-03 Thread Torsten Lodderstedt
+1 Skylar Woodward schrieb: This may be true for a "secret" of sorts in some applications, but not for the client_credential in OAuth. The client secret is the only element that can secure the identity of the app and if it is compromised then so is the ability of the app to assert its ident

Re: [OAUTH-WG] Text for Native Applications

2011-06-03 Thread Skylar Woodward
This may be true for a "secret" of sorts in some applications, but not for the client_credential in OAuth. The client secret is the only element that can secure the identity of the app and if it is compromised then so is the ability of the app to assert its identity. There's no way a software pr

Re: [OAUTH-WG] Text for Native Applications

2011-06-02 Thread Dave Nelson
On Thu, Jun 2, 2011 at 5:40 PM, Brian Eaton wrote: > Well, "rely" is a strong-term.  I know of various teams who do this.  I > don't know of any teams that put a heavy reliance on it. It might validly be just one element of a defense-in-depth strategy. Regards, Dave David B. Nelson Sr. Softwa

Re: [OAUTH-WG] Text for Native Applications

2011-06-02 Thread Brian Eaton
On Thu, Jun 2, 2011 at 2:31 PM, William J. Mills wrote: > In practice there are an extremely small number of cases where this is > actually done right, and legions of cases where it's done wrong. Industry > just doesn't get this right often enough to rely on it. > Well, "rely" is a strong-term.

Re: [OAUTH-WG] Text for Native Applications

2011-06-02 Thread William J. Mills
June 1, 2011 1:07 PM Subject: Re: [OAUTH-WG] Text for Native Applications On Jun 1, 2011, at 9:43 PM, Dave Nelson wrote: > for mounting the attack.  I firmly believe that secrets can be > sufficiently obfuscated in code delivered in binary format without the > benefit of a symbol table, so as

Re: [OAUTH-WG] Text for Native Applications

2011-06-02 Thread William J. Mills
From: Dave Nelson To: Skylar Woodward Cc: "oauth@ietf.org" Sent: Wednesday, June 1, 2011 12:43 PM Subject: Re: [OAUTH-WG] Text for Native Applications > The group is operating under the assumption that most > native apps are publicly deployed or that copies of the > app bund

Re: [OAUTH-WG] Text for Native Applications

2011-06-02 Thread Brian Eaton
On Thu, Jun 2, 2011 at 12:17 PM, Thomas Hardjono wrote: > (a) Oauth2.0 today is designed for low-assurance environments. So I think > the WG is wasting a lot of time in trying to address whether the Client can > keep secrets. The WG should just assume that the problem of keeping secrets > is out

Re: [OAUTH-WG] Text for Native Applications

2011-06-02 Thread Igor Faynberg
Thomas Hardjono wrote: (a) Oauth2.0 today is designed for low-assurance environments. I don't think that was an objective. At least, the charter does not say that... So I think the WG is wasting a lot of time in trying to address whether the Client can keep secrets. The WG should just assum

Re: [OAUTH-WG] Text for Native Applications

2011-06-02 Thread Thomas Hardjono
; Of Torsten Lodderstedt > Sent: Thursday, June 02, 2011 5:00 AM > To: Skylar Woodward > Cc: oauth@ietf.org > Subject: Re: [OAUTH-WG] Text for Native Applications > > Dave, Skylar, > > the assumption of the OAuth 2.0 security threat model > (http://tools.ietf.org/html

Re: [OAUTH-WG] Text for Native Applications

2011-06-02 Thread Torsten Lodderstedt
Dave, Skylar, the assumption of the OAuth 2.0 security threat model (http://tools.ietf.org/html/draft-lodderstedt-oauth-security-01#section-4.1) is that client secrets, which are distributed with applications, cannot reliably kept confidential. Therefore the advice is given to use other means

Re: [OAUTH-WG] Text for Native Applications

2011-06-02 Thread Torsten Lodderstedt
I agree with Skylar. In the end, the most important point is how much the authorization server trusts the particular client and what privileges are associated with that client identity. In an open development model, I would not trust the client in the least and instead require the user to autho

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread Skylar Woodward
Sure, but at the same time, imagine the context of a hackathon event where people certainly make use of OAuth APIs and put very low priority on security. It's bound to happen (and in fact, quick experimental apps like these often consume the bulk of registered client IDs - as opposed to sustaine

