For some reason this only just now occurred to me: What’s to stop some web site from carefully crafting an imitation of the Google “you need to sign in again” UI, storing your Google password, and storing from the other side the auth cookie from Google, so that it can then poke around through 100% of your Google content including any other site you’ve signed into with the same SSO login?

This is such a fundamental flaw in the whole concept that it’s obviously occurred to people and they’ve had time to come up with something to prevent it, but I can’t see how you could prevent it. Have I missed something? You might have a non-Google URL in the address bar during the faked sign-in, or you could use varying degrees of deception to attempt to make the address bar look legit, but I’d honestly be surprised if more than 20% of people even check the address bar every time they sign in to SSO. I don’t.

So what’s to make this not work?

  • @BradleyUffner
    link
    English
    16 months ago

    If this were an actual flaw, it would completely break all of OAuth everywhere. How likely do you think it is that the entire security industry, and all hackers everywhere, would have overlooked something like this?

    • mozzOP
      link
      fedilink
      16 months ago

      Can I set up a web site and ask you to go do your Google SSO on it? I promise it’s legit

      • @BradleyUffner
        link
        English
        16 months ago

        I’ll take a look at your site, I’m curious to see what it looks like, but I’m not entering any real credentials.

        • mozzOP
          link
          fedilink
          26 months ago

          I thought you were extremely confident that what I was describing wouldn’t work though 🙂

          • @BradleyUffner
            link
            English
            2
            edit-2
            6 months ago

            I’m confident there will be some sign that it’s a forged OAuth prompt rather than Google’s prompt, and I’m not entering credentials into an obviously fake prompt.

            • mozzOP
              link
              fedilink
              26 months ago

              Well, that’s lucky, because I don’t want to sign up for OAuth tokens with Google and then immediately start doing something nefarious with them just to prove a point. 🙂

              I looked around a little though, and I was able to find an example of this technique being used for real maliciously “in the wild.” My envisioning of it was somewhat different (overriding or obfuscating the URL bar in a real window showing malicious HTML, as opposed to constructing an entire fake window), but the principle’s pretty much exactly the same.

              I also learned that Google’s response, after some not-real-similar attacks which also exploited doing nasty things with real OAuth vendor credentials, was to tighten up a lot on their security on who can have OAuth vendor credentials (which sounds like a pretty sensible approach to me.)