Hi Eran,

As far as I understood, in a textbook CSRF attack the attacker would create his own requests in order to abuse a user's session. This can be prevented by utilizing standard CSRF coutermeasures (page token, nounce, signature as parameter on every request URL), which bind URLs to a certain session.
A textbook CSRF attack is when an attacker constructs a URI and then manipulate a user-agent with an active session to call that. In the simplest example, an >attacker constructs a URI that transfers a million dollars from the current account to its, then tricks the user to click on that link or automatically >redirects the user to that URI. Because the user is already signed in and has an active session token, the request goes through.
To prevent it, the request URI must include an artifact that binds the request to the active session. Since the attacker has no way of accessing the session >information, it cannot construct as a URI. In practice, this means adding a hidden form parameter to the button with some hash of the session information >that the server can verify.
So I would conclude we have the same understanding of what CSRF means.

But why should the attacker create requests et all? All he needs is already provided by the authorization server themselves. The malicious client can download the HTML pages comprising the authorization flow from the authz
server and use the embedded URLs to issue the requests which normaly
would have been issued by the resource owner herself (using the use agent
indeed). It's more or less the push on a "I agree"
button we are talking about. The authorization server may add a page token to the respective form URL. But it does not matter since the client just uses
the authz server manufactured URL to post the form.
Of course it matters.
The only way the attacker can get access is by calling the 'I agree' button action via an active user session. The attacker cannot access the hidden form >value with the session hash (or whatever the server is using for CSRF protection). So whatever URI it constructs will not work when called with the active >user session.
My point is: the attacker in the threat I'm trying to describe does not 
need to create any URL since it just remote controls the user-agent. The 
malicous code runs outside of the browser and "just" uses the URLs 
provided by the authz server. Yes, there need to be a session. No, the 
attacker does not need to inject any URL he made up.
So let's assume the attacker has to programmatically handle HTML forms the authorization server delivers to the user agent. As you correctly pointed out, the pre-requisite for such an attack to succeed is that the resource owner must be authenticated somehow, e.g. based on a session cookie. Which also means, we are talking about clients running on the victim's device, within the
user agent or as native app.

I see the following possible scenarios:

1) external system browser - The app could utilize an existing session within the system browser on the victim's device. It could then remote control a browser window, e.g. using low-level operating system messages ("send mouse click") or component techniques such as ActiveX. There are tools available to create macros which automatically control and obtain data from
such applications. So this should be feasible.

2) internal browser (cross-browser cookies) - If the authorization server uses cross-browser cookie techniques, such as flash cookies, the attacker could instantiate an internal (invisible) browser and try to utilize a session associated with such a cookie. I assume controlling such a browser instance
will be even simpler then in (1).

3) internal browser (silent authz flow) - This is a scenario where the attacker is unable to abuse an existing session on the device. It could instead create an internal browser and perform an authorization flow with the resource owner for one particular scope. Using the same browser instance and based on the cookies obtained in the first run, it could silently perform additional
authorization flows for other scopes.

4) internal browser (non-interactive authentication methods) - There are authentication methods available w/o the need for user-interaction, for examples SIM card authentication or certificate-based authentication. The attacker could utilize an internal, invisible browser instance in combination with such an authentication method in order to perform the
authorization process.

I'm not sure whether the scenarios described above can be classified as
CSRF.
I'm having a hard time following all these scenarios. But the important part is that OAuth assumes the 'user-agent' is a compliant and secure web browser. If >the user-agent does not enforce cookie boundaries, XSS, CORS policy, etc. there isn't much we can do. In other words, if the user installs a poorly design >native application which has its own user-agent implementation opened to known web attacks, all bets are off.
The security model behind all these is pretty simple. The active user 
session has to be protected from any external access by attackers and 
enforce same-origin policy.
What didn't you understand? I would be happy to improve my description. 
What I basically try to get across: a malicious piece of software 
running on the resource owners device can simulate her consent. As a 
pre-requisite the attacker must be able to either abuse an existing 
session or to create a new one. I gave four examples of how this could 
be achieved. At least the last has obviously nothing to do with browser 
security features. The threat also has nothing to do with poor design or 
user-agent implementation flaws. It is a deliberate attack against the 
resource owner.
One could argue that prevention of malicous software is not the 
responsibility of the authz server. I could agree with that. But people 
seem to expect an OAuth authz server to cope with such attacks. That's 
why I believe we either clearly draw this boundary in the spec or give a 
hint on how to prevent this kind of threat.
regards,
Torsten.
I still don't see the need to add the proposed section.
EHL



_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to