Comments on draft-hevroni-oauth-seamless-flow-01: This draft seems to be about making crypto signatures stateful so you have a better chance of detecting a cloned key as its state will diverge from the original. The link to a seamless OAuth flow seems tangential.
A more common way to make signatures stateful is to add a counter. A counter is more predictable to an attacker, but it also allows some recovery from an occasional outage that loses one signature (eg accept only the very next counter value, or be a bit lenient and accept a counter value as long as it doesn’t repeat or go backward). An attacker who clones a key can forge any number of signatures whenever they see 1 signature from the original user: just re-use the same “next” value (or send a bunch of signature where the last one re-uses the original “next” value). * “Each of those numbers can hold signed int, up to 64 bytes length” 64 bytes or 64 bits? If you are using integers in JSON you better stick to 53-bits, which the limit for exact integers in a 64-bit float [RFC7493 I-JSON<https://tools.ietf.org/html/rfc7493#section-2.2>]. But in this situation you should just use strings. All you are using is randomly chosen previous and next values that you can do equality matching on. * “client-id” You already have a key-id for the JWS signing key so I’m not sure what extra a client-id just for the prev/next state adds. * “previous”, “next”, “current”, “new” I think 4 labels are used for 2 quantities. * RFC2289 A One-Time Password System<https://tools.ietf.org/html/rfc2289> Are you actually using the referenced RFC2289 (that seems to use H(H(H(H(…H(password + challenge + stuff)…)))))? I don’t think so. I think you are using normal crypto signing keys, plus a random nonce. -- James Manger From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Omer Levi Hevroni Sent: Tuesday, 18 September 2018 5:40 AM To: oauth@ietf.org Subject: [OAUTH-WG] Presenting Seamless Flow at IETF 103 Hey My name is Omer, and I want to ask a time to present a draft I'm working on at IETF 103. This is a new oauth extension, that suppose to allows devices to authenticate without any user interaction. There are many use cases, especially in IoT world, where there are devices which need a strong authentication solution - but does not have an option for any kind of user interaction. This flow intends to allow them to achieve this. The current version of the draft can be found here: https://tools.ietf.org/html/draft-hevroni-oauth-seamless-flow-01. Feedback on the draft is highly appreciated. Thanks, Omer
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth