Vladimir,

yes, we could do a formal analysis and it would be a very good idea.
It would even go faster if a few of us work together on it. Anyone
interested?

This would be a good contribution for the workshop in July, btw.

Ciao
Hannes

On 02/23/2016 10:09 AM, Vladimir Dzhuvinov wrote:
> Hi Mike,
> 
> You mention that you spent considerable time in research. I wonder if
> there is existing theory, in communications or information theory, that
> can be used to formally establish and prove (or disprove) the security
> of the proposed OAuth measures? Perhaps some work that is totally
> unrelated to identity and the web protocols, but could well apply here?
> 
> My reasoning is that we have a closed system that is fairly simple, so
> formal analysis must be entirely possible.
> 
> 1. We have 5 parties (client, AS, RS, user, user agent).
> 
> 2. The OAuth protocol follows a simple and well-defined pattern of
> messages between the parties.
> 
> 3. The points and the number of ways by which an adversary may break
> into OAuth must therefore be finite.
> 
> 4. The security requirement is essentially to guarantee the precedence
> and authenticity of the messages from discovery endpoint to RS, and the
> preferred way to do that is by establishing a binding between the
> messages, which can be forward or backward binding.
> 
> 
> Right now the WG concern is whether all possible attacks have been
> recognised, and then taken care of. If we can have a formal model that
> can reliably reveal and prove that, this will be a huge breakthrough.
> 
> Cheers,
> 
> Vladimir
> 
> 
> 
> On 20/02/16 12:41, Mike Jones wrote:
>> Suggesting that they be read is of course, the right long-term approach.  
>> But as someone who spent 20+ years as a researcher before switching to 
>> digital identity, I was sensitive to not wanting to upstage their work by 
>> copying too much of their material into our draft before their publications 
>> were widely known.  I'll of course commit to working the researchers and the 
>> working group to create a self-contained concise description of the threats 
>> and mitigations in the working group document.
>>
>>                              Cheers,
>>                              -- Mike
>>
>> -----Original Message-----
>> From: Hannes Tschofenig [mailto:hannes.tschofe...@gmx.net] 
>> Sent: Saturday, February 20, 2016 2:25 AM
>> To: Mike Jones <michael.jo...@microsoft.com>; William Denniss 
>> <wdenn...@google.com>; Phil Hunt (IDM) <phil.h...@oracle.com>
>> Cc: oauth@ietf.org
>> Subject: Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for 
>> Adoption
>>
>> Hi Mike,
>>
>> On 02/20/2016 10:52 AM, Mike Jones wrote:
>>> Have you read both of their publications?  If not, do yourself a favor 
>>> and do.  They're actually both very readable and quite informative.
>> I have read both documents. In context of this discussion the question is 
>> whether we
>>
>> (a) require them to be read (in which case they should be a normative 
>> reference), or
>> (b) suggest them to be read (since they provide additional background 
>> information). In this case they are an informative reference.
>>
>> I believe believe we want (b) for the OAuth WG document. While I encourage 
>> everyone to read the publications I also believe that there is lots of 
>> material in there that goes beyond the information our audience typically 
>> reads (such as the text about the formal analysis).
>>
>> There is probably also a middle-ground where we either copy relevant text 
>> from the papers into the draft or reference specific sections that are 
>> "must-read".
>>
>> One other issue: I actually thought that the threat that is outlined in the 
>> research paper is sufficiently well described but the second threat, which 
>> is called 'cut-and-paste attack', requires more work.
>> I noted this in my summary mail to the list, see 
>> http://www.ietf.org/mail-archive/web/oauth/current/msg15697.html
>>
>> Ciao
>> Hannes
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> 
> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> 

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to