On Thu, Mar 18, 2021 at 3:45 AM Neil Madden <neil.mad...@forgerock.com>
wrote:

>
>
> On 18 Mar 2021, at 05:33, Andrii Deinega <andrii.dein...@gmail.com> wrote:
>
> 
> The Cache-Control header, even with its strongest directive "no-store", is
> pretty naive protection... Below is an excerpt from RFC 7234 (Hypertext
> Transfer Protocol: Caching).
>
> This directive is NOT a reliable or sufficient mechanism for ensuring
>> privacy.  In particular, malicious or compromised caches might not
>> recognize or obey this directive, and communications networks might be
>> vulnerable to eavesdropping.
>
>
> This quote is about privacy. Your concerns so far have been about replay
> protection. TLS protects both.
>
>
> Regarding TLS, I've mentioned that we don't always have the luxury to see
> what is going on with the infrastructure. A bright example would be an AS
> implemented as a serverless application and hosted by one of the cloud
> providers.
>
>
> Right, but (as I’ve said before) the same reasoning applies to a JWT too.
> The infrastructure could just as easily “terminate JWS” as it currently
> terminates TLS. As I keep saying, it’s much better to spend your time
> ensuring end-to-end TLS than end-to-end JWT.
>

That's not always possible. In some enterprises, they will have an
inspection middlebox that breaks the end-to-end TLS, e.g., ZScaler.

Regards,
 Rifaat




> We should try to avoid writing specs just to work around badly configured
> infrastructure.
>
> (The counterexample to this is IoT applications, where messages often have
> to traverse protocol-translating proxies. But that’s not the case here).
>
>
> As for,
>
> Right - so trying to solve this issue by replacing TLS with another
>> technology that is just as susceptible to the problem is not a real
>> solution.
>
>
> Following your logic, other RFCs such as 8555 (Automatic Certificate
> Management Environment) went the wrong way with their mandatory anti-replay
> built-in mechanism in quite similar circumstances.
>
> https://tools.ietf.org/html/rfc8555#section-6.5
>
>
> The only justification of the replay nonce given in RFC8555 is for
> protection of 0RTT early-data (which does not benefit from TLS’s normal
> replay protections). As to why a protocol that can typically tolerate
> latencies of several weeks (for cert renewal) needs 0RTT, you’ll have to
> ask the authors of that RFC. It makes little sense to me.
>
> — Neil
>
>
> ForgeRock values your Privacy <https://www.forgerock.com/your-privacy>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to