Re: [OAUTH-WG] Report an authentication issue

2012-07-01 Thread Antonio Sanso
Hi *, On Jun 30, 2012, at 7:46 PM, John Bradley wrote: > There is one Core issue. > Audience restriction of the grant for the client. This is mostly important > where the client is inferring from the grant what the identity of the > presenter is. > > This surfaces in slightly different ways de

Re: [OAUTH-WG] Report an authentication issue

2012-06-30 Thread John Bradley
There is one Core issue. Audience restriction of the grant for the client. This is mostly important where the client is inferring from the grant what the identity of the presenter is. This surfaces in slightly different ways depending on the use case. 1, Native apps passing a access token ov

Re: [OAUTH-WG] Report an authentication issue

2012-06-30 Thread Phil Hunt
John, Thanks. I am not understanding yet. But if you believe there is a problem that is enough for me. I do not mean in any way dismiss it. Do you think the issue you described is different from the original message that started this thread? It seems so to me. Phil On 2012-06-29, at 20:34,

Re: [OAUTH-WG] Report an authentication issue

2012-06-29 Thread John Bradley
Phil, You know not everyone gets a personalized example:) In the below examples there is no proxy or other compromise of the client required only the ability to do what appears to be a SSO login using OAuth. The attacker needs only a web browser. When they tales about compromised clients, th

Re: [OAUTH-WG] Report an authentication issue

2012-06-29 Thread Phil Hunt
See below... Phil @independentid www.independentid.com phil.h...@oracle.com On 2012-06-29, at 1:54 PM, John Bradley wrote: > No, > > Trying to explain this over email is a challenge:) > > This apples to both native apps and Web Servers who are OAuth Clients. > > Imagine there are two web

Re: [OAUTH-WG] Report an authentication issue

2012-06-29 Thread John Bradley
No, Trying to explain this over email is a challenge:) This apples to both native apps and Web Servers who are OAuth Clients. Imagine there are two web servers that authenticate people with Facebook Connect (just an example). Site A is I love Puppies (An evil site) Site B is I Hate Larry Ell

Re: [OAUTH-WG] Report an authentication issue

2012-06-29 Thread Phil Hunt
John, I think that helps to clarify the authorize issue. But they were talking about a phishing site obtaining a legit access token from Facebook. > Let's take Soluto's metro app as an example to describe the problem. The app > supports Facebook Login. As an attacker, we can write a regular Fac

Re: [OAUTH-WG] Report an authentication issue

2012-06-29 Thread John Bradley
The attack requires a web browser that allows modifying the value of the of the redirect URI. It is dead simple cut token or code from the string and paste in the token or code that was granted by the user you want to impersonate. OAuth responses are not signed or audience restricted to the cl

Re: [OAUTH-WG] Report an authentication issue

2012-06-29 Thread Dick Hardt
If an attacked can modify the communications over TLS between the client and the authorization server, then I think there are many other options open to the attacker. -- Dick On Jun 29, 2012, at 11:53 AM, Phil Hunt wrote: > I'm not seeing how client id helps if a proxy server is somehow involv

Re: [OAUTH-WG] Report an authentication issue

2012-06-29 Thread Phil Hunt
We need more info on the inject method the researchers used before we can account for it. Phil On 2012-06-29, at 12:16, John Bradley wrote: > The same thing can be done with code. > > If the token endpoint checks the client_id before giving out the access token > then the attack on code can

Re: [OAUTH-WG] Report an authentication issue

2012-06-29 Thread John Bradley
The same thing can be done with code. If the token endpoint checks the client_id before giving out the access token then the attack on code can be prevented, as the token endpoint won't return the access token. The spec dosen't require authenticating public clients currently so it is a slightl

Re: [OAUTH-WG] Report an authentication issue

2012-06-29 Thread Phil Hunt
I'm not seeing how client id helps if a proxy server is somehow involved with inserting the bearer token as the researchers suggested. Phil On 2012-06-29, at 11:30, John Bradley wrote: > I think they only exploited the implicit flow. > > My point was that there is a way you could do the s

Re: [OAUTH-WG] Report an authentication issue

2012-06-29 Thread John Bradley
I think they only exploited the implicit flow. My point was that there is a way you could do the same thing with code if it is a public client that is not authenticating to the token endpoint. In general making identity assumptions in the client based on a code or access_token has risks that

Re: [OAUTH-WG] Report an authentication issue

2012-06-29 Thread John Bradley
I agree, If there is no good reason for the token endpoint not to check the client_id with public clients then we should add that it SHOULD or MUST be checked for authorization_code and refresh_token grant_type. Though I don't know if we want to get carried away with the whole agreeing thing.

