Howdy DW,

Thanks very much for your response! It's totally understandable that
the authorization server should ask for re-confirm if the
refresh_token is no longer valid, and it's also understandable that if
you're using implicit flow with only an access_token that you don't
need to ask for re-confirm every time.

However, I'm specifically interested in authorization code flow
situations where an authorization request is made despite the client
already having a valid grant. It's an atypical request for the client
to make, since they theoretically should already have valid
access/refresh_tokens, but when it does happen, what is the
authorization server supposed to do? Is it bad for them to
auto-redirect back with another authorization code without asking the
user to confirm again? Shouldn't they treat the authorization request
the same way they treat all other authorization requests (by asking
for user confirmation)?

It seems there are situations where this transparent redirect behavior
can be dangerous[1][2] or misleading[3].

[1]: Issuing a new authorization code without requiring confirmation
from the user is what allowed Github's HEAD exploit to be practical
because it allowed the client to exfiltrate the authorization code
without user interaction. Had Github always requested user to click
Allow, even though the user would have already granted access through
the HEAD exploit, the client wouldn't be able to obtain the
authorization code without user interaction. I understand that fixing
the HEAD exploit in the first place is the first and best solution,
but the lack of user interaction is what elevated this exploit from
high to critical.

[2]: For users that have multiple accounts with a client (e.g.
personal, anonymous, work, etc.), if an authorization server
auto-redirects for repeated authorization requests, once that user
connects one account via OAuth to the client, the client can then
attempt authorization requests for other accounts and see which ones
get auto-redirect back. This can, without user interaction,
potentially de-anonymize or map different accounts on the client to
the same user that the user didn't necessarily want to be mapped.

[3]: Privacy regulations are adding more and more for users to
"opt-in" to various types of data access or data sharing, and
sometimes consent requirements for the client don't line up with the
expiration/revocation timelines of the authorization server (e.g.
clients may be required to get an opt-in annually, even if the
authorization server grant never expires). Clients are assuming that
using the redirect back with an authorization code is proof of consent
for their privacy compliance records (it is called Open Authorization,
after all). However, with transparent redirects in the authorization
code flow, this isn't necessarily true and you can no longer rely on
OAuth as a valid mechanism for proving user consent.

I realize that it's open to the authorization server to issue
authorization codes how they see fit. It just strikes me as odd that
there's not a lot of guidance around when transparent redirects are
safe, when user interaction should occur, and the risks and
implications of both behaviors.

Daniel Roesler
Co-founder & CTO, UtilityAPI
dan...@utilityapi.com
On Fri, Nov 8, 2019 at 2:02 PM David Waite <da...@alkaline-solutions.com> wrote:
>
> Hello Daniel!
>
> > 1. The client makes an ajax HEAD request to the OAuth authorization
> > endpoint, which will silently create the authorization grant (this was
> > the security exploit that was patched).
>
> > Anyway, I'm trying to find guidance on transparent redirects for
> > authorization code grants. There's a whole host of both security and
> > application logic issues that could come up from such behavior, so I'd
> > like to ask for clarification in best practices.
>
> OAuth does not provide a way to recover from an expired access token barring 
> a refresh token, which also can be invalidated. In particular, the only front 
> channel ‘continuation’ parameter I know of is ‘id_token_hint’ in OIDC.
>
> There are deployments today (admittedly mostly using implicit flow) which do 
> not have refresh tokens. A mandate that you SHOULD ask for re-consent would 
> be a recommendation that they have to interrupt the user periodically to 
> continue access - which would just create another security vs usability 
> decision.
>
> Per your point above, the actual security issue was that GitHub 1) had the 
> authorization endpoint serve double-duty and 2) treated HEAD requests as a 
> quasi GET/POST to create a grant in their database to the client without user 
> confirmation. The solution for this is not to ask the user to re-confirm on 
> every request..
>
> That said, it does make sense for some deployments to periodically invalidate 
> a refresh token, even for the purpose of bringing the user back to re-consent 
> permissions (aka self-audit). An application could theoretically distinguish 
> from tokens granted by the protected user needing to be invalidated to drive 
> the user to re-consent, and operationally granted tokens which are assumed to 
> be actively managed and not tied to any user account.
>
> -DW
>
> > On Nov 8, 2019, at 5:49 AM, Daniel Roesler 
> > <daniel=40utilityapi....@dmarc.ietf.org> wrote:
> >
> > Howdy,
> >
> > In the "3.1 Protecting Redirect-Based Flows" > "3.1.1. Authorization
> > Code Grant" section, is there guidance on when it is appropriate (if
> > ever) to automatically generate a new authorization code and redirect
> > back to the client?
> >
> > A recent exploit[1] on Github's OAuth implementation was practical
> > because if you make an authorization request and the resource owner is
> > already authenticated and the scope is already authorized, Github will
> > silently generate a new authorization code and redirect the user back
> > to the redirect_uri without asking them to click "Authorize" again.
> >
> > How the exploit worked:
> >
> >
> > 2. However, since the ajax response was blocked via CORS, the client
> > couldn't receive the authorization code in the response parameters.
> >
> > 3. So, the client then redirected the user to Github's authorization
> > endpoint with the same authorization code request (only this time as a
> > real GET redirect).
> >
> > 4. Github instantly redirected the user back to the client's
> > redirect_uri with a new authorization code and without asking for any
> > user interaction.
> >
> > It seems strange to me that OAuth should allow for transparent
> > authorization code redirects without resource owner confirmation. This
> > situation only comes up when something weird is happening, such as
> > when a client loses their valid access|refresh_token, but isn't that
> > all the more reason to clarify that you should always ask for resource
> > owner confirmation of the scope, even in scenarios where you are just
> > re-authorizing the same scope as before?
> >
> > Had Github asked for confirmation on step 4 above, the practicality of
> > the HEAD exploit would have been reduced because the user would have
> > been presented with an unexpected Allow/Deny Github OAuth dialogue,
> > possibly alerting them to the fact that something strange was going
> > on.
> >
> >
> > [1]: https://blog.teddykatz.com/2019/11/05/github-oauth-bypass.html
> >
> > Daniel Roesler
> > Co-founder & CTO, UtilityAPI
> > dan...@utilityapi.com
> >
> >
> >
> > On Wed, Nov 6, 2019 at 2:27 AM Hannes Tschofenig
> > <hannes.tschofe...@arm.com> wrote:
> >>
> >> Hi all,
> >>
> >> this is a working group last call for "OAuth 2.0 Security Best Current 
> >> Practice".
> >>
> >> Here is the document:
> >> https://tools.ietf.org/html/draft-ietf-oauth-security-topics-13
> >>
> >> Please send you comments to the OAuth mailing list by Nov. 27, 2019.
> >> (We use a three week WGLC because of the IETF meeting.)
> >>
> >> Ciao
> >> Hannes & Rifaat
> >>
> >> IMPORTANT NOTICE: The contents of this email and any attachments are 
> >> confidential and may also be privileged. If you are not the intended 
> >> recipient, please notify the sender immediately and do not disclose the 
> >> contents to any other person, use it for any purpose, or store or copy the 
> >> information in any medium. Thank you.
> >>
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to