A Truckload of OAuth Issues That Would Make Any Author Quit 86
New submitter DeFender1031 writes "Several months ago, when Eran Hammer ragequit the OAuth project, many people thought he was simply being overly dramatic, given that he gave only vague indications of what went wrong. Since then, and despite that, many companies have been switching to OAuth, citing it as a 'superior form of secure authentication.' But a fresh and objective look at the protocol highlights the significant design flaws in the system and sheds some light on what might have led to its creator's departure."
Re: (Score:1, Funny)
Can a hosts file block apk's posts, though?
Re: (Score:1)
127.0.0.0 slashdot.org
Re: (Score:2)
brain asplode! (Score:2, Offtopic)
Get out the duct tape (Score:2)
*sigh* "conflict between the web and the enterprise worlds." is another way of saying users complained when not given an option to aim at their foot.
Re: (Score:2, Interesting)
Computers run on standards, there is no excuse for this.
Re: (Score:1)
What are you talking about? The original submitter? Eran Hammer? The blog being linked to?
I honestly don't know what you're referring to -- could you explain for those of us who are out of the loop?
Re: (Score:2)
I think it's a complaint about (and I hesitate to link to it) this post [slashdot.org] which keeps showing up story after story.
Last Post (Score:5, Funny)
Re: (Score:1)
That's it, I've had enough. It's easy enough to filter this kind of crap out, but /. just don't seem to bother. Yes, I could simply browse at a higher level, but I've usually got mod points and browse at -1 as suggested for very good reasons. But if /. aren't prepared to deal with the most basic levels of spamming then I can't be bothered helping them out any more. Email address deleted, password changed to a long random string that I don't know, sig changed to indicate account has been deleted. Bye everyone, most of the last decade or so has been fun, but frankly, I quit.
Good to know. Weed out the thin-skinned people, I always say. People who don't actually understand how tricky a problem spam filtering really is, people who can't deal with the internet in general, people who feel the need to get on a soapbox and announce the significantly massive amounts of them not being around anymore everyone else is about to experience (ooo, how impressive and scary!). Sorry, who were you again and why do we care? I missed that part.
Re: (Score:1)
although personally I don't like the posting limits on low karma people. I think this encourages slashdot group-think, where if you speak up against whatever ideas
Re: (Score:1)
Re: (Score:3)
His name is apk & he's been posting it for over 4 years. Here's one from 2009:
http://tech.slashdot.org/comments.pl?sid=1206409&cid=27661983 [slashdot.org]
He keeps adding new stuff on so it keeps growing longer and longer as the years pass.
A bit like a Hosts file then? I hate trolls but I do admire that level of dedication.
Genius (Score:1, Offtopic)
Step one: Make digital card game.
Step two: Print cards and sell them.
Step three: Profit more from WOW.
Re:Genius (Score:5, Funny)
Re: (Score:2)
So I did :)
totally secure == powered off (Score:1)
OAuth is ugly to implement, no argument there.
Most of the points made in the article were interesting and seemed valid to me but near the conclusion it felt like the author was reaching bit by ignoring the refresh token concept to make the final point.
The threat of a hacked browser was a bit of an eye opener for me -- never heard that one brought up as a possibility while working on an OAuth implementation for a client.
Re: (Score:1)
Re: (Score:3)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Again, you miss the point. The point isn't separate accounts. The point is, you have a user account, say "JoeCool", and a password, say "12345". Your system allows Joe, when logged in under that password, to create a secondary password, 67890 which, when logged in with, only allows limited access. Joe can then give "67890" as a password a third-party application, which will then have only limited access. If the application misbehaves, Joe can remove the "67890" password, thus locking out the malicious appli
Re: (Score:2)
A separate password for each application, is exactly what an OAuth refresh token is. The user is free to revoke the corresponding grant at any time.
