Scott is correct here.

As a policy, web sites should never allow sign in through an iframe,
as even the minority of users smart enough to verify the source URL is
twitter.com can't verify it.

Ivan
http://tipjoy.com

On Mar 20, 11:24 pm, Scott Carter <scarter28m-goo...@yahoo.com> wrote:
> I think Ivan's suggestion could answer the concern about the case
> where a user needs to enter a username/password:
> "If not signed in, a new window could load with the regular OAuth
> process. "
>
> For the case where the user is already logged in, there doesn't appear
> to be any risk here.  Consider the scenario where the IFRAME is
> populating a page from a site pretending to be Twitter with an Allow/
> Deny button.   By clicking "Allow", nothing bad can happen.  Twitter
> isn't Allowing anything in this case since it wasn't their page to
> begin with.
>
> FYI - I think my case is different than Ivan's since he is discussing
> a widget whereas my app lives entirely in the IFRAME.   The  callback
> from Twitter after authorization would simply cause the IFRAME to
> redirect back to a page on bigtweet.com where I could then present a
> different (logged in) view for the user.
>
> Joshua's suggestion would work, but providing IFRAME support with a
> callback URL would save the user two steps - needing to close the
> Authorization window, and clicking the Complete Connection button.
>
> Scott
>
> On Mar 20, 5:50 pm, Abraham Williams <4bra...@gmail.com> wrote:
>
> > If you have the approval process take place in the iframe there is no way to
> > for the user to actually verify they are interacting with twitter. if they
> > are not logged into twitter already you are then asking users to enter
> > username/password on a potentially unsafe site and opening up to fishing.
>
> > On Fri, Mar 20, 2009 at 16:29, Joshua Perry <j...@6bit.com> wrote:
>
> > > The interesting thing is, that you could omit the callback URL in your
> > > application registration with Twitter.  On your site when the user clicks
> > > the "connect twitter" button you would go and grab a request token and 
> > > pop a
> > > new window with that request token in the URI like usual.  The user would
> > > click accept and since there is not a callback URL Twitter will say "You 
> > > can
> > > close this window and complete the Connect process".  Waiting on your
> > > webpage would be the "complete connection" button which, when clicked, 
> > > would
> > > request Twitter to convert the request token into an access token.
>
> > > Instead of popping a window I don't know why you couldn't load the Twitter
> > > authorization page into an IFrame, but the message to "close this window"
> > > may be a bit confusing to the user.
>
> > > This flow is the same as a desktop application has to use to accomplish an
> > > OAuth connection and should work the similarly well with a web 
> > > application.
>
> > > Josh
>
> > > Ivan Kirigin wrote:
>
> > >> I'd love to be able to do this also, and have mentioned it off the
> > >> list.
>
> > >> Imagine a "Twitter Connect" button, which would be a tiny iframe
> > >> loaded from twitter.com. If signed in, the token exchange could take
> > >> place right there. If not signed in, a new window could load with the
> > >> regular OAuth process. The callback in the button would be to a tiny
> > >> iframe acting as a confirmation of the success, loaded by the
> > >> consumer.
>
> > >> There is a diminished phishing risk, because the widget isn't asking
> > >> for your password. Only the new window would.
>
> > >> The only question is how the rest of the widget gets the notification
> > >> that the OAuth access grant has taken place. My thought is that the
> > >> widget could just ping the web service to see if things are integrated
> > >> properly. Cross domain iframe communication is a HUGE pain in the ass.
> > >> You can get around it if the twitter iframe loaded a designated hidden
> > >> iframe from the 3rd party.
>
> > >> Alternatively, you could ask the user to refresh the widget /
> > >> bookmarklet.
>
> > >> Generally, I'd like to see some standard buttons from twitter, so
> > >> normalize the OAuth experience. You can see on the top of
> > >>http://tipjoy.com
> > >> a banner we made that uses twitter fonts and colors.
>
> > >> Best,
> > >> Ivan
> > >>http://tipjoy.com
>
> > >> ps check out our twitter payments api:http://tipjoy.com/api
> > >> feedback welcome!
>
> > >> On Mar 20, 3:00 pm, Scott Carter <scarter28m-goo...@yahoo.com> wrote:
>
> > >>> I'm starting to look at the OAuth process and had a question for the
> > >>> OAuth folks at Twitter.
>
> > >>> My application BigTweet is invoked via a bookmarklet and displays as
> > >>> an IFRAME on any web page that a Twitter user happens to be
> > >>> browsing.    Ideally I would like to be able to complete the entire
> > >>> OAuth process within the IFRAME (for initial login).
>
> > >>> I believe that Twitter recently added measures to prevent framing of
> > >>> their site to stop phishing attacks.   Does this extend to the OAuth
> > >>> approval page?   Could an exception be made for the OAuth page when
> > >>> invoked from a registered application presenting a valid Request
> > >>> Token?  If so, could this be documented (perhaps in the OAuth Twitter
> > >>> FAQ)?
>
> > >>> The authorization page at Twitter appears to have a fairly small
> > >>> content section (with Deny/Allow buttons, etc), which could fit into a
> > >>> reasonably sized IFRAME.  If you are agreeable to allow IFRAME
> > >>> support, would it be possible to standardize on content dimensions
> > >>> (for IFRAME sizing) and document this as well?
>
> > >>> Thanks for considering my request.
>
> > >>> Scotthttp://twitter.com/scott_carter
>
> > --
> > Abraham Williams |http://the.hackerconundrum.com
> > Web608 | Community Evangelist |http://web608.org
> > This email is: [ ] blogable [x] ask first [ ] private.
> > Se"nt from: Madison Wisconsin United States.

Reply via email to