#OAuth

Andrey DarkCat09darkcat09@dc09.ru
2025-05-27

Вход в феди-аккаунт с защитой от неверного порядка этапов через паттерн Typestate

https://git.dc09.ru/DarkCat09/crtsh-gts/src/branch/main/src/login.rs

#rust #oauth #gotosocial

GripNewsGripNews
2025-05-26

🌗 JSON Web Token (JWT) 十週年與未來展望
➤ 網路安全標準十年演進與未來挑戰
self-issued.info/?p=2708
本文回顧了 JSON Web Token (JWT) 在十年前成為 RFC 7519 標準的里程碑。JWT 及其相關規格已成為現代網路安全的重要基石,廣泛應用於身份驗證和授權。作者強調了 JWT 的成功,並介紹了持續進行的工作,以確保 JWT 在未來十年內的安全性,包括更新最佳實踐規範,以及修補已知的漏洞。
+ 感覺 JWT 已經是業界標準了,沒想到還有持續更新,確保安全真的非常重要。
+ 這篇文章讓我更瞭解 JWT 的發展歷程,也意識到網路安全需要不斷演進。
Web Token

2025-05-25

X восстановился после масштабного отключения

После сообщения о пожаре, произошедшем раннее на этой неделе в штате Орегон не загружалась лента на X.

tefida.com/x-is-back-after-an-

#x #oauth #перебоивработе #новостиit #tefidacom

2025-05-20

Discover how to implement client assertions with the client credentials flow using OAuth DPoP. Streamline secure communication between applications while enhancing your security architecture. #OAuth #dotnet #aspnet

isaacl.dev/gj4

Marco "Ocramius" Pivettaocramius
2025-05-16

@akrabat now showing what has changed in since 2012.

Rob Allen standing in front of a projector slide listing the most important OAuth improvements since 2.0
Marcel Waldvogelmarcel@waldvogel.family
2025-05-13

@w_pettersson @schmidt_fu
I recently came along this project. I haven't tried it, but this may look like it would solve your problem.
#SMTP #OAuth proxy
github.com/simonrob/email-oaut

Joe Steinbring :thisisfine:joe@toot.works
2025-05-11

I got n8n working with LinkedIn, Mastodon, etc. Can I get it to work with Fitbit? :blobcatthink:

#Homelab #n8n #OAuth

A Mastodon post that was generated by n8nMy very basic workflow that I generated purely to test connectivityA linkedin post that was generated by n8nThings I connected to n8n
2025-05-09
In two weeks I'll be speaking at the MCP Dev Summit in San Francisco! It's going to be a great day packed with back to back sessions.

In less than a year, the MCP project has quickly reshaped how developers are building AI agents. My talk, "Intro to OAuth for MCP Servers", will cover the basics of the new MCP authorization protocol and set the stage for building secure MCP servers.

https://mcpdevsummit.ai/#agenda
2025-04-30

Interesting open letter from the CISO at JP Morgan Chase, calling out insecure SaaS integrations, and specifically lots of implicit/explicit criticism of #OAuth: poorly secured and broadly scoped long-lived bearer tokens are not a great idea. Hopefully we’ll see PoP (with keys in a KMS) becoming more widespread for these kinds of integrations.

(The letter is undated 😤 but I assume it’s recent - via @ladynerd on LinkedIn).

jpmorgan.com/technology/techno

2025-04-25

Just did a big rewrite of a docs page on dynamic identity providers in Duende #identityserver.

That was fun to dive in, and makes me appreciate the thought put in to designing both #aspnetcore and IdentityServer itself.

docs.duendesoftware.com/identi

#dotnet #security #oauth

(also big thanks to @khalidabuhakmeh for the fantastic preview images on new docs pages)

2025-04-24

You can use JWTs for client authentication with OAuth/OIDC, but it does NOT require you to specify the `client_id` POST parameter. So you are supposed to parse the complete JWT token _first_ before validating the signature to extract the `sub`, which is actually the `client_id` of the client/RP in order to find the set of keys that can verify the JWT that you just parsed and used unverified. What the hell.

rfc-editor.org/rfc/rfc7523.htm

#jwt #oauth #openid #security #fail

2025-04-21

⚠️ Phishers have found a clever way to spoof Google — and their emails pass all security checks.

A new DKIM replay phishing attack abuses Google’s own OAuth infrastructure to send fake messages that look 100% legitimate, including passing DKIM authentication.

What happened:
- A phishing email was sent from “no-reply@google.com”
- It appeared in the user’s inbox alongside real Google security alerts
- The message linked to a fake support portal hosted on sites[dot]google[dot]com — a Google-owned domain
- The attacker used Google OAuth to trigger a real security alert to their inbox, then forwarded it to victims

Why this matters:
- DKIM only verifies the headers, not the envelope — allowing this spoof to work
- The phishing site was nearly indistinguishable from Google’s actual login portal
- Because the message was signed by Google and hosted on a Google domain, it bypassed most users’ suspicions
- Similar tricks have been used with PayPal and other platforms, raising broader concerns

Google has since acknowledged the issue and is working on a fix. But this attack is a reminder:

Even the most secure-looking emails can be fraudulent.
Even Google-signed emails can be weaponized.

🛡️ At @Efani, we advocate for layered defense — because no one layer is ever enough.

#Cybersecurity #Phishing #Google #OAuth #DKIM #EmailSecurity #EfaniSecure #ThreatIntel

2025-04-21

Bleeping Computer: Phishers abuse Google OAuth to spoof Google in DKIM replay attack. “In a rather clever attack, hackers leveraged a weakness that allowed them to send a fake email that seemed delivered from Google’s systems, passing all verifications but pointing to a fraudulent page that collected logins. The attacker leveraged Google’s infrastructure to trick recipients into accessing […]

https://rbfirehose.com/2025/04/21/bleeping-computer-phishers-abuse-google-oauth-to-spoof-google-in-dkim-replay-attack/

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst