OpenID Discovery already allows this attack.  Its security relies on HTTPS,
which only authenticates the domain name.  So the owner of a domain can
present a valid discovery document with arbitrary information in it for any
issuer path on the domain.

Do you have the same concern with that mechanism?

On Tue, Jun 25, 2024 at 5:53 PM Michael Jones <michael_b_jo...@hotmail.com>
wrote:

> The other critique I voiced of the approach is that the application-level
> X.509 certificate can be used to secure the HOST part of the issuer, but
> not the entire issuer, since in general, the issuer will contain a PATH.
> Yes, the service hosting the issuers controls all the paths, as Richard
> replied earlier, but it’s not the service who is the attacker that this
> enables.  The attackers that not securing the PATH enables are the tenants
> themselves.
>
>
>
> An attacker could host a tenant at the service and get an X.509
> certificate securing the HOST part of its issuer.  However, because a
> legitimate tenant at another path shares the same HOST, the attacker can
> copy its X.509 certificate chain and utilize a substitution attack to make
> unauthorized statements about the victim tenant – statements that were not
> made by the hosting service.
>
>
>
> This attack was not addressed, and I believe is intrinsic to the decision
> not to protect the entire issuer value.
>
>
>
> I believe that adopting this draft would result in this attack occurring
> in practice.
>
>
>
>                                                                 Thank you,
>
>                                                                 -- Mike
>
>
>
> *From:* Richard Barnes <r...@ipv.sx>
> *Sent:* Tuesday, June 25, 2024 1:56 PM
> *To:* Rifaat Shekh-Yusef <rifaat.s.i...@gmail.com>
> *Cc:* oauth <oauth@ietf.org>
> *Subject:* [OAUTH-WG] Re: Call for adoption - PIKA
>
>
>
> Hi all,
>
>
>
> Replying to the top of the thread again to recap the arguments so far.
> (Hoping the chairs will give us a moment more to discuss before calling
> cloture.)
>
>
>
> It seems like Sharon, Rohan, Watson, and I are all on the same page w.r.t.
> the X.509-based mechanisms in the current draft.  In particular, we're all
> developers of relying party software, and it seems like we're all OK with
> doing X.509 (contra Mike's point about application-level X.509).
>
>
>
> If I understand Mike and Giuseppe correctly, they want to be less
> prescriptive about how the PIKA signer establishes their authority for an
> "iss" value, so that an OP could use some other mechanism (e.g., OpenID
> Federation).  It sounds like Mike at least is OK with the draft aside from
> this point.
>
>
>
> I would be open to adding some optionality in the authority mechanism
> here, but I'm wary of losing the concrete interop that we get with the
> draft as it is.  So we would need at least a strong recommendation for
> X.509, even if something else can be used if the parties agree to it.  I
> would be more comfortable doing something along the lines of what Rohan
> suggests, namely defining a concrete, X.509-based thing here, and extending
> it to support other mechanisms via follow-on specs as needed.  If there
> were a single additional mechanism that people wanted, as opposed to a
> generic "[insert authority mechanism here]", that would also be more
> palatable to me.
>
>
>
> Additional feedback would be useful on a couple of points:
>
>
>
> 1. From RPs: Is the X.509 requirement onerous to you?  Or is there enough
> library support out there that it's not a big deal?
>
> 2. From OPs: Is signing using a key bound to an X.509 certificate workable
> for you?  Or do you need some other authority framework?
>
> 3. From everyone: Is the general mechanism here useful, assuming we can
> align on some set of authority frameworks?
>
>
>
> Thanks,
>
> --Richard
>
>
>
>
>
> On Mon, Jun 10, 2024 at 7:47 AM Rifaat Shekh-Yusef <
> rifaat.s.i...@gmail.com> wrote:
>
> All,
>
> This is an official call for adoption for the *Proof of Issuer Key
> Authority (PIKA)* draft:
>
> https://datatracker.ietf.org/doc/draft-barnes-oauth-pika/
>
>
> Please, reply *on the mailing list* and let us know if you are in favor
> or against adopting this draft as WG document, by *June 24th*.
>
> Regards,
>  Rifaat & Hannes
>
>
>
> _______________________________________________
> OAuth mailing list -- oauth@ietf.org
> To unsubscribe send an email to oauth-le...@ietf.org
>
>
_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to