Re: [OAUTH-WG] WGLC for DPoP Document

2022-03-29 Thread Dave Tonge
I support publication of the specification On Wed, 30 Mar 2022 at 08:55, Daniel Fett wrote: > I also support publication. > > -Daniel > Am 29.03.22 um 23:20 schrieb David Waite: > > I also support publication of this specification > > -DW > > On Mar 29, 2022, at 3:12 PM, Mike Jones < > Michael.J

Re: [OAUTH-WG] WGLC for DPoP Document

2022-03-29 Thread Daniel Fett
I also support publication. -Daniel Am 29.03.22 um 23:20 schrieb David Waite: I also support publication of this specification -DW On Mar 29, 2022, at 3:12 PM, Mike Jones wrote: I support publication of the specification. -- Mike *From:*OAuth *On Behalf Of*Rifaat Shekh-Yusef *Sent:*Monday

Re: [OAUTH-WG] WGLC for DPoP Document

2022-03-29 Thread Steinar Noem
I would like to un-ask my question. Is there a «retract mail» option somewhere? PS! This is written by my wife, with whom I have colluded many times. She even knows the PIN code on my bank cards. tir. 29. mar. 2022 kl. 22:08 skrev Hans Zandbelt : > > > On Tue, Mar 29, 2022 at 9:54 PM Denis wr

Re: [OAUTH-WG] WGLC for DPoP Document

2022-03-29 Thread David Waite
I also support publication of this specification -DW > On Mar 29, 2022, at 3:12 PM, Mike Jones > wrote: > > I support publication of the specification. > >-- Mike > > From: OAuth On Behalf Of Rifaat Shekh-Yusef > Sent: Monday, March

Re: [OAUTH-WG] WGLC for DPoP Document: new thread about subject identifiers

2022-03-29 Thread Denis
Hi Hans, Hi Denis, thanks for correcting the thread topic: On Tue, Mar 29, 2022 at 10:19 PM Denis wrote: nothing stops Alice from logging in on Bob's device, obtaining tokens for access and then leave Bob with the device, even in long term user accounts Even so, Alice will

Re: [OAUTH-WG] WGLC for DPoP Document

2022-03-29 Thread Mike Jones
I support publication of the specification. -- Mike From: OAuth On Behalf Of Rifaat Shekh-Yusef Sent: Monday, March 28, 2022 5:01 AM To: oauth Subject: [OAUTH-WG] WGLC for DPoP Document All, As discussed during the IETF meeting in Vienna

Re: [OAUTH-WG] WGLC for DPoP Document: new thread about subject identifiers

2022-03-29 Thread Hans Zandbelt
Hi Denis, thanks for correcting the thread topic: On Tue, Mar 29, 2022 at 10:19 PM Denis wrote: > nothing stops Alice from logging in on Bob's device, obtaining tokens for > access and then leave Bob with the device, even in long term user accounts > > Even so, Alice will be unable to use that

[OAUTH-WG] WGLC for DPoP Document: new thread about subject identifiers

2022-03-29 Thread Denis
Hans, Please do not mix topics. I have changed the title of that thread, for not polluting the original one. On Tue, Mar 29, 2022 at 9:54 PM Denis wrote: Nothing stops Alice from giving her token that says “This is Alice” to Bob and having Bob use it. Such scenario does not e

Re: [OAUTH-WG] WGLC for DPoP Document

2022-03-29 Thread Hans Zandbelt
On Tue, Mar 29, 2022 at 9:54 PM Denis wrote: > Nothing stops Alice from giving her token that says “This is Alice” to Bob > and having Bob use it. > > Such scenario does not exist in the context of long term user accounts. > However, it is important first to understand the concept > of long term

Re: [OAUTH-WG] WGLC for DPoP Document

2022-03-29 Thread Denis
 Justin, Denis, This is why the use of “iat” and “nonce” are recommended, to prevent this kind of replay, and these are already discussed in the draft. Having a highly targeted request with narrow presentation window is desirable in most cases, but some applications of DPoP do want to have a

Re: [OAUTH-WG] WGLC for DPoP Document

2022-03-29 Thread Justin Richer
Denis, This is why the use of “iat” and “nonce” are recommended, to prevent this kind of replay, and these are already discussed in the draft. Having a highly targeted request with narrow presentation window is desirable in most cases, but some applications of DPoP do want to have a pre-generat

Re: [OAUTH-WG] WGLC for DPoP Document

2022-03-29 Thread Denis
Hi  Justin, In this scenario, the “legitimate” client _never_ gives away its secrets (if it is using a secure platform, it can't). It never give away its credentials either. When using key bound access tokens, a RS can't know whether the access token is presented by the “legitimate” client 

Re: [OAUTH-WG] access token hash claim name in oauth-dpop draft

2022-03-29 Thread Rohan Mahy
I agree that the at_hash definition is bizarre. I suggest adding a sentence when introducing the ath claim explaining that this is similar but different from at_hash. Thanks, -rohan On Tue, Mar 29, 2022 at 6:14 AM Justin Richer wrote: > Yes, it was considered, discussed, and rejected. The reaso

Re: [OAUTH-WG] WGLC for DPoP Document

2022-03-29 Thread Justin Richer
If the “legitimate” client willingly gives away its secrets and tokens to the “illegitimate” client, then the latter isn’t actually “illegitimate” anymore. What I was saying is that the “attack" is not even necessary if the clients are in fact working together. If the “legitimate” client knowing

[OAUTH-WG] Regarding iat and nonce in DPoP Proofs

2022-03-29 Thread Jacob Ideskog
Hi all, We have encountered a situation in the wild which I would like to share and discuss with you. We have strict validation of the iat claim as per section 4.3 in the specification where we allow a reasonable skew. The problem we see is that some users (more than a few) have changed the cloc

Re: [OAUTH-WG] WGLC for DPoP Document

2022-03-29 Thread Roberto Polli
Dear all, thanks for this interesting work! I think that there's some editorial work that should be done on terminology (e.g. a consistent use of JOSE header parameter, HTTP header field, ...) and some simplification will really make the spec more easy to read. For example, once defined that the

Re: [OAUTH-WG] WGLC for DPoP Document

2022-03-29 Thread Denis
Hi  Justin, You broke the thread since you have not re-used the last message which was: Steinar, As you have guessed, no data (except the token and some crypto checksums) is passing through the clients. Once the legitimate client has allowed the illegitimate client to use the to

Re: [OAUTH-WG] access token hash claim name in oauth-dpop draft

2022-03-29 Thread Justin Richer
Yes, it was considered, discussed, and rejected. The reason being “at_hash” has a somewhat convoluted definition (left-bits of a hash of an access token in the context of a JOSE object, etc), to fit some of the design constraints of ID Tokens. DPoP proofs do not have those same constraints. DPoP

Re: [OAUTH-WG] WGLC for DPoP Document

2022-03-29 Thread Daniel Fett
+1 Am 29.03.22 um 15:10 schrieb Justin Richer: And this is exactly the problem with the “collaborating clients” attack, as has been pointed out any number of times it’s been brought up before. If two clients are willingly collaborating in this way, they do not need to share any cryptographic m

Re: [OAUTH-WG] WGLC for DPoP Document

2022-03-29 Thread Justin Richer
And this is exactly the problem with the “collaborating clients” attack, as has been pointed out any number of times it’s been brought up before. If two clients are willingly collaborating in this way, they do not need to share any cryptographic material and impersonate each other. You don’t ne