[OAUTH-WG] HTTP Signing

2020-01-20 Thread Justin Richer
As many of you know, Annabelle and I have put forward a general-purpose HTTP Signing specification in the HTTP Working Group, at least initially based on the old Cavage signatures spec that’s been used in the wild. We expect a number of important changes to happen as it goes through the standard

Re: [OAUTH-WG] HTTP Signing

2017-03-28 Thread Justin Richer
That document has been brought up and discussed several times in the past in relation to our own signing mechanism, and it’s been rejected each time. It has its benefits and drawbacks, as does the signature method that was proposed in draft-ietf-oauth-http-signing. The biggest drawback of the ca

[OAUTH-WG] HTTP Signing

2017-03-28 Thread Hannes Tschofenig
Hi all, I met Manu after the OAuth meeting on Monday and he pointed me to his work on HTTP signing, as described in this document: https://tools.ietf.org/html/draft-cavage-http-signatures-06 I believe there is some synergy of work going on elsewhere in the IETF. Since we have had challenges with

Re: [OAUTH-WG] HTTP signing spec and nonce

2016-02-28 Thread Samuel Erdtman
To me it seems reasonable that a client may send multiple signed messages in one second. So I´m +1 for a nonce. A more fine grained timestamp is nice but I think we might end upp at the same place, someone saying that they think it is reasonable to send multiple signed messages the same millisecon

Re: [OAUTH-WG] HTTP signing and parameter validation

2016-02-28 Thread Justin Richer
It’s a bit of both and it’s going to be highly specific to the API being protected. The RS should reject a signed request in which a critical parameter is unsigned — some implementations of OpenID 2.0 were susceptible to exactly this kind of attack a number of years ago. We could probably add

[OAUTH-WG] HTTP signing and parameter validation

2016-02-28 Thread Brock Allen
Another question related to HTTP signing. It's not clear to me from the RFC if the resource server should be using the incoming pop token JWS to know what to verify, or if the resource server should have a preconceived notion of what should be sent in the pop token. For example, the query param

Re: [OAUTH-WG] HTTP signing spec and nonce

2016-02-28 Thread Justin Richer
I understand how they work, I’ve built exactly that cache before. But I askWouldn’t a unique timestamp have the same effect? Currently it’s integer seconds but slicing that down further (floating point seconds?) if people desired would allow for multiple signed messages in the same second from t

Re: [OAUTH-WG] HTTP signing spec and nonce

2016-02-26 Thread Dominick Baier
The nonce would allow to build a replay cache, the timestamp to trim that cache and reject messages that are too old. Similar protocols have a nonce for the above reasons (ws-sec msg security, hawk)... —  cheers Dominick Baier On 27 February 2016 at 03:48:00, Justin Richer (jric...@mit.edu) wr

Re: [OAUTH-WG] HTTP signing spec and nonce

2016-02-26 Thread Justin Richer
I’d be glad to add in a nonce if there’s a compelling reason for it, such as closing a security attack vector. What’s the proposed purpose of the nonce? Is it just to add randomness to the signing base? Or is it to prevent replay at the RS? If the former, the timestamp should add enough of that

[OAUTH-WG] HTTP signing spec and nonce

2016-02-26 Thread Brock Allen
Question about the HTTP signing spec - why is there no nonce (and just a timestamp)? TIA -Brock ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

[OAUTH-WG] HTTP signing spec typo

2016-02-24 Thread Brock Allen
In section 3.2 under calculating header list hash, there's an example of hashed headers. For the values: content-type: application/json etag: 742-3u8f34-3r2nvv3 this is shown as the example: "h": [["content-type", "etag"], "bZA981YJBrPlIzOvplbu3e7ueREXXr38vSkxIBYOaxI"] I believe th