Hi Mike,

You mention that you spent considerable time in research. I wonder if
there is existing theory, in communications or information theory, that
can be used to formally establish and prove (or disprove) the security
of the proposed OAuth measures? Perhaps some work that is totally
unrelated to identity and the web protocols, but could well apply here?
My reasoning is that we have a closed system that is fairly simple, so
formal analysis must be entirely possible.

1. We have 5 parties (client, AS, RS, user, user agent).

2. The OAuth protocol follows a simple and well-defined pattern of
messages between the parties.

3. The points and the number of ways by which an adversary may break
into OAuth must therefore be finite.

4. The security requirement is essentially to guarantee the precedence
and authenticity of the messages from discovery endpoint to RS, and the
preferred way to do that is by establishing a binding between the
messages, which can be forward or backward binding.


Right now the WG concern is whether all possible attacks have been
recognised, and then taken care of. If we can have a formal model that
can reliably reveal and prove that, this will be a huge breakthrough.

Cheers,

Vladimir



On 20/02/16 12:41, Mike Jones wrote:
> Suggesting that they be read is of course, the right long-term approach.  But 
> as someone who spent 20+ years as a researcher before switching to digital 
> identity, I was sensitive to not wanting to upstage their work by copying too 
> much of their material into our draft before their publications were widely 
> known.  I'll of course commit to working the researchers and the working 
> group to create a self-contained concise description of the threats and 
> mitigations in the working group document.
>
>                               Cheers,
>                               -- Mike
>
> -----Original Message-----
> From: Hannes Tschofenig [mailto:hannes.tschofe...@gmx.net] 
> Sent: Saturday, February 20, 2016 2:25 AM
> To: Mike Jones <michael.jo...@microsoft.com>; William Denniss 
> <wdenn...@google.com>; Phil Hunt (IDM) <phil.h...@oracle.com>
> Cc: oauth@ietf.org
> Subject: Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for 
> Adoption
>
> Hi Mike,
>
> On 02/20/2016 10:52 AM, Mike Jones wrote:
>> Have you read both of their publications?  If not, do yourself a favor 
>> and do.  They're actually both very readable and quite informative.
> I have read both documents. In context of this discussion the question is 
> whether we
>
> (a) require them to be read (in which case they should be a normative 
> reference), or
> (b) suggest them to be read (since they provide additional background 
> information). In this case they are an informative reference.
>
> I believe believe we want (b) for the OAuth WG document. While I encourage 
> everyone to read the publications I also believe that there is lots of 
> material in there that goes beyond the information our audience typically 
> reads (such as the text about the formal analysis).
>
> There is probably also a middle-ground where we either copy relevant text 
> from the papers into the draft or reference specific sections that are 
> "must-read".
>
> One other issue: I actually thought that the threat that is outlined in the 
> research paper is sufficiently well described but the second threat, which is 
> called 'cut-and-paste attack', requires more work.
> I noted this in my summary mail to the list, see 
> http://www.ietf.org/mail-archive/web/oauth/current/msg15697.html
>
> Ciao
> Hannes
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

-- 
Vladimir Dzhuvinov :: vladi...@connect2id.com


Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to