Stories
Slash Boxes
Comments

SoylentNews is people

posted by LaminatorX on Friday May 02 2014, @10:34PM   Printer-friendly
from the Another-one-bites-the-dust dept.

As reported by CNET and other news publishers, a major flaw has been found in the login tools OAuth and OpenID, used by many websites and tech titans including Google, Facebook, Microsoft, and LinkedIn, among others. Wang Jing, a Ph.D student at the Nanyang Technological University in Singapore, discovered that the serious vulnerability Covert Redirect flaw can masquerade as a login popup based on an affected site's domain. Covert Redirect is based on a well-known exploit parameter.

This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by FatPhil on Saturday May 03 2014, @06:54AM

    by FatPhil (863) <reversethis-{if.fdsa} {ta} {tnelyos-cp}> on Saturday May 03 2014, @06:54AM (#39168) Homepage
    m?

    The flaw is that you trusted facebook/whoever to pass information to another site/app. And that other site/app was not trustworthy, as it is prepared to pass arbitrary information on to arbitrary other sites.

    The fact that facebook relied on OAuth to check whether it should be passing the information on to someone else seems irrelevant. Facebook was just doing what you told it to, if it had also demanded a signature, voice print, captcha, retina scan and blood sample as well as OAuth, the issue would still exist.

    The default-trust approach is fundamentally broken, compounded by the physical inability to measure trustworthiness. (As I can't tell the difference between google.com and hacksaws.ru, I trust both of them equally - zero.) That and actively wanting websites to know information about you. You're getting what you're asking for.

    And finally, was it just me, or did that youtube video have no audio? (Youtube the website stopped working for me about a week ago, I now have to download the videos with a script and play them locally, so other just-for-luddite-me-brokenness wouldn't be surprising at all.)
    --
    Great minds discuss ideas; average minds discuss events; small minds discuss people; the smallest discuss themselves
    • (Score: 2) by maxwell demon on Saturday May 03 2014, @03:39PM

      by maxwell demon (1608) on Saturday May 03 2014, @03:39PM (#39258) Journal

      I don't get audio as well (I watch in the browser and have several security-related plugins, so I cannot exclude the possibility that something blocks it; OTOH I get the sound for other YouTube videos).

      --
      The Tao of math: The numbers you can count are not the real numbers.
  • (Score: 2) by michealpwalls on Saturday May 03 2014, @02:21PM

    by michealpwalls (3920) on Saturday May 03 2014, @02:21PM (#39243) Homepage Journal

    I can't watch a YouTube "video" without audio. Why not just give us the text, it would be so much more readable!?

    With that rant out of the way... I couldn't agree more with the first comment here. You as the human have to take some responsibility for the things you do. You can't just go around granting every random website you go to access to your secure Google or Facebook accounts.

    My approach is a bit over-blown for the average users, however I'm sure it could be easily adapted... Create a set of passwords of varying strength. My Admin/Root accounts have the strongest, convoluted password of the set. Google the number 2, my "student account" at the College has my level 3 pw and so on. SoylentNews has a 1-off password that I made up specifically for SN. Lets face it, this is how you have to conduct yourself. In this way, if SN gets compromised, the problem stops there. You cannot then take my username/password from the compromised SN and use it to authenticate elsewhere. That's just crazytalk. SN certainly doesn't have my Google account's token, that would be even crazier!

    TL;DR: Stop granting random websites access to your secure Facebook and/or Google tokens. They can turn around and use the tokens against you some day :)
    In fact, stop requesting that websites even support these ridiculous Single-Sign On mechanisms. Convenience is fundamentally opposed to Security. They are at opposite ends of the User Experience spectrum.