+1 to Brian -1 to the proposed text from Denis
> On Dec 8, 2017, at 8:48 PM, Brian Campbell <bcampb...@pingidentity.com> wrote: > > The privacy matter is already mentioned. Despite your many messages to this > WG and others about the so called ABC attack, I do not believe it warrants > treatment in this document or others. And your continued proposals to have it > included in documents have not gotten support. > > On Fri, Dec 8, 2017 at 2:46 PM, Denis <denis.i...@free.fr > <mailto:denis.i...@free.fr>> wrote: > RFC 3552 (Guidelines for Writing RFC Text on Security Considerations) states: > > All RFCs are required by RFC 2223 to contain a Security > Considerations section. The purpose of this is both to encourage > document authors to consider security in their designs and to inform > the reader of relevant security issues. This memo is intended to > provide guidance to RFC authors in service of both ends. > > Section 5 (Writing Security Considerations Sections) of RFC 3552 states: > > While it is not a requirement that any given protocol or system be > immune to all forms of attack, it is still necessary for authors to > consider as many forms as possible. Part of the purpose of the > Security Considerations section is to explain what attacks are out of > scope and what countermeasures can be applied to defend against them > > There should be a clear description of the kinds of threats on the > described protocol or technology. > > It is important to mention the threat related to collusion attacks. A > different wording could be used, > but the threat should be mentioned one way or another. > > RFC 6973 (Privacy Considerations for Internet Protocols) intends to provide a > similar set of guidelines > for considering privacy in protocol design. > > It is important to mention a current threat related to privacy. A different > wording could be used, > e.g. using the word "surveillance" as mentioned in 5.1.1 : "Surveillance is > the observation or monitoring > of an individual’s communications or activities", but the threat should be > mentioned one way or another. > > Denis > >> I believe the text would detract from the document. >> From: OAuth <oauth-boun...@ietf.org> <mailto:oauth-boun...@ietf.org> on >> behalf of Brian Campbell <bcampb...@pingidentity.com> >> <mailto:bcampb...@pingidentity.com> >> Sent: Friday, December 8, 2017 3:47:32 PM >> To: Denis >> Cc: oauth >> Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-token-exchange-10.txt >> >> As an individual, I do not believe that the proposed text should be >> incorporated into the draft. >> >> As one of the document editors, my responsibility is for the document to be >> of reasonable quality and to reflect the rough consensus of this Working >> Group. So I should ask the list more explicitly - are there other WG >> remembers who are in favor of the proposed text here (the text would have to >> be fixed up some too)? >> >> On Fri, Dec 1, 2017 at 11:12 AM, Denis <denis.i...@free.fr >> <mailto:denis.i...@free.fr>> wrote: >> Comments on draft-ietf-oauth-token-exchange-10 >> >> I propose the following rephrasing for sections 6 and 7: >> >> 6 . Security Considerations >> >> All of the normal security issues that are discussed in [JWT],especially in >> relationship to comparing URIs >> and dealing with unrecognized values, also apply here. In addition, both >> delegation and impersonation introduce >> unique security issues. Any time one user receives a token, the potential >> for abuse is a concern, >> since that user might be willing to collude with another user so that other >> user could use the token. >> >> Techniques like the binding of an access token to a TLS channel described >> elsewhere are ineffective since >> the legitimate user would be able to perform all the cryptographic >> computations that the other user would need >> to demonstrate the ownership of the token. The use of the "scp" claim is >> suggested to mitigate potential for >> such abuse, as it restricts the contexts in which the token can be >> exercised. If the issued access token scope >> allows to unambiguously identify the user, then that user is likely to be >> reluctant to collude with another user. >> However, if the issued access token scope only indicates that the user is >> over 18, then there is no risk >> for the original user to be discovered and in such a context a collusion may >> easily take place. >> This document does not specify techniques to prevent such a collusion to be >> successful. >> >> 7 . Privacy Considerations >> >> Tokens typically carry personal information and their usage in Token >> Exchange may reveal details of the target services >> being accessed. The resource and the audience parameters allow authorization >> servers to know where the issued access token >> will be used. This may be a privacy concern for some users. This document >> does not specify techniques to prevent >> authorization servers to know where the access tokens they issue will be >> used. >> >> Denis >>> A New Internet-Draft is available from the on-line Internet-Drafts >>> directories. >>> This draft is a work item of the Web Authorization Protocol WG of the IETF. >>> >>> Title : OAuth 2.0 Token Exchange >>> Authors : Michael B. Jones >>> Anthony Nadalin >>> Brian Campbell >>> John Bradley >>> Chuck Mortimore >>> Filename : draft-ietf-oauth-token-exchange-10.txt >>> Pages : 32 >>> Date : 2017-11-30 >>> >>> Abstract: >>> This specification defines a protocol for an HTTP- and JSON- based >>> Security Token Service (STS) by defining how to request and obtain >>> security tokens from OAuth 2.0 authorization servers, including >>> security tokens employing impersonation and delegation. >>> >>> >>> The IETF datatracker status page for this draft is: >>> https://datatracker.ietf.org/doc/draft-ietf-oauth-token-exchange/ >>> <https://datatracker.ietf.org/doc/draft-ietf-oauth-token-exchange/> >>> >>> There are also htmlized versions available at: >>> https://tools.ietf.org/html/draft-ietf-oauth-token-exchange-10 >>> <https://tools.ietf.org/html/draft-ietf-oauth-token-exchange-10> >>> https://datatracker.ietf.org/doc/html/draft-ietf-oauth-token-exchange-10 >>> <https://datatracker.ietf.org/doc/html/draft-ietf-oauth-token-exchange-10> >>> >>> A diff from the previous version is available at: >>> https://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-token-exchange-10 >>> <https://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-token-exchange-10> >>> >>> >>> Please note that it may take a couple of minutes from the time of submission >>> until the htmlized version and diff are available at tools.ietf.org >>> <http://tools.ietf.org/>. >>> >>> Internet-Drafts are also available by anonymous FTP at: >>> ftp://ftp.ietf.org/internet-drafts/ <ftp://ftp.ietf.org/internet-drafts/> >>> >>> _______________________________________________ >>> OAuth mailing list >>> OAuth@ietf.org <mailto:OAuth@ietf.org> >>> https://www.ietf.org/mailman/listinfo/oauth >>> <https://www.ietf.org/mailman/listinfo/oauth> >> >> >> _______________________________________________ >> OAuth mailing list >> OAuth@ietf.org <mailto:OAuth@ietf.org> >> https://www.ietf.org/mailman/listinfo/oauth >> <https://www.ietf.org/mailman/listinfo/oauth> >> >> >> >> CONFIDENTIALITY NOTICE: This email may contain confidential and privileged >> material for the sole use of the intended recipient(s). Any review, use, >> distribution or disclosure by others is strictly prohibited. If you have >> received this communication in error, please notify the sender immediately >> by e-mail and delete the message and any file attachments from your >> computer. Thank you. > > > > CONFIDENTIALITY NOTICE: This email may contain confidential and privileged > material for the sole use of the intended recipient(s). Any review, use, > distribution or disclosure by others is strictly prohibited. If you have > received this communication in error, please notify the sender immediately by > e-mail and delete the message and any file attachments from your computer. > Thank you._______________________________________________ > OAuth mailing list > OAuth@ietf.org <mailto:OAuth@ietf.org> > https://www.ietf.org/mailman/listinfo/oauth > <https://www.ietf.org/mailman/listinfo/oauth>
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth