61°F

Aaron Parecki

  • Articles
  • Notes
  • Photos
  • Hans Zandbelt https://twitter.com/hanszandbelt
    So at first Apple shortcutted OIDC protocol steps in SIWA which rendered them insecure, after fixing that they went on to add extras on top of OIDC which now renders them insecure again. It should be clear to everyone now: don't roll your own. #openid #siwa
    Portland, Oregon • 60°F
    Sun, May 31, 2020 6:43pm +00:00 (liked on Sun, May 31, 2020 12:47pm -07:00) #openid #siwa
  • Jerry Gamblin https://twitter.com/JGamblin   •   May 31
    Ok... what would you call it then?
    Aaron Parecki
    lack of form validation
    Portland, Oregon • 58°F
    1 like
    Sun, May 31, 2020 11:12am -07:00
  • Jerry Gamblin https://twitter.com/JGamblin   •   May 31
    Yep, I realized that after I posted and made a clarifying post in the thread, which you should have saw?
    Aaron Parecki
    I should have replied to that one. It’s barely a logic bug using JWT. I’m writing up more details in a blog post, will post a link shortly.
    Portland, Oregon • 58°F
    2 replies
    Sun, May 31, 2020 11:11am -07:00
  • Jerry Gamblin https://twitter.com/JGamblin   •   May 30
    Interesting JWT vulnerability. https://bhavukjain.com/blog/2020/05/30/zeroday-signin-with-apple/
    Aaron Parecki
    This has almost nothing to do with JWTs, or even OpenID Connect for that matter.
    Portland, Oregon • 58°F
    2 likes 4 replies
    Sun, May 31, 2020 11:06am -07:00
  • Dieter Bohn https://twitter.com/backlon
    When writing headlines, use the active voice and clearly identify subjects. https://www.theverge.com/2020/5/31/21276044/police-violence-protest-george-floyd
    Portland, Oregon • 57°F
    Sun, May 31, 2020 5:06pm +00:00 (liked on Sun, May 31, 2020 10:53am -07:00)
  • Tony Jordan 😹👀 https://twitter.com/twjpdx23
    This is a great illustration of how much space cars waste!

    They say that up to 230 cars will be able to fit in the stadium to watch the movie. 230 cars in the whole damn stadium.

    If this is the future, I don’t wanna be in it. https://www.miamiherald.com/miami-com/things-to-do/article243003896.html
    Portland, Oregon • 57°F
    Sun, May 31, 2020 5:27pm +00:00 (liked on Sun, May 31, 2020 10:30am -07:00)
  • Kate Efimova 💫 https://twitter.com/kefimochi
    Being sick of politics AND having an environment where you can stop thinking about current state of the world is called PREVILEGE.

    YOU HEARD IT!
    Portland, Oregon • 56°F
    Sun, May 31, 2020 3:28pm +00:00 (liked on Sun, May 31, 2020 10:08am -07:00)
  • BLACKLIVESFUCKINGMATTER https://twitter.com/alexsimoneex
    i feel sorry the kids who are gonna study 2020 in history 😭, this chapter is HEFTY.
    1 like
    Thu, May 28, 2020 2:11pm +00:00 (reposted on Sun, May 31, 2020 10:00am -07:00)
  • ziwe https://twitter.com/ziwe
    there are two americas: one fights for black lives and the other fights for brunch
    Portland, Oregon • 56°F
    Sun, May 31, 2020 3:39pm +00:00 (liked on Sun, May 31, 2020 9:59am -07:00)
  • Vinod Anandan https://twitter.com/_VinodAnandan   •   May 31
    Yes, thank you. I agree that RP should be simple and IdP should be handling the complexity. AFAIU, the OIDC spec is clear about the email_verified attribute.
    Aaron Parecki
    The original post didn’t make this clear, so I’m writing a new post to hopefully better explain the problem. You’ll see that it has nothing to do with OIDC at all. Link coming shortly, I hope.
    Portland, Oregon • 55°F
    2 replies
    Sun, May 31, 2020 9:36am -07:00
  • Torsten Lodderstedt https://twitter.com/tlodderstedt
    Another remark: this issue wouldn’t have allowed account takeover at the RP if the RP would use iss+sub claim to identify the user account instead of relying on the email address (potentially even without scoping it within the particular IDP). Poor coding practice too.
    Portland, Oregon • 54°F
    Sun, May 31, 2020 2:44pm +00:00 (liked on Sun, May 31, 2020 7:57am -07:00)
  • Vinod Anandan https://twitter.com/_VinodAnandan   •   May 31
    My point is that OIDC has mechanisms to prevent this issue..
    Aaron Parecki
    Please go read it again and understand the problem
    Portland, Oregon • 54°F
    4 replies
    Sun, May 31, 2020 7:32am -07:00
  • Vinod Anandan https://twitter.com/_VinodAnandan   •   May 31
    "email_verified" : "True if the End-User's e-mail address has been verified; otherwise false....."

    https://openid.net/specs/openid-connect-core-1_0.html
    Aaron Parecki
    Go read the writeup again. The original post wasn't the clearest explanation of the problem but I also posted some more details in this thread that make it clearer.
    Portland, Oregon • 54°F
    6 replies
    Sun, May 31, 2020 7:28am -07:00
  • Vinod Anandan https://twitter.com/_VinodAnandan   •   May 31
    "The OpenID Foundation enables deployments of OpenID Connect and the Financial-grade API (FAPI) Read/Write Profile to be certified to specific conformance profiles to promote interoperability among implementations.... "

    https://openid.net/certification/
    Aaron Parecki
    And? certification wouldn't have caught this bug since it wasn't a problem with the OIDC part of the exchange.
    Portland, Oregon • 54°F
    Sun, May 31, 2020 7:22am -07:00
  • Barbara Schachner https://twitter.com/barschachner
    Fully agree to that 😀

    Just looking also at examples like https://insomniasec.com/blog/auth0-jwt-validation-bypass or https://threatpost.com/microsoft-oauth-flaw-azure-takeover/150737/.
    o/c they are different + very individual, but if already the big players have such issues, how much more can go wrong on RS side where devs are usually not Auth experts.
    Portland, Oregon • 54°F
    Sun, May 31, 2020 1:41pm +00:00 (liked on Sun, May 31, 2020 6:43am -07:00)
  • Barbara Schachner https://twitter.com/barschachner   •   May 31
    Fully agree to that 😀

    Just looking also at examples like https://insomniasec.com/blog/auth0-jwt-validation-bypass or https://threatpost.com/microsoft-oauth-flaw-azure-takeover/150737/.
    o/c they are different + very individual, but if already the big players have such issues, how much more can go wrong on RS side where devs are usually not Auth experts.
    Aaron Parecki
    Yes! And that is *exactly* why I always advocate for pushing the complexity to the authorization server and keeping the client side simple. Fewer options for clients means fewer ways to mess it up, and there will always be more client developers than AS developers.
    Portland, Oregon • 54°F
    2 likes
    Sun, May 31, 2020 6:43am -07:00
  • hedonometer https://twitter.com/hedonometer
    Yesterday was the saddest day in the history of @Twitter
    Portland, Oregon • 54°F
    Sat, May 30, 2020 4:51pm +00:00 (liked on Sun, May 31, 2020 6:35am -07:00)
  • Arif Yayalar 💛❤️🦁 https://twitter.com/ayayalar   •   May 30
    @aaronpk little disappointed that you sell pdf/ePub editions of OAuth 2.0 Simplified separately.
    Aaron Parecki
    Yeah it's mainly a technical limitation of the platform we used for publishing it. If you send me a receipt, I'll send you the other format!
    Portland, Oregon • 54°F
    Sun, May 31, 2020 6:05am -07:00
  • Dominick Baier https://twitter.com/leastprivilege
    The protocols are not the most complicated typically (not saying they are ‘easy’ either). But business requirements on top make things complicated.
    Portland, Oregon • 54°F
    Sun, May 31, 2020 1:00pm +00:00 (liked on Sun, May 31, 2020 6:00am -07:00)
  • Barbara Schachner https://twitter.com/barschachner   •   May 31
    I feel logical bugs around OAuth/OIDC/JWT handling are on the rise - and they are like the login form SQL injections of the past („be whoever you want to be“).
    Love those standards and their capabilities - but are they getting too complicated?
    Aaron Parecki
    Nah this is more a demonstration of why sticking to standards is a good idea, and why building an authorization server isn't a project that should be taken lightly.
    Portland, Oregon • 54°F
    1 like 12 replies
    Sun, May 31, 2020 5:59am -07:00
older

Hi, I'm Aaron Parecki, Director of Identity Standards at Okta, and co-founder of IndieWebCamp. I maintain oauth.net, write and consult about OAuth, and participate in the OAuth Working Group at the IETF. I also help people learn about video production and livestreaming. (detailed bio)

I've been tracking my location since 2008 and I wrote 100 songs in 100 days. I've spoken at conferences around the world about owning your data, OAuth, quantified self, and explained why R is a vowel. Read more.

  • Director of Identity Standards at Okta
  • IndieWebCamp Founder
  • OAuth WG Editor
  • OpenID Board Member

  • 🎥 YouTube Tutorials and Reviews
  • 🏠 We're building a triplex!
  • ⭐️ Life Stack
  • ⚙️ Home Automation
  • All
  • Articles
  • Bookmarks
  • Notes
  • Photos
  • Replies
  • Reviews
  • Trips
  • Videos
  • Contact
© 1999-2025 by Aaron Parecki. Powered by p3k. This site supports Webmention.
Except where otherwise noted, text content on this site is licensed under a Creative Commons Attribution 3.0 License.
IndieWebCamp Microformats Webmention W3C HTML5 Creative Commons
WeChat ID
aaronpk_tv