And what about code injection and open redirectors? I think we already have a lot of deployment experience that should be used to evolve the spec.
Sent by MailWise – See your emails as clean, short chats. -------- Originalnachricht -------- Betreff: Re: [OAUTH-WG] OAuth 2.1 Von: "Phil Hunt (IDM)" <phil.h...@oracle.com> An: Mike Jones <michael.jo...@microsoft.com> Cc: Torsten Lodderstedt <tors...@lodderstedt.net>,oauth@ietf.org >I believe all we need is a new draft that deals with the new "dynamic/mix-up" >cases as these were not considered in the original spec process. > >The updated by method works best for this. It also consolidates a lot of >piecemeal specs into one consistent spec. > >Phil > >> On Apr 7, 2016, at 15:25, Mike Jones <michael.jo...@microsoft.com> wrote: >> >> Yes - an intentionally conservative, implementation- and experience-driven >> path. >> >> Revising OAuth 2.0 is a *big deal*. We shouldn't even be talking about it >> until we've completed steps 1-5 below - *including* the "iterate" step, as >> necessary. If we get this wrong, we'll fragment OAuth, which is a terrible >> and irresponsible outcome we should consciously avoid at all costs. >> >> In particular, we should not recharter for an OAuth 2.1 until we already >> know what will be in it and know from deployment experience that it's the >> right stuff. >> >> -- Mike >> >> -----Original Message----- >> From: Torsten Lodderstedt [mailto:tors...@lodderstedt.net] >> Sent: Thursday, April 7, 2016 3:16 PM >> To: Mike Jones <michael.jo...@microsoft.com> >> Cc: Samuel Erdtman <sam...@erdtman.se>; Anthony Nadalin >> <tony...@microsoft.com>; oauth@ietf.org >> Subject: Re: [OAUTH-WG] OAuth 2.1 >> >> Hi Mike, >> >> in my opinion, you described a possible path towards 2.1. Would you agree? >> >> best regards, >> Torsten. >> >>> Am 07.04.2016 um 13:38 schrieb Mike Jones <michael.jo...@microsoft.com>: >>> >>> I am strongly against creating a 2.1 spec until we have at least a year of >>> deployment experience with the contents we're adding to 2.0, so as not to >>> fragment the OAuth marketplace. >>> >>> I think we should: >>> 1. Continue working on new security mitigations in new drafts (such >>> as mix-up-mitigation, etc.) that add features to use with 2.0 2. >>> Continue working on PoP specs (such as pop-key-distribution, etc.) >>> that add features to use with 2.0 3. Continue working on other new >>> specs (such as discovery, resource-indicators, etc.) that add features >>> to use with 2.0 4. Learn from deployment experience with all of them >>> 5. Iterate if the deployment experience tells us that we need to >>> >>> Only after we believe we have all the features right and we know that they >>> work together well should we consider creating a 2.1. If we rush to a 2.1 >>> and get it wrong, we'll lose developers' trust and we'll never get it back. >>> >>> -- Mike >>> >>> -----Original Message----- >>> From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Samuel >>> Erdtman >>> Sent: Thursday, April 7, 2016 12:48 PM >>> To: Anthony Nadalin <tony...@microsoft.com> >>> Cc: oauth@ietf.org >>> Subject: Re: [OAUTH-WG] OAuth 2.1 >>> >>> +1 on a 2.1 version >>> >>> -1 on defining scopes more precisely in 2.1 >>> >>> Sent from my iPhone >>> >>>> On 7 apr. 2016, at 14:46, Anthony Nadalin <tony...@microsoft.com> wrote: >>>> >>>> I don't belive that scopes should be defined more precisely as this >>>> opaqueness was a design feature, I'm not seeing the reason why scopes need >>>> to be defined, as these are application specific. >>>> >>>> -----Original Message----- >>>> From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Torsten >>>> Lodderstedt >>>> Sent: Thursday, April 7, 2016 5:32 AM >>>> To: George Fletcher <gffle...@aol.com> >>>> Cc: oauth@ietf.org >>>> Subject: Re: [OAUTH-WG] OAuth 2.1 >>>> >>>> Hi all, >>>> >>>> as I already said in the meeting: I would very much prefer to have an >>>> extension/update of RFC 6819 covering all "new" threats, including: >>>> - mix up >>>> - code injection aka copy and paste >>>> - open redirector at AS and client >>>> - potential other threats in the context of "dynamic" OAuth >>>> >>>> I also assume mitigations for (at least some of) the threats need to go >>>> into an update of RFC 6749 as normative text. To give an example: if we >>>> agree on using the state parameter at the token endpoint to mitigate code >>>> injection, this MUST be part of the core spec (request description and >>>> security consoderations). Otherwise, noone will even consider it. >>>> >>>> We should also use the opportunity to improve/enhance the text of the >>>> spec. In the course of the last years, we have learned a lot about >>>> ambiquities of the text and how different implementations utilize OAuth. >>>> >>>> I think time is right to define scopes more precisely. As the discussions >>>> in the last days proved again (at least for me), scope is not sufficiently >>>> defined to come up with interoperable implementations. Additionally, there >>>> seems to be a need to represent resource server locations (to not say >>>> identities :-)) in this context. >>>> >>>> To bundle all changes in a version 2.1 would also make communication into >>>> the market much easier. >>>> >>>> best regards, >>>> Torsten. >>>> >>>>> Am 06.04.2016 um 16:05 schrieb George Fletcher <gffle...@aol.com>: >>>>> >>>>> I'd definitely prefer a single solution document to many little ones that >>>>> have to be combined to actually build a secure solution. It's already >>>>> getting complex with the additional specs that have been added. >>>>> >>>>> Additionally, I'm not against working on OAuth 2.1. >>>>> >>>>> Thanks, >>>>> George >>>>> >>>>>> On 4/6/16 2:06 PM, Phil Hunt (IDM) wrote: >>>>>> >>>>>> Existing implementations are for the large part ok and do not need these >>>>>> mitigations. >>>>>> >>>>>> Only the new use cases we have been discussing (configure on the fly and >>>>>> multi-as, etc) really need mitigation. >>>>>> >>>>>> The updated by approach seems like a good way to address the new cases. >>>>>> >>>>>> Phil >>>>>> >>>>>>> On Apr 6, 2016, at 14:35, Hannes Tschofenig <hannes.tschofe...@gmx.net> >>>>>>> wrote: >>>>>>> >>>>>>> Hi all, >>>>>>> >>>>>>> today we discussed the OAuth Authorization Server Mixup draft. We >>>>>>> were wondering what types of threats the document should find solutions >>>>>>> for. >>>>>>> >>>>>>> We discussed various document handling approaches including >>>>>>> * OAuth Mix-Up and Cut-and-Paste attacks documented in separate >>>>>>> solution documents >>>>>>> * combined solution document covering the OAuth Mix-Up and the >>>>>>> Cut-and-Paste attacks. >>>>>>> >>>>>>> Barry pointed out that these documents could update the OAuth base >>>>>>> specification. >>>>>>> >>>>>>> As a more radical change it was also suggested to revise RFC 6749 >>>>>>> "OAuth >>>>>>> 2.0 Authorization Framework" and RFC 6819 "OAuth 2.0 Threat Model >>>>>>> and Security Considerations". >>>>>>> >>>>>>> Opening up the OAuth base specification obviously raises various >>>>>>> other questions about cleaning up parts that go far beyond the AS >>>>>>> mix-up and the cut-and-paste attacks. Other specifications, such >>>>>>> as the Open Redirector, could be folded into such a new specification. >>>>>>> >>>>>>> Derek and I would appreciate your input on this topic before we >>>>>>> make a decision since it has significant impact on our work. >>>>>>> >>>>>>> Ciao >>>>>>> Hannes & Derek >>>>>>> >>>>>>> >>>>>>> _______________________________________________ >>>>>>> OAuth mailing list >>>>>>> OAuth@ietf.org >>>>>>> https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2fw >>>>>>> w >>>>>>> w >>>>>>> .ietf.org%2fmailman%2flistinfo%2foauth&data=01%7c01%7ctonynad%40mi >>>>>>> c >>>>>>> r >>>>>>> osoft.com%7cce8c942bed81437aca0408d35ee0be21%7c72f988bf86f141af91a >>>>>>> b >>>>>>> 2 >>>>>>> d7cd011db47%7c1&sdata=BqcE9eDhm8pgdoitrPFufouxS6qYndnkLgLa5SPk2HI% >>>>>>> 3 >>>>>>> d >>>>>> _______________________________________________ >>>>>> OAuth mailing list >>>>>> OAuth@ietf.org >>>>>> https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2fwww. >>>>>> ietf.org%2fmailman%2flistinfo%2foauth&data=01%7c01%7ctonynad%40micr >>>>>> o >>>>>> s >>>>>> oft.com%7cce8c942bed81437aca0408d35ee0be21%7c72f988bf86f141af91ab2d >>>>>> 7 c >>>>>> d011db47%7c1&sdata=BqcE9eDhm8pgdoitrPFufouxS6qYndnkLgLa5SPk2HI%3d >>>>> >>>>> _______________________________________________ >>>>> OAuth mailing list >>>>> OAuth@ietf.org >>>>> https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2fwww. >>>>> i >>>>> etf.org%2fmailman%2flistinfo%2foauth&data=01%7c01%7ctonynad%40micros >>>>> o >>>>> f >>>>> t.com%7cce8c942bed81437aca0408d35ee0be21%7c72f988bf86f141af91ab2d7cd >>>>> 0 >>>>> 1 1db47%7c1&sdata=BqcE9eDhm8pgdoitrPFufouxS6qYndnkLgLa5SPk2HI%3d >>>> >>>> _______________________________________________ >>>> OAuth mailing list >>>> OAuth@ietf.org >>>> https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2fwww. >>>> i >>>> etf.org%2fmailman%2flistinfo%2foauth&data=01%7c01%7ctonynad%40microso >>>> f >>>> t.com%7cce8c942bed81437aca0408d35ee0be21%7c72f988bf86f141af91ab2d7cd0 >>>> 1 1db47%7c1&sdata=BqcE9eDhm8pgdoitrPFufouxS6qYndnkLgLa5SPk2HI%3d >>>> >>>> _______________________________________________ >>>> OAuth mailing list >>>> OAuth@ietf.org >>>> https://www.ietf.org/mailman/listinfo/oauth >>> >>> _______________________________________________ >>> OAuth mailing list >>> OAuth@ietf.org >>> https://www.ietf.org/mailman/listinfo/oauth >>> >>> _______________________________________________ >>> OAuth mailing list >>> OAuth@ietf.org >>> https://www.ietf.org/mailman/listinfo/oauth >> >> _______________________________________________ >> OAuth mailing list >> OAuth@ietf.org >> https://www.ietf.org/mailman/listinfo/oauth >
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth