- From: John Panzer <jpanzer@google.com>
- Date: Wed, 23 Sep 2009 04:21:05 +0000
- To: Mark Nottingham <mnot@mnot.net>
- Cc: Eran Hammer-Lahav <eran@hueniverse.com>, "oauth@ietf.org" <oauth@ietf.org>, "ietf-http-wg@w3.org Group" <ietf-http-wg@w3.org>
- Message-ID: <cb5f7a380909222119j3d8d40c2j8c1741eafd985aed@mail.gmail.com>
On Tue, Sep 22, 2009 at 9:03 PM, Mark Nottingham <mnot@mnot.net> wrote: > That works -- provided OAuth is completely proof against replay attacks. > > However, are new headers really necessary? Reading in various places about > this issue, it seems like a common workaround is to use mod_rewrite to > expose the authorization header in the environment; e.g., > > RewriteEngine on > RewriteRule .* - [E=HTTP_AUTHORIZATION:%{HTTP:Authorization},L] > > Isn't that enough to get the 80% case of those who have trouble with > getting direct access? Specifying two different headers to be used on the > wire will lead people to always use the more conservative one (X-whatever, > blech) and thereby lead us directly back into the situation Eran's concerned > about (intermediaries not realising that this is protected content). The > workaround for that will be having the header duplicated, with both names > (double blech). > Yes, if there is a way to just use the HTTP spec that would be vastly preferable. (You could send the X- headers only after an initial 401 failure, but that cure may be worse than the disease.) Cheers, > > > > On 23/09/2009, at 1:46 AM, John Panzer wrote: > > Inline... > > On Tuesday, September 22, 2009, Mark Nottingham <mnot@mnot.net> wrote: > > > On 22/09/2009, at 7:56 AM, John Panzer wrote: > > > On the server side, one of the concerns in the past has been security in > shared hosting systems where e.g., basic auth data should be handled by a > secure container (Apache) and not passed on in raw form to hosted CGI > scripts. So some of this comes back to what minimum level of hosting should > be targeted by the specification -- and how much it should bend over > backwards to deal with "challenged" environments. > > > That's a good discussion to have. > > > My $.02 is that we should follow the HTTP spec (Authorization: and > WWW-Authenticate:) and take a minimum distance path to route around limited > environments if necessary (X-Authorization: and X-WWW-Authenticate:, with > exactly the same content, would be my proposal). > > > Ugh. By allowing other resources on the same server to see authentication > credentials, wouldn't that just re-open these attacks? > > > > 1. Oauth, at least when accessing protected resources, is designed to > be used over insecure connections, so the password sniffing attacks > don't apply. > > 2. The alternative on the table is to pass these as URL params, which > are more sniffable and also makes the web cry. > > > > -- > John Panzer / Google > jpanzer@google.com / abstractioneer.org / @jpanzer > > > > On Mon, Sep 21, 2009 at 2:15 PM, Eran Hammer-Lahav <eran@hueniverse.com> > wrote: > As currently written, OAuth use of the HTTP authentication headers is > optional at best. > > The reason for that was based on concerns that some platforms do not > provide access to the HTTP header in either the request or the reply. > However, this might have significant ramifications on caching and other > parts of HTTP where an indication of an authenticate interaction is needed. > > Before the OAuth WG spends any time on discussing the various methods of > sending authentication parameters, I would like to find out if using the > authentication headers is more of a requirement for such a protocol. > > EHL > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth > > > > > -- > Mark Nottingham http://www.mnot.net/ > > > > -- > -- > John Panzer / Google > jpanzer@google.com / abstractioneer.org / @jpanzer > > > > -- > Mark Nottingham http://www.mnot.net/ > >
Received on Wednesday, 23 September 2009 09:23:35 UTC