Hello Hannes,
Thank you for the message.  My reply is in-line.

On Aug 21, 2014, at 3:18 AM, Hannes Tschofenig <hannes.tschofe...@gmx.net> 
wrote:

> Hi Zhanna,
> 
> thanks for sharing your thoughts with the OAuth group.
> 
> I have been wondering where this audit identifier should go. Are you
> talking about putting a new identifier into some protocol exchanges (and
> which messages) or are we talking about an implementation issue?

Placing it on the protocol level worth consideration.  Initially it could be 
sent as part of access token response.  

> 
> Also, when you say you want to have a way to "track all OAuth exchanges"
> I am curious who should be able to do this tracking. OAuth, as you know,
> involves multiple independent parties. I am asking because of potential
> privacy concerns.

It depends a lot from the deployment scenarios. Each participant may have their 
own audit logging and  processing strategy. There may be cases when 
AS/Client/RS are working in close cooperation and may get access to the 
very-specific information on each other’s audit logs. Ultimately the judge, or 
some other authority, may order all parties to release their (relevant) audit  
information.  
The privacy concern should be addressed in several directions:
- how audit logs are protected from unauthorized access. For example, admin can 
have read rights to the log file, but looking at it would be overstepping his 
authority, etc
- the private information can (must?) be protected. For example, one can 
encrypt parts of the log message, or similar.
Generally all security sensitive information should be stripped from the audit 
logs.

Also, it would be useful to define the minimal, but required set of information 
that should be logged by all parties for the audit purposes.

> 
> Which part of the Common Criteria document do you believe is relevant to
> this specific aspect?

Classes FCO, FIA
 
> I noticed that there is an audit section in there
> but it refers to a more general notion of audit that has little to do
> with the actual protocol interaction.
> 
> Ciao
> Hannes
> 
> On 08/20/2014 10:01 PM, Zhanna Tsitkov wrote:
>> Hello,
>> I would like to introduce a new feature to OAuth 2.0 - an  Audit.   The
>> ultimate goal would be to have some simple, well defined way to track
>> all exchanges under OAuth 2.0 umbrella, connect all end-to-end
>> participants for the audit purposes,  so that audit logs could be
>> processed dynamically for the fast violation response, or analyzed for
>> the forensic purposes off-line.
>> My suggestion is to have a new audit identifier (audit id). It should be
>> unique and stay unchanged  for a given exchange.  It should be recorded
>> in all audit logs.  It can be passed to and between different modules
>> and components of OAuth 2.0 
>> Audit identifier can be either alpha-numeric string or JSON structure.
>> It can be signed for the integrity protection, or even encrypted if
>> privacy is an issue. 
>> Audit id can be generated at AS as a random string, or composed
>> following some rules. In addition, Clients and/or RSs can generate their
>> own audit identifiers for their own bookkeeping, and include them
>> in their requests. In this case all relevant communications  should
>> include both AS generated audit identifier and Client’s and/or RS’s
>> (respectively) audit identifiers.   
>> Generally, the data of interest include policies,
>> permissions, authorization and authentication information, etc and could
>> be used by government agencies, medical and banking institutions etc.  
>> Please, see the relevant Common Criteria
>> document http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R4.pdf 
>> document.
>> Thanks,
>> Zhanna
>> 
>> 
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>> 
> 

Thanks,
Zhanna

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to