56°F

Aaron Parecki

  • Articles
  • Notes
  • Photos
  • Eve Maler https://twitter.com/xmlgrrl
    #IIW today is obv going to start with a bang. @justin__richer
    Mountain View, California • 49°F
    Thu, May 2, 2019 4:06pm +00:00 (liked on Thu, May 2, 2019 10:14am -07:00) #IIW
  • alianora https://cybre.space/@nightpool   •   May 2

    @aaronpk but the browser is also the one executing the code that's verifying whether the browser transferred the data correctly? maybe a concrete attack would help me get my head around this better

    Aaron Parecki
    Think of it from the PoV of the thing sending the access token. It wants to make sure the AT ends up in the client and isn't stolen along the way. It can't trust the browser's address bar because the browser isn't the thing it's sending the token to, the code in the browser is.
    Mountain View, California • 49°F
    Thu, May 2, 2019 10:13am -07:00
  • alianora https://cybre.space/@nightpool   •   May 2

    @aaronpk but the browser is also the one executing the code that's verifying whether the browser transferred the data correctly? maybe a concrete attack would help me get my head around this better

    Aaron Parecki
    Here's one: The access token is sent in the address bar, so it becomes part of the browser history. This will be written to disk, and possibly even synced to the browser's "cloud" and then even synced down to other devices.
    Mountain View, California • 49°F
    1 reply
    Thu, May 2, 2019 10:07am -07:00
  • Taxi
    3.70mi
    Distance
    102:40
    Duration
    7:40am
    Start
    9:22am
    End
    Mountain View, California • 49°F
    Thu, May 2, 2019 9:22am -07:00
  • Chris https://twitter.com/gonji96
    PKCE is on my list to implement when no one is watching
    Mountain View, California • 49°F
    Thu, May 2, 2019 3:54pm +00:00 (liked on Thu, May 2, 2019 9:04am -07:00)
  • alianora https://cybre.space/@nightpool   •   May 2

    @aaronpk sorry I guess I should have specified "with https". doesn't https' security model encompass this one?

    Aaron Parecki
    Nope because the browser is still an unknown there, at least from the point of view of the sender of the sensitive data.
    Mountain View, California • 49°F
    1 reply
    Thu, May 2, 2019 9:03am -07:00
  • alianora https://cybre.space/@nightpool   •   May 2

    @aaronpk This is a good post! But I'm having trouble trying to understand the attack that the authorization flow is protecting against. How can a token be stolen "in transit back to the application"?

    Aaron Parecki
    Think of it this way: The server is trying to send some sensitive data to the application, but has no direct communication channel, and instead has to trust some other piece of software (the browser) to deliver it.
    Mountain View, California • 49°F
    1 reply
    Thu, May 2, 2019 8:40am -07:00
  • alianora https://cybre.space/@nightpool   •   May 2

    @aaronpk This is a good post! But I'm having trouble trying to understand the attack that the authorization flow is protecting against. How can a token be stolen "in transit back to the application"?

    Aaron Parecki
    An easy example to see is captive wifi portals where the network intercepts DNS requests and returns a different answer.
    Mountain View, California • 49°F
    Thu, May 2, 2019 8:33am -07:00
  • alianora https://cybre.space/@nightpool   •   May 2

    @aaronpk This is a good post! But I'm having trouble trying to understand the attack that the authorization flow is protecting against. How can a token be stolen "in transit back to the application"?

    Aaron Parecki
    That's the classic problem with the front-channel (sending data over HTTP redirects in a browser). The sender has no way to know if the receiver got the data, and has no way to tell if it was stolen or copied.
    Mountain View, California • 49°F
    Thu, May 2, 2019 8:31am -07:00
  • Aaron Parecki
    Browser APIs have gotten so much better lately! Way easier to do @oauth_2 PKCE in a browser now:

    ✅ good random number generators
    ✅ secure hashing functions

    Just missing a good base64 encoding function. (Check out the ugly hack in the post.)

    https://developer.okta.com/blog/2019/05/01/is-the-oauth-implicit-flow-dead#begin-the-pkce-request
    Mountain View, California, USA • 49°F
    5 likes 1 repost 5 replies
    Thu, May 2, 2019 8:25am -07:00 #oauth #javascript #pkce
  • Aaron Parecki
    at Computer History Museum
    Mountain View, California • Thu, May 2, 2019 7:54am
    37.414456 -122.0775
    Mountain View, CA, United States
    1 Coin
    Thu, May 2, 2019 7:54am -07:00
  • Aaron Parecki
    Contributions from: Germany, India, Switzerland, United States
    Thu, May 2, 2019 7:40am -07:00
  • Aaron Parecki
    at Hotel Vue
    Mountain View, California • Thu, May 2, 2019 7:29am
    37.381403 -122.074277
    Mountain View, CA, United States • 49°F
    10 Coins
    Thu, May 2, 2019 7:29am -07:00
  • Aaron Parecki
    Contributions from: Germany, India, United Kingdom, United States
    Thu, May 2, 2019 7:26am -07:00
  • Aaron Parecki
    Contributions from: Germany, India, United States
    Thu, May 2, 2019 7:09am -07:00
  • 10:25pm
    Asleep
    6:28am
    Awake
    8h 03m
    Slept
    23m
    Awake for
    Mountain View, California, USA
    Thu, May 2, 2019 6:28am -07:00
  • Aaron Parecki
    current status: wrapped up the web standards meeting for the day, and now watching the recording of yesterday's Planning and Sustainability Commission meeting in Portland, a different kind of standards meeting.

    what? I don't have too many projects *you* have too many projects
    Mountain View, California, USA • 49°F
    12 likes 1 repost 1 reply
    Wed, May 1, 2019 9:17pm -07:00 #pdx #portland
  • Troy Howard https://twitter.com/thoward37
    Now that the conference is over, I can finally relax and watch the talks from the comfort of my living room sofa.

    #ml4all #conference #machinelearning #appletv
    Mountain View, California • 49°F
    www.instagram.com/ml4allconf
    Wed, May 1, 2019 5:07pm -07:00 (liked on Wed, May 1, 2019 8:45pm -07:00) #ml4all #conference #machinelearning #appletv
  • Aaron Parecki
    at Hotel Vue
    Mountain View, California • Wed, May 1, 2019 8:42pm
    37.381403 -122.074277
    Mountain View, CA, United States • 49°F
    34 Coins
    Wed, May 1, 2019 8:42pm -07:00
  • Taxi
    3.11mi
    Distance
    6:41
    Duration
    8:30pm
    Start
    8:36pm
    End
    Mountain View, California • 49°F
    Wed, May 1, 2019 8:36pm -07:00
older

Hi, I'm Aaron Parecki, Director of Identity Standards at Okta, and co-founder of IndieWebCamp. I maintain oauth.net, write and consult about OAuth, and participate in the OAuth Working Group at the IETF. I also help people learn about video production and livestreaming. (detailed bio)

I've been tracking my location since 2008 and I wrote 100 songs in 100 days. I've spoken at conferences around the world about owning your data, OAuth, quantified self, and explained why R is a vowel. Read more.

  • Director of Identity Standards at Okta
  • IndieWebCamp Founder
  • OAuth WG Editor
  • OpenID Board Member

  • 🎥 YouTube Tutorials and Reviews
  • 🏠 We're building a triplex!
  • ⭐️ Life Stack
  • ⚙️ Home Automation
  • All
  • Articles
  • Bookmarks
  • Notes
  • Photos
  • Replies
  • Reviews
  • Trips
  • Videos
  • Contact
© 1999-2026 by Aaron Parecki. Powered by p3k. This site supports Webmention.
Except where otherwise noted, text content on this site is licensed under a Creative Commons Attribution 3.0 License.
IndieWebCamp Microformats Webmention W3C HTML5 Creative Commons
WeChat ID
aaronpk_tv