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread Chuck Mortimore
We don't at all this recommend this type of deployment model for Heroku ( or any platform for that manner ). We support injecting environment variables at runtime to avoid this problem. Example: $ heroku config:add S3_KEY=8N029N81 S3_SECRET=9s83109d3+583493190 Adding config vars: S3_KEY

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread Skylar Woodward
On Jun 1, 2011, at 9:43 PM, Dave Nelson wrote: > for mounting the attack. I firmly believe that secrets can be > sufficiently obfuscated in code delivered in binary format without the > benefit of a symbol table, so as to be sufficiently resistant to > discovery via disassembly by attackers you'd

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread Dave Nelson
> The group is operating under the assumption that most > native apps are publicly deployed or that copies of the > app bundle/binary can at least be obtained by a malicious > party. Agreed. > ... its always possible for the attacker to disassemble the > program and obtain the secret. Always pos

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread Skylar Woodward
The group is operating under the assumption that most native apps are publicly deployed or that copies of the app bundle/binary can at least be obtained by a malicious party. Whether and open system or a high protected system like Playstation 3 its always possible for the attacker to disassemble

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread Skylar Woodward
On Jun 1, 2011, at 6:54 PM, Brian Eaton wrote: >> (Some web apps might not be able to keep secrets based on open development >> or deployment model). > > Can you clarify what you mean by this? Simple really, I just mean for some developers it might be more important to have an open development

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread Dave Nelson
> Most native apps will be forgeable ... I don't understand the rationale behind this assertion. Would you please point me to the discussion that elaborates on this point. Thanks! Regards, Dave David B. Nelson Sr. Software Architect Elbrys Networks, Inc. www.elbrys.com +1.603.570.2636

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread Brian Eaton
On Wed, Jun 1, 2011 at 1:41 AM, Skylar Woodward wrote: > Verifyable and Forgeable were the best terms we've come up with so far in > attempt to put a label on "apps that can keep secrets" and "apps that can't > keep secrets," respectively. You might be on to something there. There are two ways

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread Brian Eaton
On Wed, Jun 1, 2011 at 9:11 AM, William J. Mills wrote: >> - native apps always use the authorization code grant > > I don't like this if it means I can't use passwrd grant for stuff like IMAP > clients. Sorry, didn't mean to suggest that password grants would go away. The business need is clear

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread William J. Mills
011 1:18 AM Subject: Re: [OAUTH-WG] Text for Native Applications On Wed, Jun 1, 2011 at 12:47 AM, Torsten Lodderstedt wrote: >> - ignore the problem and leave the spec vague and insecure. > > Could you please describe what you consider "insecure"? As an example, optional cl

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread William J. Mills
May 31, 2011 11:45 PM Subject: Re: [OAUTH-WG] Text for Native Applications I would suspect that many users are overwhelmed when authorizing many fine grained scopes and don't fully understand the risks.  Many popular sites ask for offline access straight away upon connecting to Facebook (Fo

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread Skylar Woodward
On Jun 1, 2011, at 10:18 AM, Brian Eaton wrote: > And it would meet the requirement of having a clear path forward for > people who don't want to trust native apps to keep secrets really > secret. I just want to re-iterate my point from a few months ago that it necessarily helpful to draw the li

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread Doug Tangren
> I hate to say it, but I think this whole thing would be a lot simpler > if we had a grant type called "native app". +1. stop muddying the waters ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread Brian Eaton
On Wed, Jun 1, 2011 at 12:47 AM, Torsten Lodderstedt wrote: >> - ignore the problem and leave the spec vague and insecure. > > Could you please describe what you consider "insecure"? As an example, optional client authentication in the authorization code flow makes the web server flow much less s

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread Brian Eaton
OK, so you've got some native apps using the web server flow, and some using a modified version of the implicit grant that includes a refresh token. I hate to say it, but I think this whole thing would be a lot simpler if we had a grant type called "native app". Instead everyone is adding unspeci

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread Torsten Lodderstedt
Am 01.06.2011 08:56, schrieb Brian Eaton: On Tue, May 31, 2011 at 11:41 PM, Chuck Mortimore wrote: It’s not entirely necessary; I’m just having a tough time figuring out any practical difference between the implicit grant flow, and the webserver flow with no credentials. In general I agree

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread Chuck Mortimore
On 6/1/11 12:20 AM, "Brian Eaton" wrote: On Wed, Jun 1, 2011 at 12:15 AM, Torsten Lodderstedt wrote: > I'm getting confused. This thread is about native apps. So why discuss > security considerations for web apps here? They overlap because they both use refresh tokens. =/ When people propos

