Re: [OAUTH-WG] draft-ietf-oauth-spop-04: a way of making code_challenge

2014-11-13 Thread John Bradley
This blog post has some good background on why salting is no longer effective against brute force attacks. http://blog.ircmaxell.com/2011/08/rainbow-table-is-dead.html?m=1 More entropy in the secret is much more important. The code verifier should not be thought of as a password. It needs t

Re: [OAUTH-WG] draft-ietf-oauth-spop-04: a way of making code_challenge

2014-11-13 Thread Bill Mills
Adding client ID is no better than simply adding extra random bits, but 256 is a LOT. Also remember that the server SHOULD: -    only allowing a code to be tried once-    at a very minimum should have a severely limited number of tries for a code-    a short time window to use a code Unless you

Re: [OAUTH-WG] draft-ietf-oauth-spop-04: a way of making code_challenge

2014-11-13 Thread Bill Mills
Yes, "plain" is actually sufficient.  The hashed value protects against disclosure/logging threats on the server auth server and proxies perhaps where the HTTPS is terminated somewhere other than the auth server itself, it's not actually required for the basic functionality/security of the mecha

Re: [OAUTH-WG] draft-ietf-oauth-spop-04: a way of making code_challenge

2014-11-13 Thread John Bradley
If an attacker can intercept and modify requests, they have complete control. Trying to protect OAuth at that point is probably not practical. If you want that then we need a confidential client with tpm storage of key material and move to signed requests and responses. That is possible but

Re: [OAUTH-WG] draft-ietf-oauth-spop-04: a way of making code_challenge

2014-11-13 Thread takamichi saito
2014/11/14 11:00、Nat Sakimura のメール: > Regarding > > > Other problem is the following, using Nat’s slide: > > http://www.slideshare.net/nat_sakimura/1112-spoppresso . > > > > 0.Attacker prepares own code_verifier and code_challenge. > > 1.replage legitimate challenge with malicious co

Re: [OAUTH-WG] draft-ietf-oauth-spop-04: a way of making code_challenge

2014-11-13 Thread takamichi saito
Sorry for my poor english. 2014/11/14 10:55、Bill Mills のメール: > The whole mechanism relies on the attacker not having access to the > code_verifier or hash. It's defending against the attacker getting the code > via weakness in IPC or other such mechanism like URI handlers. How many more >

[OAUTH-WG] Meeting Minutes

2014-11-13 Thread Hannes Tschofenig
Hi all, here is a draft version of the meeting minutes: http://www.ietf.org/proceedings/91/minutes/minutes-91-oauth Thanks to Brian Rosen for taking notes. Comments are welcome! Ciao Hannes & Derek signature.asc Description: OpenPGP digital signature _

Re: [OAUTH-WG] draft-ietf-oauth-spop-04: a way of making code_challenge

2014-11-13 Thread takamichi saito
Sorry for my poor english. 2014/11/14 10:45、John Bradley のメール: > We have discussed it and that was in fact my original recommendation. > However I have been convinced that it adds complexity without any real > improvement in security. Really? I think that there is same discussion in stori

Re: [OAUTH-WG] draft-ietf-oauth-spop-04: a way of making code_challenge

2014-11-13 Thread William Denniss
On Thu, Nov 13, 2014 at 6:00 PM, Nat Sakimura wrote: > Regarding > > > Other problem is the following, using Nat’s slide: > > http://www.slideshare.net/nat_sakimura/1112-spoppresso . > > > > 0.Attacker prepares own code_verifier and code_challenge. > > 1.replage legitimate challenge with

[OAUTH-WG] crosspost.... SASL OAUTH

2014-11-13 Thread Bill Mills
There's a draft it would be great to get more eyes on in the Kitten WG draft-ietf-kitten-sasl-oauth-17 - A set of SASL Mechanisms for OAuth Nearing it's 5th and hopefully final WGLC, so any more eyes and comments on it would be welcome. Thanks, -bill___

Re: [OAUTH-WG] draft-ietf-oauth-spop-04: a way of making code_challenge

2014-11-13 Thread Nat Sakimura
Regarding > Other problem is the following, using Nat’s slide: > http://www.slideshare.net/nat_sakimura/1112-spoppresso . > > 0.Attacker prepares own code_verifier and code_challenge. > 1.replage legitimate challenge with malicious code_challenge. > 5. Attacker can submits own code_verifie

Re: [OAUTH-WG] draft-ietf-oauth-spop-04: a way of making code_challenge

2014-11-13 Thread Bill Mills
The whole mechanism relies on the attacker not having access to the code_verifier or hash.  It's defending against the attacker getting the code via weakness in IPC or other such mechanism like URI handlers.  How many more bits is secure beyond 256 bits of entropy recommended?  If you want to ma

[OAUTH-WG] Milestones changed for oauth WG

2014-11-13 Thread IETF Secretariat
Changed milestone "Submit 'OAuth Dynamic Client Registration Protocol' to the IESG for consideration as a Proposed Standard", resolved as "Done". URL: http://datatracker.ietf.org/wg/oauth/charter/ ___ OAuth mailing list OAuth@ietf.org https://www.ietf.o

[OAUTH-WG] Milestones changed for oauth WG

2014-11-13 Thread IETF Secretariat
Changed milestone "Submit 'Proof-of-Possession OAuth Security' document bundle for consideration as a Proposed Standard", set due date to April 2015 from December 2014. URL: http://datatracker.ietf.org/wg/oauth/charter/ ___ OAuth mailing list OAuth@ietf

Re: [OAUTH-WG] draft-ietf-oauth-spop-04: a way of making code_challenge

2014-11-13 Thread John Bradley
We have discussed it and that was in fact my original recommendation. However I have been convinced that it adds complexity without any real improvement in security. The reality is that people don't bother with rainbow tables these days. They calculate hashes on the fly faster than they can

[OAUTH-WG] Milestones changed for oauth WG

2014-11-13 Thread IETF Secretariat
Changed milestone "Submit 'Proof-of-Possession OAuth Security' document bundle for consideration as a Proposed Standard", set state to active from review, accepting new milestone. URL: http://datatracker.ietf.org/wg/oauth/charter/ ___ OAuth mailing list

[OAUTH-WG] draft-ietf-oauth-spop-04: a way of making code_challenge

2014-11-13 Thread takamichi saito
Hi all, I appreciate this idea, simple and powerful to achieve proof of possession. But, I have some questions against the scheme. Sorry if these ware already discussed. I worry about using a hash function in simple way. I mean, a simple use of random as code_verifier may cause that malicious cl

[OAUTH-WG] draft-ietf-oauth-spop-04 BNF

2014-11-13 Thread Bill Mills
I understand the intent of: S256 "code_challenge" = BASE64URL(SHA256("code_verifier")) but I think what it really says is take the base64url encoding of the sha256 hash of the constant string "code_verifier". Are those quotes really supposed to be there? -bill

[OAUTH-WG] draft-ietf-oauth-spop-04 comments

2014-11-13 Thread Bill Mills
This draft has crypto agility problems. 4.3 code_challenge_method default to 'plain' should be noted as supporting legacy clients. This section should specify that S256 is MTI rather than leaving it to 4.4.1. I'd be much happier if this section said something like, "The server MUST support a

Re: [OAUTH-WG] OAuth 2.0 Proof-of-Possession: Authorization Server to Client Key Distribution nitpicking

2014-11-13 Thread Justin Richer
I think you’re right, the text should probably “remainder of token omitted” for the cases where it’s a non-JWT (and the key is passed from AS to RS in some other fashion) or it should start like a regular JWT in that particular example. — Justin On Nov 13, 2014, at 12:58 AM, Antonio Sanso wro

[OAUTH-WG] OAuth 2.0 Proof-of-Possession: Authorization Server to Client Key Distribution nitpicking

2014-11-13 Thread Antonio Sanso
hi *. AFAIU the access token in the Client-to-AS Response is not “forced” to be JWT format but can also be an opaque string. Now the example rather says: HTTP/1.1 200 OK Content-Type: application/json Cache-Control: no-store { "access_token":"SlAV32hkKG ... (remai

Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-jwsreq-01.txt

2014-11-13 Thread Sergey Beryozkin
Hi Very nice. Can it become drat-oauth-jwsreqres ? I know spop-04 has been released, we'll update our implementation as needed, but if an optional signing of a request is of interest, why can't be signing of the response be of interest too ? Thanks, Sergey On 13/11/14 04:07, internet-dra...