TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Twitter's OAuth has a gaping security hole

15 点作者 madmotive超过 15 年前

7 条评论

oscardelben超过 15 年前
That's a feature, not a bug. In twitter as far as I remember you have the opportunity to revoke tokens yourself. It's definitely not a security hole.
评论 #921749 未加载
评论 #922148 未加载
rabble超过 15 年前
Argh, why do we vote up this crude sensationalist crap?
评论 #922031 未加载
madmotive超过 15 年前
What approaches do other OAuth providers take to this problem? Revoking all OAuth tokens on a password change/reset takes away a good chunk of the value that many people get from using OAuth.
评论 #922275 未加载
评论 #921789 未加载
djb_hackernews超过 15 年前
Along the same lines, if you build a twitter app that uses Oauth and change the access from read to read/write the oauth tokens never change and won't work if you try to do a write operation. Even if you log out and log back in manually. More problematic the error is '401 - Unauthorized', blah.<p>The work around recommended by Twitter? Register a new twitter app that is read/write from the get go. :(
orblivion超过 15 年前
I guess I don't quite follow the logic here, though I'm not advanced in the ways of the web yet.<p>When you connect to a site with OAth, doesn't it require that you a) sign in using Twitter or b) are already signed in using Twitter? I would think this is necessary, otherwise people with multiple Twitter accounts, each of which use the same OAuth site, would end up with a lot of confusion.<p>So given this, Eva would have to a) sign in to Alice's Twitter account, which she can't do because Alice changed her password, or b) continue to be signed into Alice's Twitter account, while Alice changes her password, which would also be a security compromise of Twitter in general, no need to get into OAuth at that point.<p>Did I crack this thing or did I miss something?
genieyclo超过 15 年前
Seriously though, why do all the security examples and scenarios always involve an Alice and a Bob?<p>And why is Alice always the bad guy (or chick)?
评论 #921931 未加载
评论 #921951 未加载
评论 #922133 未加载
评论 #923021 未加载
评论 #922265 未加载
tptacek超过 15 年前
Summary: No it doesn't.