That was a helpful discussion just now -- thanks to everyone who
participated. Jeff Hodges and I made some *rough* notes via EtherPad at
http://etherpad.com/n2jOXo3WTY and I paste them below. Real minutes will
follow once we've had a chance to listen to the recording.

--Peter

##

OAuth interim #3

[notes picked up in progress]

Blaine: cert chains often aren't checked in libraries, but I like the
elegance of no distinction between consumer and access token -- instead
SP decides what token means (James Manger's proposal to separate tokens
from signatures)

Brian: IETF OAuth work should try to provide security for those who are
not able or willing to use SSL?

Blaine: I think so

Brian: how much security can we reasonably provide for those people?
need to be really clear about threat models

Blaine: e.g. in Twitter originally were concerned about replay attacks,
also concerns about refresh tokens

Brian: let's explore the Twitter example -- they send cookies over HTTP
but passwords over HTTPS, but when they have issues it's usually
operational issues, weak passwords, etc.

Hannes: re-use of an eavesdropped token depends on the application, but
how much concern is there about off-path attacks?

Blaine: I definitely support bearer tokens

Brian: my point is that it's silly to use OAuth as a replacement for
HTTPS -- what are the threat models that HTTPS doesn't protect against?

Hannes: I wouldn't put that as a design constraint -- this is true for
everything, not just OAuth over HTTPS

JeffH: TLS/SSL doesn't give you message integrity and replay protection
(if you keep the message around) -- secure channels provide integrity
(and encryption) of the channel but not integrity outside the context of
the channel

Hannes: the same is true of an OAuth token once unbundled, if you share
it with other entities

JeffH: my point is only that the secure channel doesn't protect a token
outside the channel

Hannes: distinction between transport layer security and application
layer security (yes, this is a good way to put it)

Peter: it seems that we don't have a clear threat model

Blaine: is the threat developers? people are lazy...

Brian: we have a real problem with operational security (e.g.,
credentials kept in plaintext on the service provider) -- if we have a
bearer token model then we won't need to keep credentials in plaintext

Hannes: I have a proposal -- we won't be able to have one approach that
satisfies everyone, but we can at least describe the threat model more
clearly and let people choose which features solve those problems

Peter: that might make sense

Hannes: what are people's constraints in implementation and deployment?

Brian: all widely deployed security technologies use transport security
or bearer tokens

Blaine: I somewhat disagree -- percentages might be larger at a service
like Twitter or Flickr than at a broader service like Google or Yahoo!

Blaine: my observation is that no one has ever deployed a bearer token
system that works, other than cookies -- I think that OAuth tokens that
can be signed can work quite well

[scribal note: we will have an audio recording]

Brian: Microsoft and Kerberos support

Blaine: not on the web

Brian: how about OpenID?

Blaine: but no one uses that

Brian: how about SSO systems between Yahoo and Flickr?

Blaine: Flickr people complain about that :)

Blaine: bearer tokens like Flickr's capability URLs don't have strong
security

Blaine: do we need [lost]

JeffH: OAuth as toolkit that gets profiled for different use cases --
the current split among the documents makes sense -- the Token I-D is
the basic toolkit, and the "delegation" I-D is an example of a
particular profile for a (small) range of use cases.

Hannes: what is the disagreement at that point?

[the chair falls down on note-taking]

Brian: we were trying something that had never been done before

Blaine: maybe it is that the signatures are too hard, but we don't
really know

Eve: we have existence proofs of it working, but maybe not wide interop

Brian: what is the threat model behind signatures? what are signatures for?

Eve: signatures are not there to substitute for channel security, but
provide attestations or other features that can't be derived from
channel security -- might need strong identity proofing

Brian: is a bearer token that lasts one minute OK?

Eve: interested in data origin authentication and fact attestation

Paul: a bearer token might not show intention, signatures provide a
strong indication

Brian: not sufficient that bearer token have a short lifetime -- need to
sign the whole message?

Paul: yes, the body would need to be protected

Brian: in that case, it seems as if the IETF OAuth draft doesn't give
you what you need because it secures only the URL and the time, not the
post body

Paul: might need an extension for that

Brian: what if the URL was not integrity-protected but the body was --
would that be enough?

Paul: yes we'd want to sign it all

Brian: that's hard

Brian: I'm hearing that different people need different things signed

Hannes: the bearer signing token is like the null profile

Brian: how many optional signing methods do we need?

Blaine: I disagree with the assertion that the use cases are not overlapping

Hannes: do you think that there's only one signing profile needed?

Blaine: I'm hearing that "there's so much fragmentation that we should
just use bearer tokens"

Brian: the solution I'd like to see is (1) bearer tokens with good
operational security characteristics and (2) a second layer that formats
a message in a canonical way (e.g., a set of bytes) that would separate
it from the details of the HTTP protocol

Hannes: (1) it won't help to say in the spec that you shouldn't have
infinite lifetimes (2) might want a more flexible signing approach, more
like DKIM than SIP signing

Justin: if we feel strongly about signing, we need to have clarity on
the use cases -- can we have three or four paragraphs on each signing
scenario? i.e., what exactly needs to be signed (does the timestamp need
to be signed? the nonce? the body? etc.)

Agreement to discuss this on the list -- Brian, Blaine, and Paul will
post about several scenarios.

## END


Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to