71°F

Aaron Parecki

  • Articles
  • Notes
  • Photos
  • ziwe https://twitter.com/ziwe
    there are two americas: one fights for black lives and the other fights for brunch
    Portland, Oregon • 56°F
    Sun, May 31, 2020 3:39pm +00:00 (liked on Sun, May 31, 2020 9:59am -07:00)
  • Vinod Anandan https://twitter.com/_VinodAnandan   •   May 31
    Yes, thank you. I agree that RP should be simple and IdP should be handling the complexity. AFAIU, the OIDC spec is clear about the email_verified attribute.
    Aaron Parecki
    The original post didn’t make this clear, so I’m writing a new post to hopefully better explain the problem. You’ll see that it has nothing to do with OIDC at all. Link coming shortly, I hope.
    Portland, Oregon • 55°F
    2 replies
    Sun, May 31, 2020 9:36am -07:00
  • Torsten Lodderstedt https://twitter.com/tlodderstedt
    Another remark: this issue wouldn’t have allowed account takeover at the RP if the RP would use iss+sub claim to identify the user account instead of relying on the email address (potentially even without scoping it within the particular IDP). Poor coding practice too.
    Portland, Oregon • 54°F
    Sun, May 31, 2020 2:44pm +00:00 (liked on Sun, May 31, 2020 7:57am -07:00)
  • Vinod Anandan https://twitter.com/_VinodAnandan   •   May 31
    My point is that OIDC has mechanisms to prevent this issue..
    Aaron Parecki
    Please go read it again and understand the problem
    Portland, Oregon • 54°F
    4 replies
    Sun, May 31, 2020 7:32am -07:00
  • Vinod Anandan https://twitter.com/_VinodAnandan   •   May 31
    "email_verified" : "True if the End-User's e-mail address has been verified; otherwise false....."

    https://openid.net/specs/openid-connect-core-1_0.html
    Aaron Parecki
    Go read the writeup again. The original post wasn't the clearest explanation of the problem but I also posted some more details in this thread that make it clearer.
    Portland, Oregon • 54°F
    6 replies
    Sun, May 31, 2020 7:28am -07:00
  • Vinod Anandan https://twitter.com/_VinodAnandan   •   May 31
    "The OpenID Foundation enables deployments of OpenID Connect and the Financial-grade API (FAPI) Read/Write Profile to be certified to specific conformance profiles to promote interoperability among implementations.... "

    https://openid.net/certification/
    Aaron Parecki
    And? certification wouldn't have caught this bug since it wasn't a problem with the OIDC part of the exchange.
    Portland, Oregon • 54°F
    Sun, May 31, 2020 7:22am -07:00
  • Barbara Schachner https://twitter.com/barschachner
    Fully agree to that 😀

    Just looking also at examples like https://insomniasec.com/blog/auth0-jwt-validation-bypass or https://threatpost.com/microsoft-oauth-flaw-azure-takeover/150737/.
    o/c they are different + very individual, but if already the big players have such issues, how much more can go wrong on RS side where devs are usually not Auth experts.
    Portland, Oregon • 54°F
    Sun, May 31, 2020 1:41pm +00:00 (liked on Sun, May 31, 2020 6:43am -07:00)
  • Barbara Schachner https://twitter.com/barschachner   •   May 31
    Fully agree to that 😀

    Just looking also at examples like https://insomniasec.com/blog/auth0-jwt-validation-bypass or https://threatpost.com/microsoft-oauth-flaw-azure-takeover/150737/.
    o/c they are different + very individual, but if already the big players have such issues, how much more can go wrong on RS side where devs are usually not Auth experts.
    Aaron Parecki
    Yes! And that is *exactly* why I always advocate for pushing the complexity to the authorization server and keeping the client side simple. Fewer options for clients means fewer ways to mess it up, and there will always be more client developers than AS developers.
    Portland, Oregon • 54°F
    2 likes
    Sun, May 31, 2020 6:43am -07:00
  • hedonometer https://twitter.com/hedonometer
    Yesterday was the saddest day in the history of @Twitter
    Portland, Oregon • 54°F
    Sat, May 30, 2020 4:51pm +00:00 (liked on Sun, May 31, 2020 6:35am -07:00)
  • Arif Yayalar 💛❤️🦁 https://twitter.com/ayayalar   •   May 30
    @aaronpk little disappointed that you sell pdf/ePub editions of OAuth 2.0 Simplified separately.
    Aaron Parecki
    Yeah it's mainly a technical limitation of the platform we used for publishing it. If you send me a receipt, I'll send you the other format!
    Portland, Oregon • 54°F
    Sun, May 31, 2020 6:05am -07:00
  • Dominick Baier https://twitter.com/leastprivilege
    The protocols are not the most complicated typically (not saying they are ‘easy’ either). But business requirements on top make things complicated.
    Portland, Oregon • 54°F
    Sun, May 31, 2020 1:00pm +00:00 (liked on Sun, May 31, 2020 6:00am -07:00)
  • Barbara Schachner https://twitter.com/barschachner   •   May 31
    I feel logical bugs around OAuth/OIDC/JWT handling are on the rise - and they are like the login form SQL injections of the past („be whoever you want to be“).
    Love those standards and their capabilities - but are they getting too complicated?
    Aaron Parecki
    Nah this is more a demonstration of why sticking to standards is a good idea, and why building an authorization server isn't a project that should be taken lightly.
    Portland, Oregon • 54°F
    1 like 12 replies
    Sun, May 31, 2020 5:59am -07:00
  • Aaron Parecki https://aaronparecki.com/   •   May 31
    It's the handler that responds to the "Continue" form post on this screen. Instead of a Boolean, the client sent back the actual email address and the server accepted arbitrary values.
    Aaron Parecki
    Now that I'm writing this out, I realize that the client also sends back the "name" here, intentionally, since the name is user-editable. So I can see how this happened. It's just extremely poor coding practice to essentially also allow the email to be editable here.
    Portland, Oregon • 54°F
    2 likes
    Sun, May 31, 2020 5:45am -07:00
  • Torsten Lodderstedt https://twitter.com/tlodderstedt   •   May 31
    But it’s exposed to the client and did accept arbitrary values, right?
    Aaron Parecki
    It's the handler that responds to the "Continue" form post on this screen. Instead of a Boolean, the client sent back the actual email address and the server accepted arbitrary values.
    Portland, Oregon • 54°F
    1 reply
    Sun, May 31, 2020 5:42am -07:00
  • Torsten Lodderstedt https://twitter.com/tlodderstedt   •   May 31
    But it’s exposed to the client and did accept arbitrary values, right?
    Aaron Parecki
    Yea, it's just not part of the OAuth API. It's more like bad logic on the internal implementation of the AS.
    Portland, Oregon • 54°F
    2 likes 17 replies
    Sun, May 31, 2020 5:39am -07:00
  • Torsten Lodderstedt https://twitter.com/tlodderstedt   •   May 31
    if I understand correctly, the token request accepted an alternative email claim value and used it to override the value on Apple’s IDP. Really?
    Aaron Parecki
    If I'm reading it right it's not the token endpoint, it's their internal API for accepting the request that let the user choose which email to share with the app. So it's a form validation problem.
    Portland, Oregon • 54°F
    22 replies
    Sun, May 31, 2020 5:36am -07:00
  • 11:57pm
    Asleep
    5:35am
    Awake
    5h 38m
    Slept
    13m
    Awake for
    Portland, Oregon, USA
    Sun, May 31, 2020 5:35am -07:00
  • Josh Long (龙之春, जोश, Джош Лонг, جوش لونق) https://twitter.com/starbuxman   •   May 31
    2020 has been a bumpy ride over here in America.

    * a global pandemic killing 100,000+ Americans? Check.
    * race-wars spilling into the streets? Check.

    And it's not even June.
    Aaron Parecki
    Don't worry, there's still time for the earthquake
    Portland, Oregon • 54°F
    Sat, May 30, 2020 11:51pm -07:00
  • Aaron Parecki
    All we need is the big earthquake to really round out 2020
    Portland, Oregon • 54°F
    22 likes 3 reposts 5 replies 1 mention
    Sat, May 30, 2020 11:30pm -07:00
  • Adam Avenir https://twitter.com/adamavenir   •   May 31
    Still *somehow* I’m hopeful that the 2030s will be better than we can ever imagine them right now. Lots of pain between now and then and lots more work to be done.
    Aaron Parecki
    Not even 6 months into the 2020s and we've already written off the entire decade 😂😭 is that the point we're at right now
    Portland, Oregon • 54°F
    1 like
    Sat, May 30, 2020 10:34pm -07:00
older

Hi, I'm Aaron Parecki, Director of Identity Standards at Okta, and co-founder of IndieWebCamp. I maintain oauth.net, write and consult about OAuth, and participate in the OAuth Working Group at the IETF. I also help people learn about video production and livestreaming. (detailed bio)

I've been tracking my location since 2008 and I wrote 100 songs in 100 days. I've spoken at conferences around the world about owning your data, OAuth, quantified self, and explained why R is a vowel. Read more.

  • Director of Identity Standards at Okta
  • IndieWebCamp Founder
  • OAuth WG Editor
  • OpenID Board Member

  • 🎥 YouTube Tutorials and Reviews
  • 🏠 We're building a triplex!
  • ⭐️ Life Stack
  • ⚙️ Home Automation
  • All
  • Articles
  • Bookmarks
  • Notes
  • Photos
  • Replies
  • Reviews
  • Trips
  • Videos
  • Contact
© 1999-2025 by Aaron Parecki. Powered by p3k. This site supports Webmention.
Except where otherwise noted, text content on this site is licensed under a Creative Commons Attribution 3.0 License.
IndieWebCamp Microformats Webmention W3C HTML5 Creative Commons
WeChat ID
aaronpk_tv