Re: [apps-discuss] [OAUTH-WG] [http-state] HTTP MAC Authentication Scheme

Eran Hammer-Lahav <eran@hueniverse.com> Mon, 13 June 2011 07:26 UTC

Return-Path: <eran@hueniverse.com>
X-Original-To: apps-discuss@ietfa.amsl.com
Delivered-To: apps-discuss@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EC1F121F84BC for <apps-discuss@ietfa.amsl.com>; Mon, 13 Jun 2011 00:26:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.413
X-Spam-Level:
X-Spam-Status: No, score=-2.413 tagged_above=-999 required=5 tests=[AWL=0.186, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NtIucvyxHGS2 for <apps-discuss@ietfa.amsl.com>; Mon, 13 Jun 2011 00:26:58 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by ietfa.amsl.com (Postfix) with SMTP id 5A49D21F84BA for <apps-discuss@ietf.org>; Mon, 13 Jun 2011 00:26:58 -0700 (PDT)
Received: (qmail 13399 invoked from network); 13 Jun 2011 07:26:54 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 13 Jun 2011 07:26:53 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Mon, 13 Jun 2011 00:26:53 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Tim <tim-projects@sentinelchicken.org>, Robert Sayre <sayrer@gmail.com>
Date: Mon, 13 Jun 2011 00:26:37 -0700
Thread-Topic: [OAUTH-WG] [http-state] [apps-discuss] HTTP MAC Authentication Scheme
Thread-Index: Acwms3fxX3rJ7OFlSrWL/fhQrFzuuQC5jjtg
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234475E774395@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E723447581DA8EA@P3PW5EX1MB01.EX1.SECURESERVER.NET> <BANLkTikpQNyQdr9oWHhtJ7a7d-4ri0CNdA@mail.gmail.com> <09c801cc24c2$a05bae00$e1130a00$@packetizer.com> <BANLkTin30NVzYVV1m4gmyh42DWs-nSQpAg@mail.gmail.com> <00f101cc255e$2d426020$87c72060$@packetizer.com> <BANLkTimn8c72p5bjwHNapW9kVCVBmNbC4w@mail.gmail.com> <015801cc25ab$063a2150$12ae63f0$@packetizer.com> <20110608153225.GL1565@sentinelchicken.org> <90C41DD21FB7C64BB94121FBBC2E7234475E773C73@P3PW5EX1MB01.EX1.SECURESERVER.NET> <BANLkTi=Qg=q066rAHkhFrsHBb3Yu4hWYFA@mail.gmail.com> <20110609144224.GR1565@sentinelchicken.org>
In-Reply-To: <20110609144224.GR1565@sentinelchicken.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>, "apps-discuss@ietf.org" <apps-discuss@ietf.org>
Subject: Re: [apps-discuss] [OAUTH-WG] [http-state] HTTP MAC Authentication Scheme
X-BeenThere: apps-discuss@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: General discussion of application-layer protocols <apps-discuss.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/apps-discuss>, <mailto:apps-discuss-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/apps-discuss>
List-Post: <mailto:apps-discuss@ietf.org>
List-Help: <mailto:apps-discuss-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/apps-discuss>, <mailto:apps-discuss-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Jun 2011 07:26:59 -0000

> -----Original Message-----
> From: Tim [mailto:tim-projects@sentinelchicken.org]
> Sent: Thursday, June 09, 2011 7:42 AM
> To: Robert Sayre
> Cc: Eran Hammer-Lahav; OAuth WG; apps-discuss@ietf.org
> Subject: Re: [OAUTH-WG] [http-state] [apps-discuss] HTTP MAC
> Authentication Scheme
> 
> > Digest has a bunch of problems. See this document
> >
> > http://tools.ietf.org/html/draft-ietf-httpbis-security-properties-05#s
> > ection-2.2.2
> >
> > for a short tour of them.
> 
> Thanks for the link.  I totally agree with all of this, and in fact there are more
> MitM attacks possible than are alluded to in that document. This is one of the
> two reasons I brought up Digest initially.  The MAC proposal does not appear
> to provide any additional security over Digest, and yet Digest is still
> susceptible to MitM attacks.
> 
> We can pick and prod at the MAC proposal all we want from a security
> perspective, but we'll probably end up at the same place that Digest is at,
> security-wise.  We'll still have a protocol that can't defend against MitM
> attacks.  So what is the point in providing integrity again?
> 
> We need to use TLS.  Everywhere.

Sure.
 
> The more you look at advanced web attacks (MitM downgrade attacks, DNS
> rebinding attacks, etc), the more you realize that most of these are
> addressed by TLS if only it were used everywhere.
> 
> It's fine to bring out special-purpose authentication protocols.
> Authentication can happen in a variety of ways either within TLS or tunneled
> over it (hopefully with channel binding), but don't pretend you'll be doing
> anyone favors by trying to provide partial integrity protection that is
> ultimately ineffective.  Just focus on better authentication and
> key/certificate management and let TLS do the rest.

Modern web applications require a lot of third-party hosted services: analytics, advertising, plug-ins, etc. Until everyone deploys TLS, including such non-TLS bits in a TLS page cause the browser to show a broken TLS state in the address bar. For most web users, that's more of a red flag (valid TLS but with some resources loaded without TLS) than no TLS at all. The reality is that it is really hard to deploy TLS applications today without having issues with at least one vendor (especially when that vendor is an ad network you rely on for your profits).

So while we wait for the web to catch up and deploy TLS (and this effort does not delay that), we should try and do something about trivial attacks like Firesheep. Yes, adding MAC to cookies without TLS does not provide anywhere near the protection of TLS, but it is better than nothing, when TLS is not available.

Note that the MAC authentication scheme is not exclusively about cookies, and has value beside just making session cookies better.

EHL