Re: [OAUTH-WG] client certs and TLS Terminating Reverse Proxies (was Re: I-D Action: draft-ietf-oauth-jwt-introspection-response-08.txt)

2019-10-31 Thread Hans Zandbelt
for me this thread is running a bit wild: if we don't believe that implementers get incoming header removal right, why do we believe the same implementers get randomizing and/or HMAC signing right setting headers on a trusted leg between proxies and origin servers has been a best practice for decad

Re: [OAUTH-WG] client certs and TLS Terminating Reverse Proxies (was Re: I-D Action: draft-ietf-oauth-jwt-introspection-response-08.txt)

2019-10-31 Thread Vladimir Dzhuvinov
I agree wholeheartedly that an HMAC or even signature is preferable. With HMAC vs signature having their relative pros / cons, in terms of computation and key distribution. If a standard for that is created, and I am a web application developer, I'll be able to handle the header checks in the appli

Re: [OAUTH-WG] client certs and TLS Terminating Reverse Proxies (was Re: I-D Action: draft-ietf-oauth-jwt-introspection-response-08.txt)

2019-10-31 Thread Neil Madden
On 31 Oct 2019, at 18:55, Richard Backman, Annabelle wrote: > >  > Relying on a fixed, random header name for security, even as a “defense in > depth” measure, is dangerous. In order for this mechanism to be effective, > the header name must be random (in the cryptographic sense) and must be

[OAUTH-WG] Interest in Reciprocal OAuth?

2019-10-31 Thread Dick Hardt
Hello OAuth people Before I tune up the Reciprocal OAuth document per feedback, I'm checking to see who is interested in the specification, and who is considering deploying. Alexa had the requirement originally, but I no longer work there, and I have not seen any input from them. Latest draft ..

[OAUTH-WG] Fwd: New Version Notification for draft-fett-oauth-dpop-03.txt

2019-10-31 Thread Brian Campbell
Hello WG, Just a quick note to let folks know that -03 of the DPoP draft was published earlier today. The usual various document links are in the forwarded message below and the relevant snippet from the doc history with a summary of the changes is included here for convenience. Hopefully folks w

Re: [OAUTH-WG] client certs and TLS Terminating Reverse Proxies (was Re: I-D Action: draft-ietf-oauth-jwt-introspection-response-08.txt)

2019-10-31 Thread Salz, Rich
* Relying on a fixed, random header name for security, even as a “defense in depth” measure, is dangerous. Thank you. +1 ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] client certs and TLS Terminating Reverse Proxies (was Re: I-D Action: draft-ietf-oauth-jwt-introspection-response-08.txt)

2019-10-31 Thread Vladimir Dzhuvinov
Thanks for this note. According to the abstract the advertising is intended for "request headers for proactive content negotiation" (Accept-*), which should exclude all other types of header. I looked at the Security Considerations and wrote to the author with the suggestion to note that implementa

Re: [OAUTH-WG] client certs and TLS Terminating Reverse Proxies (was Re: I-D Action: draft-ietf-oauth-jwt-introspection-response-08.txt)

2019-10-31 Thread Salz, Rich
How about requiring reverse proxies to automatically scrub all inbound HTTP headers that start with "Sec-"? https://tools.ietf.org/html/draft-ietf-httpbis-client-hints-07 Making a header value “secret” will not protect anything. ___ OAuth mailing list O

Re: [OAUTH-WG] client certs and TLS Terminating Reverse Proxies (was Re: I-D Action: draft-ietf-oauth-jwt-introspection-response-08.txt)

2019-10-31 Thread Hans Zandbelt
+10 On Thu, Oct 31, 2019 at 12:26 PM Vladimir Dzhuvinov wrote: > This is a good story. > > How about requiring reverse proxies to automatically scrub all inbound > HTTP headers that start with "Sec-"? > > If a sec header has the format "Sec-[NAME]-[random-chars]" we get: > > * The "Sec-" prefix

Re: [OAUTH-WG] client certs and TLS Terminating Reverse Proxies (was Re: I-D Action: draft-ietf-oauth-jwt-introspection-response-08.txt)

2019-10-31 Thread Vladimir Dzhuvinov
This is a good story. How about requiring reverse proxies to automatically scrub all inbound HTTP headers that start with "Sec-"? If a sec header has the format "Sec-[NAME]-[random-chars]" we get: * The "Sec-" prefix will  cause new compliant reserve proxies to automatically scrub the inbound HT

Re: [OAUTH-WG] client certs and TLS Terminating Reverse Proxies (was Re: I-D Action: draft-ietf-oauth-jwt-introspection-response-08.txt)

2019-10-31 Thread Torsten Lodderstedt
> On 30. Oct 2019, at 15:15, Neil Madden wrote: > > On 30 Oct 2019, at 14:05, Torsten Lodderstedt wrote: >>> On 30. Oct 2019, at 14:56, Neil Madden wrote: >>> >>> On 30 Oct 2019, at 13:24, Justin Richer wrote: All of these problems can be solved, and I think solved better, by >>

Re: [OAUTH-WG] client certs and TLS Terminating Reverse Proxies (was Re: I-D Action: draft-ietf-oauth-jwt-introspection-response-08.txt)

2019-10-31 Thread Hans Zandbelt
the way I see this is that stripping and setting the headers must be part of the implementation of the protocol itself, it should not be something left to a non-atomic piece of configuration by an administrator; I implemented it like this in the Apache implementation of Brian's TTRP spec [1] and ha

Re: [OAUTH-WG] client certs and TLS Terminating Reverse Proxies (was Re: I-D Action: draft-ietf-oauth-jwt-introspection-response-08.txt)

2019-10-31 Thread Vladimir Dzhuvinov
> All in all, I am in favor of this being defined in one standard way, > in addition to secure communication between proxies and backends being > standardized — but this latter bit really seems like a separate problem. > >  — Justin -1 for devising a well known header +1 for a simple way to authe