security - OAuth and phishing vulnerabilities, are they inexorably tied together? -


I've been doing a fair job with OAuth lately, and I have to say that I really like it. I like the concept, and I like that it provides insertion of a low blocker to connect your users' external data to your site (or to provide a data API for external access to you) private As a matter of fact, I have always attached sites that ask me to login directly to another website from me. And the Oath "Wallet key for web" approach resolves this well.

The biggest problem I (and many others) with it though, standard oath work flow encourages the same type of behavior that phishing attacks use for their benefit, if you use your user It is common practice to be redirected to a site to provide login credentials, so it is easy for the phishing site to take advantage of general practice, but Means to redirect their clone site where they receive their username and password.

  • Are you asking users to login and login to the available site?

    Did you do anything to reduce this problem, or did it? Manually, without automatic link or redirection? (But then the barrier of entry increases)

  • Do you try to educate your users, and if so, when and how? Any long description of security that the user has to read, also increases entry barrier.

What else?

I believe that oh and phishing are at least in the current form of Oeth forbidden are connected. The system exists to stop phishing, the most likely HTTP (stop laughing ...), but obviously it does not work.

There is a very successful attack against the phishing system, for which a username / password congos are required, as long as people use a username and password for authentication phishing, there is always a problem Will be. Using asymmetric cryptography for a better system authentication All modern browsers have built in support for smart cards. You can not fish the card sitting in a wallet and will not leak the private key of the user's desktop. Asymmetric Keypair does not have to be on Smartcard, but I think it creates a strong system, if it is fully implemented in the software.


Comments

Popular posts from this blog

sql - dynamically varied number of conditions in the 'where' statement using LINQ -

asp.net mvc - Dynamically Generated Ajax.BeginForm -

Debug on symbian -