Re: [OAUTH-WG] Report an authentication issue

2012-06-29 Thread Phil Hunt
I'm not clear whether the MS Security Researcher hack was with the authorization code or the access token. If the latter, the client_id is out of the picture isn't it? Phil @independentid www.independentid.com phil.h...@oracle.com On 2012-06-29, at 11:14 AM, Dick Hardt wrote: > > On Jun

Re: [OAUTH-WG] Report an authentication issue

2012-06-29 Thread Mike Jones
+1 to Dick's suggestion -Original Message- From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Dick Hardt Sent: Friday, June 29, 2012 11:14 AM To: John Bradley Cc: oauth@ietf.org Subject: Re: [OAUTH-WG] Report an authentication issue On Jun 29, 2012, at 11:

Re: [OAUTH-WG] Report an authentication issue

2012-06-29 Thread Dick Hardt
On Jun 29, 2012, at 11:06 AM, John Bradley wrote: > It is nice to know that I may occasionally be correct:) You must be delighted when it happens! ;) > While you may assume that it is reasonable for a client with a code to make a > request to the token endpoint including it's client_id and the

Re: [OAUTH-WG] Report an authentication issue

2012-06-29 Thread John Bradley
It is nice to know that I may occasionally be correct:) For Server based confidential clients the risks are quite minimal as Justin points out. There are likely other more interesting things you could do if you already have the ability to run arbitrary code on the server. No matter what flow

Re: [OAUTH-WG] Report an authentication issue

2012-06-29 Thread Justin Richer
It's all about how you can swipe a token and inject it into another application. It's easier to trap and inject a token in the implicit flow because it's exposed to the user agent and there's no client secret tied to the token's issuance. To get the same trick to work with the code flow on serv

Re: [OAUTH-WG] Report an authentication issue

2012-06-29 Thread Antonio Sanso
Hi John On Jun 29, 2012, at 1:43 AM, John Bradley wrote: > Authenticating to the client is NOT safe with all of the flows you are perfectly right here. At the begin of this discussion and reading your blog post I was under the impression that this "attack" was tight to the use of the implicit

Re: [OAUTH-WG] Report an authentication issue

2012-06-28 Thread John Bradley
...@ve7jtb.com] > Sent: Thursday, June 28, 2012 3:48 PM > To: Lewis Adam-CAL022 > Cc: Nat Sakimura; oauth@ietf.org > Subject: Re: [OAUTH-WG] Report an authentication issue > > Adam, > > This is getting tangled up in semantics. > > The AS authenticates the user an

Re: [OAUTH-WG] Report an authentication issue

2012-06-28 Thread Lewis Adam-CAL022
nal draft profiling OAuth for authentication, since everybody seems to at least agree that it can be profiled to do so. Tx! adam From: John Bradley [mailto:ve7...@ve7jtb.com] Sent: Thursday, June 28, 2012 3:48 PM To: Lewis Adam-CAL022 Cc: Nat Sakimura; oauth@ietf.org Subject: Re: [OAUTH-WG] Report an authen

Re: [OAUTH-WG] Report an authentication issue

2012-06-28 Thread John Bradley
Adam, This is getting tangled up in semantics. The AS authenticates the user and Authorizes the client (native App) to access the protected resource (video server) via issuing it a access token, or a authorization code that it can trade at a token endpoint for a refresh_token and access_token.

