-
Notifications
You must be signed in to change notification settings - Fork 27
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Ask the RWTH to allow you to publish the Client Identifier #27
Comments
Agree to that, hopefully the RWTH does change it's opinion. For now they should just be a bit faster with verification, so the program works at least. |
I already tried it twice and never got any response. Nevertheless it is no secret that anybody can sniff the ClientID in 5 2015-02-06 11:46 GMT+01:00 Electronic Kiwi [email protected]:
|
What would happen, if you published the program (ID) without their permission? |
Any released ID will instantly be deactivated. 2015-02-07 22:13 GMT+01:00 Claudius Ellsel [email protected]:
|
Ok, so unfortunately that is not an option. |
Yes, or you can run something like What bugs me is, that, for someone who wants to distribute an application, extracting a client id only needs to be done once and is not a big deal (but this is, as I understand, something the RWTH wants to prevent). On the other hand, people who want to contribute to Sync-my-L2P and test their changes (which should be a legitimate use case for having to know the client id), will have a hard time doing so. They will need to make sure not to commit the client id they are using, might not know how to get hold of a valid client id or might be afraid to do so. Maybe you could ask the RWTH to give you a second client id which will be associated with a special name e.g. Just to make this clear: The RWTH is still wrong in trying to prevent you from including the client id with this source code. RFC6819 explicitly mentions this case:
and
and anyway:
But there is no use in insisting on the standards if the RWTH won't acknowledge them. Maybe we can work out a compromise as suggested above. TL;DR |
Hey there |
Hey Credics, At the moment, IT Center is very restrictive with that. In case Logfiles, User reports, etc. show, that the ClientID was extracted and is used for another project, the ID may be revoked. By that, nobody will be able to use the Sync-My-L2P at all until the case is discussed an the SML2P is published with a new ClientID. If you want to compile/build/alter such a project on your own, please request your own ClientID (It is very easy - it is just one email - [email protected]). By requesting it there, you will not only get a ClientID but also API-Updates (e.g. more methods, changed functions, etc.), contact infos and more stuff. (Of course you can also mention the current problem of testing IDs in this mail to remind everyone of this...)
P.S.: Talking about doing something forbidden in public including references to corresponding tools might not be the best idea.... P.P.S.: This post is my personal opinion and does not need to match the position of RWTH/ITC at 100% |
Thank you for the quick response :) |
Reading the OAuth2 RFCs one has to realize, that the client identifier was never meant to be secret.
This is why the RFC6819 says the following:
Sync-my-L2P is a
public client
and therefore does not contain a client secret (see RFC6819 5.2.3.1).Putting a secret into a
public client
is considered nonsense 4.1.1. Threat: Obtaining Client SecretsSo to use the words of RFC6749 2.2. Client Identifier:
and therefore there is absolutely no reason for the RWTH to treat it as such.
On the contrary it actually hurts Sync-my-L2P as an open source project, because it makes it impossible to test most modifications and thus makes contributing harder than it should be.
Therefor I ask you to please talk to the RWTH again and try to convince them that trying to keep the client id a secret is rather silly.
If they want to make sure that the Datenschutz is payed attention to, I'm all for that. However, the only way they can make sure that people can chose to use a program approved by the Datenschutzbeauftragter is by distributing a Version of Sync-my-L2P on their own website that they compiled themselves. Maybe they could even sign it or at least put some sort of hash on their
website in order to be able to verify if you have the
verified by the Datenschutzbeauftragter
version.But none of these privacy concerns will be solved by keeping the client id a secret.
quick reminder
RFC6749 2.2. Client Identifier
The text was updated successfully, but these errors were encountered: