Re: [OAUTH-WG] [jose] Security research on JWT implementations

2015-04-02 Thread John Bradley
I agree that the best thing is one alg per kid. However getting people especially those using x509 Certs to alg is a challenge. People still want to do pkcs1.5 pss sha256 sha512 off of one key. With composite keys you need the alg to know the hash using x509 Certs. I think more advice for a

Re: [OAUTH-WG] [jose] Security research on JWT implementations

2015-04-02 Thread Tim McLean
On Thu, Apr 2, 2015 at 4:39 PM, John Bradley wrote: > A given issuer may be allowed to sign using both ECDSA and RSA PKCS 1.5 > and that would not be a problem until one of them is deprecated. > Having libraries assume that there can only be one alg per issuer would > not lead to useful crypto ag

Re: [OAUTH-WG] [jose] Security research on JWT implementations

2015-04-02 Thread Tim McLean
On Thu, Apr 2, 2015 at 2:42 PM, Mike Jones wrote: > This warning is already in place in > https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-7.2. > It says: > >Finally, note that it is an application decision which algorithms may >be used in a given context. Even if a

Re: [OAUTH-WG] [jose] Security research on JWT implementations

2015-04-02 Thread John Bradley
Sec 10.6 and 10.7 of JWS also touch on algorithm substitution. Allowing keys to be used with multiple algorithms is a general problem, and almost always turns out unhappily. I think that using a RSA key for HMAC is the most extreme case of that principal. I do think that outside of the JOSE an

Re: [OAUTH-WG] [jose] Security research on JWT implementations

2015-04-02 Thread Aaron Parecki
I'm not sure what article you're referring to, but feel free to add the article and send a pull request to oauth.net: https://github.com/aaronpk/oauth.net Here's an example of the PR for the Authentication article that Justin added: https://github.com/aaronpk/oauth.net/pull/81 Aaron Parecki

Re: [OAUTH-WG] [jose] Security research on JWT implementations

2015-04-02 Thread Mike Jones
This warning is already in place in https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-7.2. It says: Finally, note that it is an application decision which algorithms may be used in a given context. Even if a JWT can be successfully validated, unless the algorithm(

Re: [OAUTH-WG] [jose] Security research on JWT implementations

2015-04-02 Thread Hannes Tschofenig
[[adding oauth@ietf.org]] On 04/02/2015 08:01 PM, Tim McLean wrote: > However, I do think one way of gauging the success of JWS/JOSE is to > measure how many implementers actually get the security details right. I agree with you. If several people got this wrong then it is a good idea to write