Great! Just drop me an email if you need support. > On 4. Sep 2020, at 15:07, Karsten Meyer zu Selhausen > <karsten.meyerzuselhau...@hackmanit.de> wrote: > > I am fairly new to this working group (and the IETF in general), so I will > probably need some guidance, but I would be happy to help better defining > mix-up preventions. I will start to work on an ID. > > Best regards, > Karsten > > On 29.08.2020 14:34, Torsten Lodderstedt wrote: >>> On 11. Aug 2020, at 08:20, Karsten Meyer zu Selhausen >>> <karsten.meyerzuselhau...@hackmanit.de> >>> wrote: >>> >>> Hi all, >>> >>> I think we all agree that proper countermeasures of mix-up attacks should >>> definitely be part of the BCP and 2.1 due to the severe impact successful >>> mix-up attacks have. >>> Theoretically speaking every client which supports multiple AS is >>> potentially vulnerable to mix-up attacks. While in practice it might seem >>> unlikely it is possible that one of the honest AS the client supports gets >>> compromised and can be utilized for a mix-up attack. >>> >>> In a previous thread of last November ( >>> https://mailarchive.ietf.org/arch/msg/oauth/A7F5xSEa8DdfxHKWHW3Mqol_a4A/ >>> ) I discussed why “use distinct redirect URIs for each AS” is not an >>> effective countermeasure against mix-up attacks (if dynamic client >>> registration is used). I would argue that this is especially important for >>> mobile applications, SPAs, and other native applications because it is very >>> common for them to use dynamic client registration. Many iOS applications >>> now must support multiple AS since Apple forces the support for “Sign in >>> with Apple” if any single sign-on provider is supported. This policy makes >>> mix-up attacks applicable. >>> >>> I fully agree with Daniel, Brian, and Mike that it is important to define >>> and register the “iss” parameter properly to ensure that both clients and >>> AS understand and use it in the correct way. I understand that OAuth 2.1 is >>> not meant to introduce and define new parameters but I strongly suggest >>> that the “iss” parameter should be introduced and defined elsewhere so that >>> it can be natively included in 2.1. In other words the “iss” parameter >>> should be integrated in 2.1 the same way PKCE is: the initial definition of >>> the parameter(s) is in another document (RFC 7636 in the case of PKCE) and >>> then included in 2.1. >>> >>> What do you think would be the best place to define and register the “iss” >>> parameter? Would it be worthwhile to reactivate and update >>> “draft-ietf-oauth-mix-up-mitigation”? >>> >> That’s a decision of the authors. Alternatively, a new small draft >> (referring to the BCP’s attack description) should do the job as well. Mind >> to write an ID? :-) >> >> >>> Best regards, >>> >>> Karsten >>> >>> >>> >>> On 18.06.2020 22:49, Mike Jones wrote: >>> >>>> I support documenting the use of the issuer to mitigate mix-up attacks. >>>> Note that while issuer was first defined by OpenID Connect, it became art >>>> of OAuth 2.0 in RFC 8414 - OAuth 2.0 Authorization Server Metadata. >>>> >>>> -- Mike >>>> >>>> From: OAuth >>>> <oauth-boun...@ietf.org> >>>> On Behalf Of Brian Campbell >>>> Sent: Thursday, June 18, 2020 1:32 PM >>>> To: Daniel Fett >>>> <f...@danielfett.de> >>>> >>>> Cc: oauth >>>> <oauth@ietf.org> >>>> >>>> Subject: [EXTERNAL] Re: [OAUTH-WG] Mix-Up Revisited >>>> >>>> In my (probably simplistic) understanding of things, the root underlying >>>> issue that allows for mix-up in its variations is the lack of anything >>>> identifying the AS in the authorization response. Following from that, >>>> introducing and using an `iss` authorization response parameter has always >>>> seemed like the most straightforward approach for mitigating the issue >>>> (which was part of the draft-ietf-oauth-mix-up-mitigation but other >>>> parameters were also included and, for reasons I'm not sure about, >>>> interest in that work faded in favor of telling clients to use per AS >>>> redirect URIs) . Though for the `iss` authorization response parameter to >>>> be effective, all parties involved need to know about it and act on it. So >>>> I think it'd need to be something more than a passing recommendation in >>>> the BCP. It should be defined, registered, explained, etc.. Actually >>>> introducing a new parameter is maybe going beyond the expected scope of >>>> the BCP (or 2.1). But maybe that's ok, if we're at least more intentional >>>> about it. >>>> >>>> On Sun, Jun 7, 2020 at 7:53 AM Daniel Fett >>>> <f...@danielfett.de> >>>> wrote: >>>> Hi all, >>>> I was wondering if we should move towards introducing and (more >>>> explicitly) recommending the iss parameter in the security BCP, for the >>>> reasons laid out below and in the article (which is now >>>> athttps://danielfett.de/2020/05/04/mix-up-revisited/). >>>> >>>> Any thoughts on this? >>>> >>>> -Daniel >>>> >>>> Am 04.05.20 um 19:34 schrieb Daniel Fett: >>>> Hi all, >>>> >>>> to make substantiated recommendations for FAPI 2.0, the security >>>> considerations for PAR, and the security BCP, I did another analysis on >>>> the threats that arise from mix-up attacks. I was interested in particular >>>> in two questions: >>>> >>>> • Does PAR help preventing mix-up attacks? >>>> • Do we need JARM to prevent mix-up attacks? >>>> I wrote down several attack variants and configurations in the following >>>> document: >>>> https://danielfett.github.io/notes/oauth/Mix-Up%20Revisited.html >>>> >>>> >>>> The key takeaways are: >>>> >>>> • The security BCP needs to make clear that per-AS redirect URIs are >>>> only sufficient if OAuth Metadata is not used to resolve multiple issuers. >>>> Otherwise, per-Issuer redirect URIs or the iss parameter MUST be used. >>>> • PAR-enabled authorization servers can protect the integrity better >>>> and protect against Mix-Up Attacks better if they ONLY accept PAR requests. >>>> • We should emphasize the importance of the iss parameter (or issuer) >>>> in the authorization response. Maybe introduce this parameter in the >>>> security BCP or another document? >>>> • Sender-constrained access tokens help against mix-up attacks when the >>>> access token is targeted. >>>> • Sender-constraining the authorization code (PAR + PAR-DPoP?) might be >>>> worth looking into. >>>> I would like to hear your thoughts! >>>> >>>> -Daniel >>>> >>>> >>>> _______________________________________________ >>>> OAuth mailing list >>>> >>>> OAuth@ietf.org >>>> https://www.ietf.org/mailman/listinfo/oauth >>>> >>>> >>>> >>>> _______________________________________________ >>>> OAuth mailing list >>>> >>>> OAuth@ietf.org >>>> https://www.ietf.org/mailman/listinfo/oauth >>>> >>>> >>>> CONFIDENTIALITY NOTICE: This email may contain confidential and privileged >>>> material for the sole use of the intended recipient(s). Any review, use, >>>> distribution or disclosure by others is strictly prohibited.. If you have >>>> received this communication in error, please notify the sender immediately >>>> by e-mail and delete the message and any file attachments from your >>>> computer. Thank you. >>>> >>>> >>>> _______________________________________________ >>>> OAuth mailing list >>>> >>>> >>>> OAuth@ietf.org >>>> https://www.ietf.org/mailman/listinfo/oauth >>> -- >>> Karsten Meyer zu Selhausen >>> IT Security Consultant >>> Phone: +49 (0)234 / 54456499 >>> Web: >>> >>> https://hackmanit.de >>> >>> | IT Security Consulting, Penetration Testing, Security Training >>> >>> Unsere nächste Live Online-Schulung zur Sicherheit von OAuth und OpenID >>> Connect am 24.09 + 25.09: >>> >>> >>> https://hackmanit.de/de/schulungen/109-live-online-schulung-single-sign-on-sicherheit-oauth-openid-connect-am-24-und-25-09-2020 >>> >>> >>> >>> Hackmanit GmbH >>> Universitätsstraße 60 (Exzenterhaus) >>> 44789 Bochum >>> >>> Registergericht: Amtsgericht Bochum, HRB 14896 >>> Geschäftsführer: Prof. Dr. Jörg Schwenk, Prof. Dr. Juraj Somorovsky, Dr. >>> Christian Mainka, Dr. Marcus Niemietz >>> >>> _______________________________________________ >>> OAuth mailing list >>> >>> OAuth@ietf.org >>> https://www.ietf.org/mailman/listinfo/oauth > -- > Karsten Meyer zu Selhausen > IT Security Consultant > Phone: +49 (0)234 / 54456499 > Web: > https://hackmanit.de > | IT Security Consulting, Penetration Testing, Security Training > > Unsere nächste Live Online-Schulung zur Sicherheit von OAuth und OpenID > Connect am 24.09 + 25.09: > > https://hackmanit.de/de/schulungen/109-live-online-schulung-single-sign-on-sicherheit-oauth-openid-connect-am-24-und-25-09-2020 > > > Hackmanit GmbH > Universitätsstraße 60 (Exzenterhaus) > 44789 Bochum > > Registergericht: Amtsgericht Bochum, HRB 14896 > Geschäftsführer: Prof. Dr. Jörg Schwenk, Prof. Dr. Juraj Somorovsky, Dr. > Christian Mainka, Dr. Marcus Niemietz >
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth