Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-03-01 Thread Vladimir Dzhuvinov
;> My reasoning is that we have a closed system that is fairly simple, so >>>>>>> formal analysis must be entirely possible. >>>>>>> >>>>>>> 1. We have 5 parties (client, AS, RS, user, user agent). >>>>>>> >&g

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-03-01 Thread John Bradley
t;>>>>> into OAuth must therefore be finite. >>>>>> >>>>>> 4. The security requirement is essentially to guarantee the precedence >>>>>> and authenticity of the messages from discovery endpoint to RS, and the >>>>>> pr

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-03-01 Thread Vladimir Dzhuvinov
ges, which can be forward or backward binding. >>>>> >>>>> >>>>> Right now the WG concern is whether all possible attacks have been >>>>> recognised, and then taken care of. If we can have a formal model that >>>>> can reliably r

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-28 Thread Torsten Lodderstedt
Hi all, I prefer to use draft-jones-oauth-mix-up-mitigation-01 as starting point simply because it gives some description of the threats we need to cope with. This does not preclude to eventually use draft-sakimura-oauth-meta-07 as solution or any other suitable mechanisms we find consensus o

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-27 Thread John Bradley
;> >>>> Vladimir >>>> >>>> >>>> >>>> On 20/02/16 12:41, Mike Jones wrote: >>>>> Suggesting that they be read is of course, the right long-term >>> approach. But as someone who spent 20+ years as a researc

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-27 Thread Vladimir Dzhuvinov
iption of the >>> threats and mitigations in the working group document. >>> >>> Cheers, >>> -- Mike >>> >>> -Original Message- >>> From: Hannes Tschofenig [mailto:hannes.

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-27 Thread Vladimir Dzhuvinov
ht long-term >> approach. But as someone who spent 20+ years as a researcher before >> switching to digital identity, I was sensitive to not wanting to upstage >> their work by copying too much of their material into our draft before >> their publications were widely known. I

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-27 Thread Donald F. Coffin
bcampb...@pingidentity.com] Sent: Friday, February 26, 2016 5:28 PM To: Hannes Tschofenig Cc: oauth Subject: Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption My preference is for Option A. The mix-up attack, in all it's variations, relies on there being no means in OAuth fo

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-26 Thread Brian Campbell
rchers and the working group to create a self-contained concise > description of the threats and mitigations in the working group document. > >> > >> Cheers, > >> -- Mike > >> > >> -Origina

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-24 Thread Hannes Tschofenig
-- Mike >> >> -Original Message- >> From: Hannes Tschofenig [mailto:hannes.tschofe...@gmx.net] >> Sent: Saturday, February 20, 2016 2:25 AM >> To: Mike Jones ; William Denniss >> ; Phil Hunt (IDM) >> Cc: oauth@ietf.org >> Subject: Re: [

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-24 Thread John Bradley
I think that AT reuse by MITM attacks should be dealt with as a separate issue. There are several possibilities. 1) POP tokens (You will recall the Eran wanted them for this reason) 2) The AS telling the client where the token can be used and the client comparing the URI (may be multiple) 3) The

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-24 Thread George Fletcher
We still have a problem with AT leaking. I think that needs to be dealt with separately. Access tokens should have a audience (by value or by introspection) the client needs to tell the AS what resource it want s to use the token at and have that included as the audience or the request reject

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-24 Thread Vladimir Dzhuvinov
Comments inline. On 24/02/16 12:27, Nat Sakimura wrote: > 2016年2月24日(水) 8:17 John Bradley : > [..snip..] > >> This is not stoping the attack it is protecting code. >> > IMHO, this is the right approach. We should solve the problem > architecturally rather than bandaging the hols. > > >> I should p

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-24 Thread Nat Sakimura
2016年2月24日(水) 8:17 John Bradley : [..snip..] > > This is not stoping the attack it is protecting code. > IMHO, this is the right approach. We should solve the problem architecturally rather than bandaging the hols. > > I should point out that some of the attacks like man in the middling > regis

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-23 Thread Anthony Nadalin
g the Authorization Server Mix-Up: Call for Adoption The idea of including the state in the PKCE calculation was one I think Hans brought up at the meeting in Darmstadt. I think we discounted it as not solving the problem because the attacker could manipulate the code_challenge. As and exampl

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-23 Thread John Bradley
The idea of including the state in the PKCE calculation was one I think Hans brought up at the meeting in Darmstadt. I think we discounted it as not solving the problem because the attacker could manipulate the code_challenge. As and example the attacker receives the request and changes the cod

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-23 Thread Anthony Nadalin
Authorization Server Mix-Up: Call for Adoption Early February I posted a mail to the list to make progress on the solution to the OAuth Authorization Server Mix-Up problem discovered late last year. Here is my mail about the Authorization Server Mix-Up: https://na01

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-23 Thread Roland Hedberg
In line ! > 22 feb 2016 kl. 05:08 skrev John Bradley : > >> On Feb 22, 2016, at 9:22 AM, Nat Sakimura wrote: >> >> The risk impact of [case2] is more OAuth specific. The token is stolen as >> the token is going to be sent to a rogue resource, and the resource can use >> that to obtain the res

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-23 Thread Vladimir Dzhuvinov
think I will make RSA to go over this in person. > If PKCE with a new mode manages to fix everything, that would be great! I'm just reframing the essence of the proposed solution, as I roughly understood it: 1. The mix-up attack causes the client to be set up with compromised endpoints.

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-23 Thread Vladimir Dzhuvinov
On 23/02/16 07:56, William Denniss wrote: > I also wonder if the spec could be re-titled and focus on use-case that it > solves (supporting multiple ASes without using Connect), rather than the > attack it mitigates. I like that the metadata draft is targeted to solve a > particular use-case, whi

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-23 Thread Vladimir Dzhuvinov
This sounds fantastic, Daniel. I was only aware of the work by the researchers from RUB.de about the CSRF attack on OIDC discovery. I'm reading the paper right now and want to take some time off to study it in more detail. Congratulations for doing this, Vladimir On 23/02/16 12:28, Daniel Fett w

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-23 Thread Daniel Fett
Hi Valdimir, this is exactly what we did in our research paper. We also analyzed and established a proof of security for one of the proposed mitigations. Of course, any proof always depends on some assumptions (e.g., no untrusted third-party code on RP's web site) and aims at specific security pr

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-23 Thread Vladimir Dzhuvinov
; Phil Hunt (IDM) > Cc: oauth@ietf.org > Subject: Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for > Adoption > > Hi Mike, > > On 02/20/2016 10:52 AM, Mike Jones wrote: >> Have you read both of their publications? If not, do yourself a favor >>

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-23 Thread Antonio Sanso
hi, FWIW I also find Option A easier to understand/implement. regards antonio On Feb 19, 2016, at 8:42 PM, Hannes Tschofenig wrote: > Early February I posted a mail to the list to make progress on the > solution to the OAuth Authorization Server Mix-Up problem discovered > late last year. >

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-22 Thread John Bradley
however a new method along the lines I sketched out may let it work, or I could be completely wrong. Too bad I don’t think I will make RSA to go over this in person. John B. > > Nat > > > > > > > -- > PLEASE READ :This e-mail is confidential and inte

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-22 Thread Nat Sakimura
: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption Inline On Feb 20, 2016, at 9:49 AM, William Denniss mailto:wdenn...@google.com> > wrote: Maybe it's because I wasn't at the Darmstadt meeting so I don't have the full context, but I don&#

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-20 Thread John Bradley
Information about the OAuth security meeting can be found at > >> https://docs.google.com/document/d/136Cz2iwUFMdoKWZPCqZRhkmfmHAlJ6kM5OyeXzGptU4/edit > >> > >> <https://docs.google.com/document/d/136Cz2iwUFMdoKWZPCqZRhkmfmHAlJ6kM5OyeXzGptU4/edit> > >>

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-20 Thread Mike Jones
ginal Message- From: Hannes Tschofenig [mailto:hannes.tschofe...@gmx.net] Sent: Saturday, February 20, 2016 2:25 AM To: Mike Jones ; William Denniss ; Phil Hunt (IDM) Cc: oauth@ietf.org Subject: Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption Hi Mike, On 02/20/2016

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-20 Thread Hannes Tschofenig
Hi Mike, On 02/20/2016 10:52 AM, Mike Jones wrote: > Have you read both of their publications? If not, do yourself a > favor and do. They're actually both very readable and quite > informative. I have read both documents. In context of this discussion the question is whether we (a) require the

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-20 Thread Mike Jones
OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption Just a quick reply to two of your remarks: On 02/20/2016 09:49 AM, William Denniss wrote: > The security researcher documents are only informative references I think they should be informative references since the motivate the reason

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-20 Thread Hannes Tschofenig
Just a quick reply to two of your remarks: On 02/20/2016 09:49 AM, William Denniss wrote: > The security researcher documents are only informative references I think they should be informative references since the motivate the reason for doing the work but there is nothing in these publications t

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-19 Thread Phil Hunt (IDM)
nt/d/136Cz2iwUFMdoKWZPCqZRhkmfmHAlJ6kM5OyeXzGptU4/edit >> and >> https://docs.google.com/document/d/1cRa11EgimnTeJZR1-PUpNRpi_u_EoSpO5NtakVbA_sk/edit >> . >> >> -Original Message- >> From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Hannes Tschof

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-19 Thread Hans Zandbelt
/d/1cRa11EgimnTeJZR1-PUpNRpi_u_EoSpO5NtakVbA_sk/edit . -Original Message- From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Hannes Tschofenig Sent: Friday, February 19, 2016 11:43 AM To: oauth@ietf.org Subject: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption Early February I

Re: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-19 Thread Mike Jones
annes Tschofenig Sent: Friday, February 19, 2016 11:43 AM To: oauth@ietf.org Subject: [OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption Early February I posted a mail to the list to make progress on the solution to the OAuth Authorization Server Mix-Up problem discovered late

[OAUTH-WG] Fixing the Authorization Server Mix-Up: Call for Adoption

2016-02-19 Thread Hannes Tschofenig
Early February I posted a mail to the list to make progress on the solution to the OAuth Authorization Server Mix-Up problem discovered late last year. Here is my mail about the Authorization Server Mix-Up: http://www.ietf.org/mail-archive/web/oauth/current/msg15336.html Here is my mail to the li