In November 2015 the OAuth WG chairs had been informed about new attacks
against OAuth clients using multiple authorization servers. Such a setup
may exist in OAuth as well as in OpenID Connect. To discuss the details
of the (not yet published) attacks a small group met at Deutsche Telekom
in Darmstadt/Germany in December and brainstormed about mitigation
techniques.

On a high-level the attack can be described as an OAuth / OpenID Connect
client that gets confused about which authorization server (AS) issued
tokens, which leads to a failure in authentication and authorization.
Details about the attack can be found at http://arxiv.org/abs/1601.01229
and http://arxiv.org/pdf/1508.04324.pdf.

As a quick and immediate self-mitigation, which requires manual
configuration, a client that has client ids issued by more than one AS
MUST register a "redirect_uri" value with each AS containing a distinct
AS specific component. Client implementations must verify that the AS
specific component received in the authorization response correlates
with state information stored internally at the client for that request.
If the authorization response does not contain the anticipated
AS-specific component then it MUST be rejected.

A strawman proposal for a protocol-based mitigation technique that
relies on a new issuer parameter within the authorization response will
be submitted to the OAuth working group in the next few days.

We encourage the OAuth WG members to carefully study the attack and the
proposed mitigation mechanism. We believe that the working group should
standardize a solution with high priority and therefore ask for feedback
by January 31st 2016. The solution technique will be developed within
the IETF OAuth working group using our regular working group process.

The chairs would like to thank Guido Schmitz (University of Trier),
Daniel Fett (University of Trier), Christian Mainka (Ruhr-University
Bochum) and Vladislav Mladenov (Ruhr-University  Bochum) for contacting
us and for providing us a possibility to investigate the attack and to
develop mitigation techniques. We would also like to thank Torsten
Lodderstedt (from Deutsche Telekom) for hosting our meeting.

Receiving security review from the research community helps to improve
the quality of our protocols. We anticipate a much closer working
relationship with these research groups to tackle potential security
issues before the publication of our specifications as finished RFCs.

To make it easier to contact our working group for security related
issues we have created a dedicated mailing list
<oauth-security-repo...@ietf.org>. For implementation specific bugs we
will attempt to forward the appropriate developers.

Ciao
Hannes & Derek

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to