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread Chuck Mortimore
We have have need for all three types For web apps, we use web server flow with credentials, and can escalate some capabilities for the client since we can be more assured we're talking to the actual client. For native apps, we support: 1. the implicit grant ( but we wont give out a refresh

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread Brian Eaton
On Wed, Jun 1, 2011 at 12:15 AM, Torsten Lodderstedt wrote: > I'm getting confused. This thread is about native apps. So why discuss > security considerations for web apps here? They overlap because they both use refresh tokens. =/ When people propose changes that impact refresh tokens, it impac

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread Brian Eaton
On Wed, Jun 1, 2011 at 12:08 AM, Chuck Mortimore wrote: > This is one reason we’ve favored implicit for native apps. OK, so are you using the implicit grant for both web apps and native apps...? I'm trying to figure out if you need two flows are three. - web server flow used with real secret

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread Torsten Lodderstedt
I'm getting confused. This thread is about native apps. So why discuss security considerations for web apps here? regards, Torsten. Am 01.06.2011 09:00, schrieb Brian Eaton: On Tue, May 31, 2011 at 11:47 PM, Kris Selden wrote: If a provider chooses to do that though, in the attack you descri

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread Chuck Mortimore
On 5/31/11 11:56 PM, "Brian Eaton" wrote: On Tue, May 31, 2011 at 11:41 PM, Chuck Mortimore wrote: > It's not entirely necessary; I'm just having a tough time figuring out any > practical difference between the implicit grant flow, and the webserver flow > with no credentials. In general I agr

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread Brian Eaton
On Tue, May 31, 2011 at 11:47 PM, Kris Selden wrote: > If a provider chooses to do that though, in the attack you described, they > could still revoke the refresh token to stop the abuse when it is discovered, > and that is still easier in my opinion than rotating a client secret but yes, > all

Re: [OAUTH-WG] Text for Native Applications

2011-05-31 Thread Brian Eaton
On Tue, May 31, 2011 at 11:41 PM, Chuck Mortimore wrote: > It’s not entirely necessary; I’m just having a tough time figuring out any > practical difference between the implicit grant flow, and the webserver flow > with no credentials.   In general I agree with your points, but I think we > have a

Re: [OAUTH-WG] Text for Native Applications

2011-05-31 Thread Kris Selden
Yes, it is important to remember that when you make allowances for one flow you affect other flows, I understand that. I understand that if in the implicit flow you return a refresh token, you then allow other flows to use authorization server endpoint to refresh the token without a client secr

Re: [OAUTH-WG] Text for Native Applications

2011-05-31 Thread Kris Selden
I would suspect that many users are overwhelmed when authorizing many fine grained scopes and don't fully understand the risks. Many popular sites ask for offline access straight away upon connecting to Facebook (Foursquare, Quora, Instagram, etc). This offline access token, has a higher chanc

Re: [OAUTH-WG] Text for Native Applications

2011-05-31 Thread Doug Tangren
-Doug Tangren http://lessis.me For example, a iOS app that is shipped through iTunes certainly has access > to reasonably secure storage via KeyChain for secrets issued to the > application at runtime, such as the referesh_token, but it can’t do a good > job of protecting the client_secret, since

Re: [OAUTH-WG] Text for Native Applications

2011-05-31 Thread Chuck Mortimore
It's not entirely necessary; I'm just having a tough time figuring out any practical difference between the implicit grant flow, and the webserver flow with no credentials. In general I agree with your points, but I think we have a similar, perhaps worse, scenario with relaxing the need for cr

Re: [OAUTH-WG] Text for Native Applications

2011-05-31 Thread Doug Tangren
-Doug Tangren http://lessis.me On Wed, Jun 1, 2011 at 1:39 AM, Kris Selden wrote: > Why can't you just revoke the refresh token for a client when you change > the client secret? > > This makes sense for a server implementation for added precaution but in practice, most clients dont change clien

Re: [OAUTH-WG] Text for Native Applications

2011-05-31 Thread Chuck Mortimore
The distinction is that the client_secret tends to be a global secret, and there is little ability to protect this type of secret in many common means of application distribution. For example, a iOS app that is shipped through iTunes certainly has access to reasonably secure storage via KeyChai

Re: [OAUTH-WG] Text for Native Applications

2011-05-31 Thread Brian Eaton
On Tue, May 31, 2011 at 10:39 PM, Kris Selden wrote: > Why can't you just revoke the refresh token for a client when you change the > client secret? > > Is it not easier to revoke a token than it is to rotate the client secret > (which is usually configured or embedded in the client whereas the

Re: [OAUTH-WG] Text for Native Applications

2011-05-31 Thread Kris Selden
Why can't you just revoke the refresh token for a client when you change the client secret? Is it not easier to revoke a token than it is to rotate the client secret (which is usually configured or embedded in the client whereas the token is issued)? On May 31, 2011, at 5:37 PM, Brian Eaton wr

Re: [OAUTH-WG] Text for Native Applications

2011-05-31 Thread Doug Tangren
> > > > Consider what happens when a client web server is compromised and the > client secret and refresh tokens are stolen. > - the attacker can use the tokens until the compromise is discovered. > - the client secret is then changed > - the stolen refresh tokens then become useless > > Now, *if*

Re: [OAUTH-WG] Text for Native Applications

2011-05-31 Thread Brian Eaton
On Tue, May 31, 2011 at 10:41 AM, Chuck Mortimore wrote: > Updated in language I just sent out – thanks. > > On that note, we currently return refresh_token using the implicit grant > type under certain controlled circumstances.   Facebook in turn uses the > implicit grant type, and simply issues

Re: [OAUTH-WG] Text for Native Applications

2011-05-31 Thread Dave Nelson
This issue has likely been discussed "long ago", but I'd like to potentially re-open the discussion. >    o  Native applications that use the authorization code grant type flow > SHOULD do so without client password credentials, due to their inability to > keep those credentials confidential. I u

Re: [OAUTH-WG] Text for Native Applications

2011-05-31 Thread Torsten Lodderstedt
Am 31.05.2011 20:00, schrieb Doug Tangren: -Doug Tangren http://lessis.me On Tue, May 31, 2011 at 1:41 PM, Chuck Mortimore mailto:cmortim...@salesforce.com>> wrote: Updated in language I just sent out – thanks. On that note, we currently return refresh_token using the implicit

Re: [OAUTH-WG] Text for Native Applications

2011-05-31 Thread Torsten Lodderstedt
the security considerations section does recommend to not automatically process repeated authorizations without validating the client's identity The authorization server SHOULD NOT automatically, without active end-user interaction, process repeated authorization requests without authentic

Re: [OAUTH-WG] Text for Native Applications

2011-05-31 Thread Torsten Lodderstedt
Date: Tue, 24 May 2011 17:30:05 To: oauth@ietf.org@ietf.org> Subject: [OAUTH-WG] Text for Native Applications ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth _

Re: [OAUTH-WG] Text for Native Applications

2011-05-31 Thread Brian Campbell
On Tue, May 31, 2011 at 12:00 PM, Doug Tangren wrote: > > I think there is still a usability issue with the implicit flow in general > where there is no way in the spec to obtain an access token without > re-asking the user for authorization a second time even if the user has > already authorized

Re: [OAUTH-WG] Text for Native Applications

2011-05-31 Thread Doug Tangren
-Doug Tangren http://lessis.me On Tue, May 31, 2011 at 1:41 PM, Chuck Mortimore wrote: > Updated in language I just sent out – thanks. > > On that note, we currently return refresh_token using the implicit grant > type under certain controlled circumstances. Facebook in turn uses the > implic

Re: [OAUTH-WG] Text for Native Applications

2011-05-31 Thread Chuck Mortimore
his in the comparision with the implicit grant type. regards, Torsten. Gesendet mit BlackBerry® Webmail von Telekom Deutschland -Original Message- From: Chuck Mortimore Sender: oauth-boun...@ietf.org Date: Tue, 24 May 2011 17:30:05 To: oauth@ietf.org Subject: [OAUTH-WG] Text for Native Ap

Re: [OAUTH-WG] Text for Native Applications

2011-05-24 Thread torsten
Sender: oauth-boun...@ietf.org Date: Tue, 24 May 2011 17:30:05 To: oauth@ietf.org Subject: [OAUTH-WG] Text for Native Applications ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

[OAUTH-WG] Text for Native Applications

2011-05-24 Thread Chuck Mortimore
One of my items from yesterday was to update the text related to native applications. Primary goals were to: 1. remove the explicit preference for authorization_code grant type 2. provide a brief overview on means of initiating authorization requests and receiving callbacks 3. discuss t