Re: (Score:1)
Re: (Score:2)
If you have hacked the browser or machine you have an issue. For the browser there are a slew of API's dependent on OS that let there be separation so that a browser exploit is limited to allowing authentication while that browser remains open but never exposes the base digital certificates. Smart cards take that further by never exposing the private key to anybody.
As to AUPI vs API oauth was never meant to be a end all and be all of authentication. Designing something to let arbitrary systems share data
WTF was that? (Score:3)
I think someone is just bitter and decided to take it out on a protocol.
Re:WTF was that? (Score:4, Interesting)
I think the key point of the article is the first part, the "APUI" section. OAuth is "fine" when used for authentication by a user for a service based on a web browser. However, it is increasingly being applied at the "API" level (where services and applications interact, not users). It doesn't work _at all_ at this level.
I agree that the enterprise level permissions bit is pushing things, but the rest of the article is spot on.
Re: (Score:1)
wrong api works fine. I use it with google apis. once user grants auth, you can call their apis without any user interaction when their not even logged in. it all depends upon the permissions they grant you.
Re: (Score:2)
Actually two-legged OAuth is pretty straightforward and works just fine for me
Re: (Score:3, Insightful)
Because people are, with great gusto, actually using it for what it was never designed to do.
Auth belongs in the browser (Score:5, Insightful)
Re: (Score:3)
I don't know if he is a shill, but can you tell me what you don't like about BrowserID, that could be a lot more interresting discussion.
Re: (Score:2)
Re: (Score:2)
I think this is their reasoning:
1. one of the reasons OpenID failed is because people did not associate website/webpage with identity, BrowserID uses an email address, which is already very directly associated with an identity by many people
2. email addresses are already used on many, many websites, because of password recovery. Even with Facebook Connect/oAuth people will take the email address from the identity provider and record it (yes, it is already provided in most situations !).
3. with current free
Re: (Score:2)
Anyway, you could also take a look at the recent presentation from Mozilla:
http://pyvideo.org/video/1764/beyond-passwords-secure-authentication-with-mozi-0 [pyvideo.org]
Re: (Score:1)
Re: (Score:2)
So it's a metastandard? Standards compliance really should imply inter-operability. If two implementations of a standard can both be certified as compliant and yet cannot communicate, the standard needs to be tightened or clarified. If that is not desired or if inter-operation isn't a goal, then it may be something, but it is not a standard and should not call itself one.
Blogspot? Really? (Score:1)
This is a bad article (Score:2)
The author makes no distinction between OAuth 1.0a and OAuth 2.0. One of the spec leads did rage quit, not because of how bad OAuth is in general but because of all the "enterprise" help in version 2.0. Saying there is no standard is also dumb, yes version 2.0 can suffer from incompatible implementations but version 1.0 is pretty straight forward, the standard is right here: http://tools.ietf.org/html/rfc5849 [ietf.org]. The suggestion that we should just stick to HTTP Basic Authentication over SSL/TLS shows that the
Re: (Score:2)
Agreed.
Can anybody explain what's wrong with just using Oauth 1?
Native apps == insecure (Score:2)
Re: (Score:1)
Not complex; not broken; not meant for enterprise (Score:2)
IMHO, the only legitimate points in this gentleman's post are: (1) a compromised browser defeats OAuth, and (2) OAuth isn't mobile-friendly because it requires browser interaction to gain user consent to grant access.
While both of these are true, Web browsers are ubiquitous; OAuth is a Web standard. You can abuse it slightly to make it work with mobile devices (see "access code grant") but really, it not was intended to be a be-all end-all authorization mechanism.
Likewise, claims that the protocol isn't "en
Re: (Score:1)
Re: (Score:2)
Frankly, anyone who thinks the OAuth draft RFC is complex, should choose a dozen or so documents from the SAML protocol suite, relax in a hot bath, and read through several hundred pages of THAT claptrap.
Indeed the spec is huge, but it works extremely well. I must confess still do not understand why OAuth exists since we have SAML