Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-23 Thread Anthony Nadalin
I hear that many folks don't want to add a mandatory crypto operation on the client side :-( -Original Message- From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of John Bradley Sent: Tuesday, February 23, 2016 3:17 PM To: Roland Hedberg Cc: Subject: Re: [OAUTH-WG] Fixing the Autho

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-23 Thread John Bradley
The idea of including the state in the PKCE calculation was one I think Hans brought up at the meeting in Darmstadt. I think we discounted it as not solving the problem because the attacker could manipulate the code_challenge. As and example the attacker receives the request and changes the cod

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-23 Thread Anthony Nadalin
I would go with option A, option B introduces concepts/syntax that complicates the current Oauth model -Original Message- From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Hannes Tschofenig Sent: Friday, February 19, 2016 11:43 AM To: oauth@ietf.org Subject: [OAUTH-WG] Fixing the A

Re: [OAUTH-WG] JWS Access Token concerns

2016-02-23 Thread Sergey Beryozkin
Hi On 23/02/16 19:31, Antonio Sanso wrote: hi Sergey, just my 2 cents let’s start from a simple fact that encryption is not authentication. :) And since then the access tokens are supposed to provide the source guarantee to the client ? Can you point to any text somewhere suggesting the client

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-23 Thread Roland Hedberg
In line ! > 22 feb 2016 kl. 05:08 skrev John Bradley : > >> On Feb 22, 2016, at 9:22 AM, Nat Sakimura wrote: >> >> The risk impact of [case2] is more OAuth specific. The token is stolen as >> the token is going to be sent to a rogue resource, and the resource can use >> that to obtain the res

Re: [OAUTH-WG] JWS Access Token concerns

2016-02-23 Thread Vladimir Dzhuvinov
Hi Sergey, JWE will indeed make the token content confidential to clients. However, without a proper signature (RSA or EC, HMAC in JWS doesn't qualify), the RS cannot establish the origin of the token. With symmetric crypto (e.g. JWE alg=dir) anyone who has the shared key will be able to create a

Re: [OAUTH-WG] JWS Access Token concerns

2016-02-23 Thread Antonio Sanso
hi Sergey, just my 2 cents let’s start from a simple fact that encryption is not authentication. :) Now, if the claim sets of a JWS contains only not confidential information JWS is enough. See also inline On Feb 23, 2016, at 6:15 PM, Sergey Beryozkin wrote: > Hi > > Some OAuth2 providers m

[OAUTH-WG] JWS Access Token concerns

2016-02-23 Thread Sergey Beryozkin
Hi Some OAuth2 providers may return self-contained access tokens which are JWS Compact-encoded. I wonder is it really a good idea and would it not be better to only JWE-encrypt the tokens. I'm not sure JWS signing the claims is necessarily faster then only encrypting the claims, assuming the

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-23 Thread Vladimir Dzhuvinov
Comment starts at line 173 :) On 22/02/16 14:08, John Bradley wrote: > Inline > >> On Feb 22, 2016, at 9:22 AM, Nat Sakimura wrote: >> >> [case1] Code phishing + cut-n-paste attack <> >> [case1a] through BadAS to GoodAS redirect >> [case1b] through tampering the unprotected client access res

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-23 Thread Vladimir Dzhuvinov
On 23/02/16 07:56, William Denniss wrote: > I also wonder if the spec could be re-titled and focus on use-case that it > solves (supporting multiple ASes without using Connect), rather than the > attack it mitigates. I like that the metadata draft is targeted to solve a > particular use-case, whi

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-23 Thread Vladimir Dzhuvinov
This sounds fantastic, Daniel. I was only aware of the work by the researchers from RUB.de about the CSRF attack on OIDC discovery. I'm reading the paper right now and want to take some time off to study it in more detail. Congratulations for doing this, Vladimir On 23/02/16 12:28, Daniel Fett w

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-23 Thread Daniel Fett
Hi Valdimir, this is exactly what we did in our research paper. We also analyzed and established a proof of security for one of the proposed mitigations. Of course, any proof always depends on some assumptions (e.g., no untrusted third-party code on RP's web site) and aims at specific security pr

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-23 Thread Vladimir Dzhuvinov
Hi Mike, You mention that you spent considerable time in research. I wonder if there is existing theory, in communications or information theory, that can be used to formally establish and prove (or disprove) the security of the proposed OAuth measures? Perhaps some work that is totally unrelated

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-23 Thread Antonio Sanso
hi, FWIW I also find Option A easier to understand/implement. regards antonio On Feb 19, 2016, at 8:42 PM, Hannes Tschofenig wrote: > Early February I posted a mail to the list to make progress on the > solution to the OAuth Authorization Server Mix-Up problem discovered > late last year. >