> On Mar 28, 2022, at 8:28 AM, Denis <denis.i...@free.fr> wrote:

<snip>
>        The primary aim of DPoP is to bind a token to a public key upon 
> issuance and requiring that the client proves possession 
>        of the corresponding private key when using the token.  This does not 
> demonstrate that the client presenting the token is 
>        necessarily the legitimate client. In the case of non-collaborating 
> clients, DPoP prevents unauthorized or illegitimate parties 
>        from using leaked or stolen access tokens. In the case of 
> collaborating clients, the security of DPoP is ineffective 
>        (see section 11.X).
> 

<snip>
>             If a client agrees to collaborate with another client, the 
> security of DPoP is no longer effective.  When two clients agree to 
> collaborate, 
>             these results of the cryptographic computations performed by one 
> client may be communicated to another client. 
> 
> 
If a system has shared its tokens and/or credentials with another system, they 
are both operating as part of a single client. Neither DPoP nor OAuth define 
how two clients can share access, such as by applying scopes issued against the 
client with identifier “foo” to the client with id “bar”. 

From an AS or user perspective, multiple parties could collaborate beyond the 
expectations and limitations they intended the client to have. However, sharing 
across parties or underlying systems could be entirely within expectations - 
such as multiple services which together use information from the resource 
server to fulfill a request.

One could have text such as:

DPoP does not prevent sharing of data or access by a client with additional 
parties which are not authorized by the AS. In particular, a client may 
voluntarily share either private keys or constructed DPoP proofs.

But this is somewhat matter-of-factly stating that the AS should continue to 
have the same evaluation process of what parties should be given access as 
clients - that DPoP is not a DRM or DLP scheme.

<snip>
>             Even if the private key used for DPoP is stored in such a way 
> that it cannot be exported, e.g., in a hardware or software security module, 
>             the client can perform all the cryptographic computations needed 
> by the other client to create DPoP proofs. 
> 
This seems unneeded with the text above. In addition, DPoP does not define a 
way for an AS to ensure it only issues access tokens against PoP keys which are 
non-exportable.

-DW
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to