Additional confirmation methods can be easily defined outside of this draft. 
That said, I think those two in particular are pretty straightforward to add 
(well-known algorithms that are widely available) so it might make sense to 
just toss them in now? I think it’s fine either way.

 — Justin

> On Apr 19, 2018, at 12:23 PM, Brian Campbell <bcampb...@pingidentity.com> 
> wrote:
> 
> Okay, so I retract the idea of metadata indicating the hash alg/cnf method 
> (based on John pointing out that it doesn't really make sense). 
> 
> That still leaves the question of whether or not to define additional 
> confirmation methods in this document (and if so, what they would be though 
> x5t#S384 and x5t#S512 seem the most likely). 
> 
> There's some reasonable rational for both adding one or two new hash alg 
> confirmation methods in the doc now vs. sticking with just SHA256 for now. 
> I'll note again that the doc doesn't preclude using or later defining other 
> confirmation methods.
> 
> I'm kind of on the fence about it, to be honest. But that doesn't really 
> matter because the draft should reflect rough WG consensus. So I'm looking to 
> get a rough gauge of rough consensus. At this point there's one comment out 
> of WGLC asking for additional confirmation method(s). I don't think that 
> makes for consensus. But I'd ask others from the WG to chime in, if 
> appropriate, to help me better gauge consensus. 
> 
> On Fri, Apr 13, 2018 at 4:49 AM, Neil Madden <neil.mad...@forgerock.com 
> <mailto:neil.mad...@forgerock.com>> wrote:
> I’m not particularly wedded to SHA-512, just that it should be possible to 
> use something else. At the moment, the draft seems pretty wedded to SHA-256. 
> SHA-512 may be overkill, but it is fast (faster than SHA-256 on many 64-bit 
> machines) and provides a very wide security margin against any future crypto 
> advances (quantum or otherwise). I’d also be happy with SHA-384, SHA3-512, 
> Blake2 etc but SHA-512 seems pretty widely available. 
> 
> I don’t think short-lived access tokens is a help if the likelihood is that 
> certs will be reused for many access tokens. 
> 
> Public Web PKI certs tend to only use SHA-256 as it has broad support, and I 
> gather there were some compatibility issues with SHA-512 certs in TLS. There 
> are a handful of SHA-384 certs - e.g., the Comodo CA certs for 
> https://home.cern/ <https://home.cern/> are signed with SHA-384 (although 
> with RSA-2048, which NSA estimates at only ~112-bit security). SHA-512 is 
> used on some internal networks where there is more control over components 
> being used, which is also where people are mostly likely to care about 
> security beyond 128-bit level (eg government internal networks). 
> 
> By the way, I just mentioned quantum attacks as an example of something that 
> might weaken the hash in future. Obviously, quantum attacks completely 
> destroy RSA, ECDSA etc, so SHA-512 would not solve this on its own, but it 
> provides a considerable margin to hedge against future quantum *or classical* 
> advances while allowing the paranoid to pick a stronger security level now.. 
> We have customers that ask for 256-bit AES already.
> 
> (I also misremembered the quantum attack - “Serious Cryptography” by Aumasson 
> tells me the best known quantum attack against collision resistance is 
> O(2^n/3) - so ~2^85 for SHA-256 but also needs O(2^85) space so is 
> impractical. I don’t know if that is the last word though).  
> 
> As for SHA-1, doesn’t that prove the point? SHA-1 is pretty broken now with 
> practical collisions having been demonstrated. The kind of attacks on CA 
> certs demonstrated for MD5 [1] are probably not too far off for SHA-1 now. As 
> far as I am aware, we’re nowhere near those kinds of attacks on SHA-256, but 
> I’d prefer that there was a backup plan in place already rather than waiting 
> to see (and waiting for everyone to have hard-coded SHA-256 everywhere).
> 
> Now I have to get back to my daughter’s birthday party… :-)
> 
> [1] http://www.win.tue.nl/hashclash/rogue-ca/ 
> <http://www.win.tue.nl/hashclash/rogue-ca/>
> 
> Neil
> 
> 
> On Thursday, Apr 12, 2018 at 10:07 pm, John Bradley <ve7...@ve7jtb.com 
> <mailto:ve7...@ve7jtb.com>> wrote:
> The WG discusses RS meta-data as part of one of Dick’s proposals.   I am 
> unclear on who is going to work on it in what draft.
> 
> If the client is doing mtls to both the Token endpoint and RS the information 
> in the confirmation method is not relevant to the client as long as the AS 
> and RS are in agreement like with most tokens.
> 
> The hash on the certificate and length of the signing key are equally or more 
> vulnerable to any sort of attack.
> At least with AT the tokens are not long lived.
> 
> Doing anything better than SHA256 only makes sense if the cert is signed by 
> something stronger like SHA512 with a 2048bit RSA key.   That seems sort of 
> unlikely in the near term.  
> 
> I prefer to wait to see what general fix is proposed before we jump the gun 
> with a bandade for a small part of the overall problem.
> 
> People are typically using SHA1 fingerprints.  We added SHA256 for JWT and 
> got push back on that as overkill. 
> I don’t think this is the correct place to be deciding this.   
> 
> We could say that if new thumbprints are defined the AS and RS can decide to 
> use them as necessary.
> That is sort of the situation we have now.
> 
> The correct solution may be a thousand rounds of PBKDF2 or something like 
> that to make finding collisions more difficult rather than longer hashes.
> 
> John B.
> 
> > On Apr 12, 2018, at 5:20 PM, Brian Campbell <bcampb...@pingidentity.com 
> > <mailto:bcampb...@pingidentity.com>> wrote:
> > 
> > That's true about it being opaque to the client. I was thinking of client 
> > metadata (config or registration) as a way for the AS to decide if to bind 
> > the AT to a cert. And moving from a boolean to a conf method as an 
> > extension of that. It would be more meaningful in RS discovery, if there 
> > was such a thing.
> > 
> > I don’t know that SHA512 would be the best choice either but it is 
> > something that is stronger and could be included now. If there's consensus 
> > to do more than SHA256 in this doc.  
> > 
> > 
> > 
> > On Thu, Apr 12, 2018 at 1:52 PM, John Bradley <ve7...@ve7jtb.com 
> > <mailto:ve7...@ve7jtb.com>> wrote:
> > Inline
> > 
> > Snip
> > 
> >> 
> >> 
> >> 12. The use of only SHA-256 fingerprints means that the security strength 
> >> of the sender-constrained access tokens is limited by the collision 
> >> resistance of SHA-256 - roughly “128-bit security" - without a new 
> >> specification for a new thumbprint algorithm. An implication of this is 
> >> that is is fairly pointless for the protected resource TLS stack to ever 
> >> negotiate cipher suites/keys with a higher level of security. In more 
> >> crystal ball territory, if a practical quantum computer becomes a 
> >> possibility within the lifetime of this spec, then the expected collision 
> >> resistance of SHA-256 would drop quadratically, allowing an attacker to 
> >> find a colliding certificate in ~2^64 effort. If we are going to pick just 
> >> one thumbprint hash algorithm, I would prefer we pick SHA-512.
> >> 
> >> The idea behind haveing just one thumbprint hash algorithm was to keep 
> >> things simple. And SHA-256 seems good enough for the reasonably 
> >> foreseeable future (and space aware). Also a new little spec to register a 
> >> different hash algorithm, should the need arise, didn't seem particularity 
> >> onerous. 
> >> 
> >> That was the thinking anyway. Maybe it is too short sighted though?
> >> 
> >> I do think SHA-256 should stay regardless. 
> >> 
> >> But the draft could also define SHA-512 (and maybe others). What do you 
> >> and WG folks think about that?
> >> 
> >> *** Yes please. 
> >> 
> >> It would probably then be useful for the metadata in §3.3 and §3.4 to 
> >> change from just boolean values to something to convey what hash alg/cnf 
> >> method the client expects and the list of what the server supports. That's 
> >> maybe something that should be done anyway. That'd be a breaking change to 
> >> the metadata. But there's already another potential breaking change 
> >> identified earlier in this message. So maybe it's worth doing...
> >> 
> >> How do folks feel about making this kind of change? 
> >> 
> >> 
> > The confirmation method is opaque to the client.  I don’t think adding hash 
> > algs to discovery will really help.
> > The AS selection needs to be based on what the RS can support.
> > 
> > If anyplace it should be in RS discovery. 
> > 
> > As a practical matter you art going to find a client certificate with more 
> > than a SHA256 hash anytime in the near future. 
> > So for a short lived access token 128bits of collision resistance is quite 
> > good.   We are going to have issues with certificates long before this 
> > becomes a problem.
> > 
> > SHA256 is appropriate for AES128 256bit elliptic curves and 3072bit RSA 
> > keys, but again that is over the long term.  
> > We are using short lived access tokens.  People should rotate the 
> > certificate more often than once a year if this is a real issue.
> > 
> > I am not against new hash for the fingerprint, but I also don’t know that 
> > SHA512 would be the best choice if we are concerned about quantum crypto 
> > resistance.   That is a issue beyond mtls and should be addressed by CFRG 
> > etc.
> > 
> > Regards
> > John B.
> > 
> > 
> > 
> > 
> > CONFIDENTIALITY NOTICE: This email may contain confidential and privileged 
> > material for the sole use of the intended recipient(s). Any review, use, 
> > distribution or disclosure by others is strictly prohibited.  If you have 
> > received this communication in error, please notify the sender immediately 
> > by e-mail and delete the message and any file attachments from your 
> > computer. Thank you.
> 
> 
> 
> CONFIDENTIALITY NOTICE: This email may contain confidential and privileged 
> material for the sole use of the intended recipient(s). Any review, use, 
> distribution or disclosure by others is strictly prohibited..  If you have 
> received this communication in error, please notify the sender immediately by 
> e-mail and delete the message and any file attachments from your computer. 
> Thank you._______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth 
> <https://www.ietf.org/mailman/listinfo/oauth>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to