> On 18 Mar 2021, at 11:33, Rifaat Shekh-Yusef <rifaat.s.i...@gmail.com> wrote:
> 
> On Thu, Mar 18, 2021 at 3:45 AM Neil Madden <neil.mad...@forgerock.com 
> <mailto:neil.mad...@forgerock.com>> wrote:
> 
> 
>> On 18 Mar 2021, at 05:33, Andrii Deinega <andrii.dein...@gmail.com 
>> <mailto:andrii.dein...@gmail.com>> wrote:
>> 
>> 
>> The Cache-Control header, even with its strongest directive "no-store", is 
>> pretty naive protection... Below is an excerpt from RFC 7234 (Hypertext 
>> Transfer Protocol: Caching).
>> 
>> This directive is NOT a reliable or sufficient mechanism for ensuring 
>> privacy.  In particular, malicious or compromised caches might not recognize 
>> or obey this directive, and communications networks might be vulnerable to 
>> eavesdropping.
> 
> This quote is about privacy. Your concerns so far have been about replay 
> protection. TLS protects both. 
> 
>> 
>> Regarding TLS, I've mentioned that we don't always have the luxury to see 
>> what is going on with the infrastructure. A bright example would be an AS 
>> implemented as a serverless application and hosted by one of the cloud 
>> providers.
> 
> Right, but (as I’ve said before) the same reasoning applies to a JWT too. The 
> infrastructure could just as easily “terminate JWS” as it currently 
> terminates TLS. As I keep saying, it’s much better to spend your time 
> ensuring end-to-end TLS than end-to-end JWT. 
> 
> That's not always possible. In some enterprises, they will have an inspection 
> middlebox that breaks the end-to-end TLS, e.g., ZScaler.

And if you use encrypted JWTs to work around that you’ll soon have inspection 
middleboxes that break end-to-end JWT. This isn’t a game we can win by adding 
more layers of the same solution.

— Neil
-- 
ForgeRock values your Privacy <https://www.forgerock.com/your-privacy>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to