Hi all,
thanks for the discussion here! We'll add in the security considerations
the following clarification:

 “As this specification provides a mechanism for the RS to trigger user
interaction, it’s important for clients and AS to consider that a malicious
RS might abuse of that feature”

Valery, does this address your concern?

On Thu, Mar 2, 2023 at 4:13 AM Uri Blumenthal <u...@mit.edu> wrote:

> *This message originated outside your organization.*
>
> ------------------------------
>
> > Surely "rogue" resource servers already have a lot of ways they can
> annoy their own users? Is this a realistic threat?
>
> Yes, this is a realistic threat, and I'm aware of at least one example of
> it actually being used (successfully!) to penetrate a corporate network.
>
>
> On Mar 2, 2023, at 07:07, Valery Smyslov <val...@smyslov.net> wrote:
>
> 
>
> Hi Neil,
>
>
>
> Surely "rogue" resource servers already have a lot of ways they can annoy
> their own users?
>
>
>
>           I agree.
>
>
>
> Is this a realistic threat?
>
>
>
>           I don’t know. Probably not. But I see that this protocol adds
> one more
>
>           possibility for “rogue” resource servers to misbehave.
>
>           I think it’s worth to document this possibility (even if it is a
> minor threat).
>
>
>
>           Regards,
>
>           Valery.
>
>
>
>
>
> -- Neil
>
>
>
> On 2 Mar 2023, at 08:23, Valery Smyslov <val...@smyslov.net> wrote:
>
>
>
> Thank you for pointing to the deployment consideration section, I re-read
> it :-)
>
> This section is mostly concerned with accidental bad used experience
>
> caused by incompatible policies. My point is slightly different.
>
>
>
> My point is that since this extension adds the possibility of an
> additional interactive step
>
> needed for the client to get access to the resource, this gives rogue
> resource servers
>
> a possibility to request this step even if in fact it is not needed, just
> to annoy user
>
> (so, it is not due to incompatible policies, it is due to resource servers
> intentional bad behavior).
>
> I think it’s worth to mention in the Security Considerations section,
>
> although I agree that the problem is minor.
>
>
>
> Regards,
>
> Valery.
>
>
>
>
>
>
>
> *From:* Vittorio Bertocci [mailto:vitto...@auth0.com <vitto...@auth0.com>]
>
> *Sent:* Thursday, March 02, 2023 11:00 AM
> *To:* Valery Smyslov
> *Cc:* sec...@ietf.org;
> draft-ietf-oauth-step-up-authn-challenge....@ietf.org; last-c...@ietf.org;
> oauth@ietf.org
> *Subject:* Re: Secdir last call review of
> draft-ietf-oauth-step-up-authn-challenge-12
>
>
>
> Thanks for clarifying, I was indeed addressing the comment using DoS in
> its canonical meaning.
> The possibility of bad user experience is indeed present, and it is more
> general than just freshness: we do tackle that explicitly in the
> deployment considerations section. Did you have a chance to read it? Is
> there anything you would add to what we say there?
>
> thanks
>
> V.
>
>
>
> On Wed, Mar 1, 2023 at 10:34 PM Valery Smyslov <val...@smyslov.net> wrote:
>
> *This message originated outside your organization.*
>
>
> ------------------------------
>
>
>
> Hi Vittorio,
>
>
>
> when I used the term “DoS”, I was not thinking only about real DoS attacks
> (on computers),
>
> but also about “DoS”  attacks on humans. Consider the situation when the
> resource
>
> server doesn’t accept **any** presented token asking for a fresher one.
> So, each time the client
>
> attempts to get access to the resource, it have to contact the
> authorization server which may
>
> require user interaction, which may be very annoying for the user if it
> happens constantly.
>
> Am I missing something?
>
>
>
> Regards,
>
> Valery.
>
>
>
>
>
> Thank you Valery for the review!
>
> The possibility of DOS is interesting. Here's the reasoning we followed
> when we opted not to mention it in the security considerations:
>
> - The client going back to the AS isn't a new thing introduced by the step
> up spec, given that it's the expected behavior for insufficient_scope.
>
> - if anything, step up might make it even harder to mount a DOS: the
> challenge presented by the client to the AS either results in user
> interaction, negating the possibility of using it as a component of a DOS
> attack, or results in an error, leaving the client unable to call the API
> and get any new challenges
>
>  What do you think?
>
> Thanks
>
> V.
>
>
>
> On Wed, Mar 1, 2023 at 2:05 AM Valery Smyslov via Datatracker <
> nore...@ietf.org> wrote:
>
>
>   This message originated outside your organization.
>
>
> Reviewer: Valery Smyslov
> Review result: Has Issues
>
> I have reviewed this document as part of the security directorate's ongoing
> effort to review all IETF documents being processed by the IESG.  These
> comments were written primarily for the benefit of the security area
> directors.
> Document editors and WG chairs should treat these comments just like any
> other
> last call comments.
>
> The document introduces an extension to the OAuth protocol that allows
> resource
> servers to signal to a client that the authentication event associated
> with the
> access token of the current request does not meet its authentication
> requirements
> and specify how to meet them.
>
> The document is well written and easy to understand.
>
> The Security Considerations section looks comprehensive. However, I think
> that
> one potential issue is not discussed - the possibility of DoS attacks.
> The protocol allows the resource server to send the client back to the
> authorization
> server for a "better" authentication token. In my opinion it opens a
> possibility
> for rogue resource servers to mount a DoS attack by constantly requesting
> a "better" token. In my understanding a client should respect these replies
>
> and each time should ask the authorization server for a "better" (e.g.
> fresher) token.
> Depending on the authentication mechanism involved this may be annoying
> for the user
> and put an additional load on both the client and the authorization server.
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> <https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/oauth__;!!PwKahg!68yTrqJBjXNZmWtNG2vqvYRrR6JtX0836ola7TGVI-_mgm6ol0nCNpUTRPDoZ50fCxLYanBBpg$>
>
>
> _______________________________________________
> secdir mailing list
> sec...@ietf.org
> https://www.ietf.org/mailman/listinfo/secdir
> <https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/secdir__;!!PwKahg!68yTrqJBjXNZmWtNG2vqvYRrR6JtX0836ola7TGVI-_mgm6ol0nCNpUTRPDoZ50fCxLKVKPZ1g$>
> wiki: https://trac.ietf.org/trac/sec/wiki/SecDirReview
> <https://urldefense.com/v3/__https://trac.ietf.org/trac/sec/wiki/SecDirReview__;!!PwKahg!68yTrqJBjXNZmWtNG2vqvYRrR6JtX0836ola7TGVI-_mgm6ol0nCNpUTRPDoZ50fCxIPkLwdhw$>
>
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to