-
Notifications
You must be signed in to change notification settings - Fork 401
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow verified access token #315
Allow verified access token #315
Conversation
Hello. Thanks for this pull request. I'll try to rebase the base branch to get rid of unrelated commits and take a look for you changes. |
d20554c
to
8b97093
Compare
@enewbury rebased |
@enewbury I think this is really nice follow-up of my initial PoC branch. I have left you few minor comments. If you can keep API backwards compatible, we don't need to release major version and it will be easier for everyone to update. Anyway thanks for this nice pull request 👍 PS: Feel free to add changelog entry as well. |
Sorry, I was traveling overseas, I'll make your requested changes. |
@simi just checking in to make sure this doesn't fall through the cracks |
Looks good to me. Can you please rebase? @homakov is there any chance to take a look at this final change (related to #174 (comment)). |
…nto allow-verified-access-token
@homakov any update on this? |
@enewbury Sorry, been away from oauth space and don't want to give a bad advice. |
@homakov Sorry to keep bugging you, but we'd prefer to be depending on the official version of this gem, rather than my fork. If you get a chance, we'd love to have this merged in. |
@enewbury not sure what's unclear on Egor's response at #315 (comment). He's not going to review this. |
@simi Oh gotcha, I thought he was saying, "sorry for the delay, give me a second to re-familiarize myself" |
We need to find out some way to get proper security review. Any idea how to proceed @enewbury? |
Well, I'm definitely no security expert. I get the gist of how oauth works, but I don't have a lot of connections in the security space. Are there other maintainers of this repo that are still active? |
Hi, I'm trying out your PR as I'm currently creating an Android app associated to a Rails API that uses I've hit a dead end on CSRF detection in After some tests I have noted the following :
This may not be the proper place to report this, but since your PR adds Thanks for your input! |
@simi Any updates here on getting this branch reviewed/approved for merge? Ideally, we could have this merged into master. |
I'm still a little concerned about security of this :/ Any idea how to move this @LesterKim? |
@simi To move forward, how about merging the allow-verified-access-token branch in this repository into master? |
@simi I'm trying to build a social login flow using a React Native app with a Rails API. I want to use this gem to verify the access token the app gets with the Facebook SDK. Is there any news regarding this PR? I think it will solve my issue... |
Feel free to point to this branch and test. |
The original maintainer of the fork being non responding for the moment I created another fork with the same changes but based on the latest I don't think I will maintain it a lot, as the work was originally done by @enewbury and approved by @simi, but I thought it could help some people while this PR is being rebased and merged |
@dvkch This is still on my radar, but I'm not still 100% sure this is secure enough and nobody proved that it is. Any experience from running this in production or any shared security research on this would make it easier to finally merge. Next to this we will need documentation and example app updated. |
@simi good to know. we have been running it in prod for some time now, the only bump we encountered is the case where a user would login on the phone while deselecting some scopes, resulting in a "missing scope" error. Since our Rails app is API only we solved it by putting the strictly required scopes in our device omniauth config, and the list of scopes to hopefully request in the web, iOS and Android apps. On the security side I do not know enough to give you a complete answer, all I can say is the The only other issue I can imagine is some MITM attack obtaining your access token when you're logging in and using it for themselves, but I would think there is the same risk when using a cookie. |
Im having the same issues with mobile apps, is this going to be merged any time soon? Or shall I use another fork? |
Hey folks, sorry I've been MIA. The truth is I did this for an old job, and I have almost no memory of what was happening with the |
@enewbury I've just checked and the two projects I am using it in uses |
I'm going to close this PR in favor of #377 so that's it a bit easier to review having all the changes together, and I've also pinged some folks at my consultancy to do a security review and maybe they can help determine if this is safe to include in main. |
@enewbury thanks for taking a care of this. |
No description provided.