Re: [OAUTH-WG] Report an authentication issue

2012-06-28 Thread Lewis Adam-CAL022
Hi Nat, Starting from a standalone use case would be good. My impression (I may be wrong) is that your requirement is to be able to (1) Log the user identifier of the person who is accessing the resource at the resource server for the audit etc. purposes. yes ... that *and* to authenticate the

Re: [OAUTH-WG] Report an authentication issue

2012-06-27 Thread Nat Sakimura
On Tue, Jun 26, 2012 at 1:54 AM, Lewis Adam-CAL022 < adam.le...@motorolasolutions.com> wrote: [...snip...] > ** ** > > I think the above just really drives home the fact that if OAuth is to be > used for securing enterprise API calls in a post-SOAP world, something > needs to be stated more explic

Re: [OAUTH-WG] Report an authentication issue

2012-06-25 Thread Torsten Lodderstedt
okens to do the same between your local AS (== IDP) and the central AS. regards, Torsten. > >-adam > >From: Torsten Lodderstedt [mailto:tors...@lodderstedt.net] >Sent: Saturday, June 23, 2012 11:52 AM >To: Lewis Adam-CAL022 >Cc: Nat Sakimura; oauth@ietf.org >Subject: R

Re: [OAUTH-WG] Report an authentication issue

2012-06-25 Thread Igor Faynberg
Well, actually Igor missed a larger context when he said that. But when this context was pointed out to him, he humbly stood corrected and expressed interest in addressing this matter in OAuth! Igor On 6/25/2012 12:54 PM, Lewis Adam-CAL022 wrote: Okay :-) I've gotten lot of feedback ... co

Re: [OAUTH-WG] Report an authentication issue

2012-06-21 Thread Lewis Adam-CAL022
Hi Nat ... It could also be that RS is the PDP+PEP. Your model seem to fit this one. Yes, exactly! Then, you just take id_token there and PDP portion of the RS gives you the access token, which you present it to the PEP portion of the RS. if by "you" you're referring to the native client, th

Re: [OAUTH-WG] Report an authentication issue

2012-06-20 Thread Nat Sakimura
look like > the id_token of Connect. I was actually hoping to lay a path to Connect, > and use the id_token … until it was also pointed out that the id_token is > really meant for the consumption of the client, not the RS :-( > > ** ** > > ** ** > > ** ** > > *Fro

Re: [OAUTH-WG] Report an authentication issue

2012-06-20 Thread Lewis Adam-CAL022
out ... I've basically made the access-token look like the id_token of Connect. I was actually hoping to lay a path to Connect, and use the id_token ... until it was also pointed out that the id_token is really meant for the consumption of the client, not the RS :-( From: oauth-boun...@i

Re: [OAUTH-WG] Report an authentication issue

2012-06-20 Thread Justin Richer
3)If I wanted to use OAuth, the client would send an authorization request to the server's AS, which would authenticate the user of the client, and ultimately result in the client possessing an access-token. My thinking is that this access token (let's assume it's a JWT) would contain the

Re: [OAUTH-WG] Report an authentication issue

2012-06-20 Thread Igor Faynberg
for OAuth in this scenario. Igor *From:*oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] *On Behalf Of *Kristofor Selden *Sent:* Saturday, June 16, 2012 11:33 AM *To:* nov matake; oauth *Cc:* Yuchen Zhou; Luke Melia; Shuo Chen (MSR) *Subject:* Re: [OAUTH-WG] Report an authentication issue

Re: [OAUTH-WG] Report an authentication issue

2012-06-20 Thread Lewis Adam-CAL022
kens, it's just OAuth again. What am I still missing? adam From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Kristofor Selden Sent: Saturday, June 16, 2012 11:33 AM To: nov matake; oauth Cc: Yuchen Zhou; Luke Melia; Shuo Chen (MSR) Subject: Re: [OAUTH-WG] Report an aut

Re: [OAUTH-WG] Report an authentication issue

2012-06-16 Thread Kristofor Selden
t the blog post by John Bradley that you link to >> refers to the same vulnerability reported by Rui. You say that some >> apps have issued a patch to fix it. Could you explain what the fix >> was? >> >> Francisco >> >> From: Nat Sakimura >> To:

Re: [OAUTH-WG] Report an authentication issue

2012-06-15 Thread nov matake
tion/client-side/#no-jssdk > still allows the attack. > > Nat, I agree that the blog post by John Bradley that you link to > refers to the same vulnerability reported by Rui. You say that some > apps have issued a patch to fix it. Could you explain what the fix > was? > > Fr

