John,

I haven’t changed my mind. But I now think we’ve come away with a different 
understanding of the threats.

I recall that we agreed that “iss” and “client_id” are for mitigating mix-up, 
by allowing a client to figure out what token endpoint a grant is for.  There 
is nothing that helps a client to determine that the token endpoint it is about 
to use is valid.  IOW. The client could have the correct “iss” and “client_id” 
from the AS authorization endpoint, but it thinks it is supposed to pass the 
grant to token.evil.com instead of token.example.com to redeem it.

Phil

@independentid
www.independentid.com <http://www.independentid.com/>phil.h...@oracle.com 
<mailto:phil.h...@oracle.com>





> On Mar 18, 2016, at 4:01 PM, John Bradley <ve7...@ve7jtb.com> wrote:
> 
> The Mitigation we agreed on for the bad token endpoint is returning the 
> issuer and client_id form the authorization endpoint.
> 
> Phil are you saying that you no longer agree with that? 
> 
> The question that was unresolved was how the client would get a bad resource 
> URI, and what the correct mitigation is if any.
> 
> John B.
> 
> 
>> On Mar 18, 2016, at 7:52 PM, Phil Hunt <phil.h...@oracle.com 
>> <mailto:phil.h...@oracle.com>> wrote:
>> 
>> By convincing the client to use a bad URL.  That’s kinda why we’re worried 
>> about bad discovery no?
>> 
>> Depending on the type of client authentication, the client will establish a 
>> valid connection to the hacker’s proxy which then replays the token request 
>> to the real endpoint.  The hacker now has the token.
>> 
>> Same thing for the resource endpoint - except worse. The hacker doesn’t need 
>> the token as they now see the payload.
>> 
>> Phil
>> 
>> @independentid
>> www.independentid.com <http://www.independentid.com/>phil.h...@oracle.com 
>> <mailto:phil.h...@oracle.com>
>> 
>> 
>> 
>> 
>> 
>>> On Mar 18, 2016, at 3:38 PM, Brian Campbell <bcampb...@pingidentity.com 
>>> <mailto:bcampb...@pingidentity.com>> wrote:
>>> 
>>> How does one Mitm the token endpoint?
>>> 
>>> On Fri, Mar 18, 2016 at 4:27 PM, Phil Hunt (IDM) <phil.h...@oracle.com 
>>> <mailto:phil.h...@oracle.com>> wrote:
>>> There are two variations. 
>>> 
>>> Mitm the token endpoint is different then working one legit token endpoint 
>>> against another thru redirect and state misdirection. 
>>> 
>>> In the mitm version you don't need multiple AS's.
>>> 
>>> Phil
>>> 
>>> On Mar 18, 2016, at 15:04, Brian Campbell <bcampb...@pingidentity.com 
>>> <mailto:bcampb...@pingidentity.com>> wrote:
>>> 
>>>> The "a. wrong AS /token endpoint" is the mix-up issue, which can be 
>>>> mitigated by returning an identifier for the AS in the authorization 
>>>> response. It is something that needs to be addressed but "discovery" or 
>>>> metadata aren't needed and audience restricted access tokens tokens don't 
>>>> help.
>>>> 
>>>> Maybe that's obvious but there seems to be a lot of confusion on all this 
>>>> so I wanted to reiterate it.
>>>> 
>>>> On Thu, Mar 17, 2016 at 11:37 AM, George Fletcher <gffle...@aol.com 
>>>> <mailto:gffle...@aol.com>> wrote:
>>>> Goals:
>>>> 
>>>> 1. Help the client not send a token to the "wrong" endpoint
>>>>    a. wrong AS /token endpoint
>>>>    b. evil RS endpoint(s)
>>>> 2. Allow good RS to determine if the token being validated was intended 
>>>> for that RS
>>>> 
>>>> Other high-level goals?
>>>> 
>>>> Use cases:
>>>> 
>>>> 1. RS that supports multiple AS (we've had this in production since 2011)
>>>> 2. RS rejects token not issued for use at the RS
>>>> 3. Client that dynamically supports new RS (say any client that supports 
>>>> the jabber API)
>>>> 4. Client that dynamically supports new AS
>>>> 
>>>> Feel free to add to the list :)
>>>> 
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>> https://www.ietf.org/mailman/listinfo/oauth 
>>>> <https://www.ietf.org/mailman/listinfo/oauth>
>>>> 
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>> https://www.ietf.org/mailman/listinfo/oauth 
>>>> <https://www.ietf.org/mailman/listinfo/oauth>
>>> 
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth
> 

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to