Re: [OAUTH-WG] Report an authentication issue

2012-06-15 Thread Nat Sakimura
ix it? The >>> instructions that Facebook provides for implementing "Client-side >>> authentication without the JS SDK" at >>> https://developers.facebook.com/docs/authentication/client-side/#no-jssdk >>> still allows the attack. >>> >

Re: [OAUTH-WG] Report an authentication issue

2012-06-15 Thread Phil Hunt
y fix it? The >> instructions that Facebook provides for implementing "Client-side >> authentication without the JS SDK" at >> https://developers.facebook.com/docs/authentication/client-side/#no-jssdk >> still allows the attack. >> >> Nat, I agree that th

Re: [OAUTH-WG] Report an authentication issue

2012-06-15 Thread Nat Sakimura
ook.com/docs/authentication/client-side/#no-jssdk >> still allows the attack. >> >> Nat, I agree that the blog post by John Bradley that you link to >> refers to the same vulnerability reported by Rui. You say that some >> apps have issued a patch to fix it. Could you

Re: [OAUTH-WG] Report an authentication issue

2012-06-15 Thread Francisco Corella
en >Zhou ; oauth ; Shuo Chen (MSR) > >Sent: Friday, June 15, 2012 3:06 PM >Subject: Re: [OAUTH-WG] Report an authentication issue > > >Hi, Francisco >  >Thank you for your reply. Here is our response for your questions. > >Ø  the attack you describe can be carried o

Re: [OAUTH-WG] Report an authentication issue

2012-06-15 Thread Nat Sakimura
ability reported by Rui. You say that some > apps have issued a patch to fix it. Could you explain what the fix > was? > > Francisco > > -- > *From:* Nat Sakimura > *To:* rui wang > *Cc:* matake nov ; Yuchen Zhou ; > oauth ; Shuo Chen (MSR) > *Sent:* Thursday, June 14, 20

Re: [OAUTH-WG] Report an authentication issue

2012-06-15 Thread Phil Hunt
nt: Friday, June 15, 2012 3:59 PM > To: rui wang > Cc: Francisco Corella; matake nov; Yuchen Zhou; oauth; Shuo Chen (MSR) > Subject: Re: [OAUTH-WG] Report an authentication issue > > I am a bit confused. > > It sounds like you are sniffing a bearer token from an unsecured

Re: [OAUTH-WG] Report an authentication issue

2012-06-15 Thread Phil Hunt
ent-side > authentication without the JS SDK" at > https://developers.facebook.com/docs/authentication/client-side/#no-jssdk > still allows the attack. > > Nat, I agree that the blog post by John Bradley that you link to > refers to the same vulnerability reported by Rui. Y

Re: [OAUTH-WG] Report an authentication issue

2012-06-15 Thread rui wang
refers to the same vulnerability reported by Rui. You say that some > apps have issued a patch to fix it. Could you explain what the fix > was? > > Francisco > > ------ > *From:* Nat Sakimura > *To:* rui wang > *Cc:* matake nov ; Yuchen Z

Re: [OAUTH-WG] Report an authentication issue

2012-06-15 Thread Francisco Corella
Shuo Chen (MSR) >Sent: Thursday, June 14, 2012 1:50 PM >Subject: Re: [OAUTH-WG] Report an authentication issue > > >This is a fairly well known (hopefully by now) issue. We, at the OpenID >Foundation, call it "access_token phishing" attack these days. >See: h

Re: [OAUTH-WG] Report an authentication issue

2012-06-14 Thread Nat Sakimura
This is a fairly well known (hopefully by now) issue. We, at the OpenID Foundation, call it "access_token phishing" attack these days. See: http://www.thread-safe.com/2012/01/problem-with-oauth-for-authentication.html Nov Matake has actually built the code on iPhone to verify the problem, and has

[OAUTH-WG] Report an authentication issue

2012-06-14 Thread rui wang
Dear Facebook Security Team and OAuth Standard group, We are a research team in Microsoft Research. In January, 2011, we reported a vulnerability in Facebook Connect which allowed everyone to sign into Facebook-secured relying parties without password. It was promptly fixed after reporting. ( http