Re: [Ietf-http-auth] Re: [dix] Notes on Web authentication enhancements
"Ben Laurie" <benl@google.com> Mon, 03 July 2006 13:47 UTC
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
by megatron.ietf.org with esmtp (Exim 4.43)
id 1FxOlc-0003mc-Jj; Mon, 03 Jul 2006 09:47:12 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
by megatron.ietf.org with esmtp (Exim 4.43) id 1FxOlb-0003mV-HJ
for dix@ietf.org; Mon, 03 Jul 2006 09:47:11 -0400
Received: from smtp-out.google.com ([216.239.45.12])
by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FxOlY-00057X-8F
for dix@ietf.org; Mon, 03 Jul 2006 09:47:11 -0400
Received: from chris.corp.google.com (chris.corp.google.com [172.24.0.146])
by smtp-out.google.com with ESMTP id k63Dl3q9005781
for <dix@ietf.org>; Mon, 3 Jul 2006 06:47:03 -0700
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns;
h=received:message-id:date:from:to:subject:cc:in-reply-to:
mime-version:content-type:content-transfer-encoding:
content-disposition:references;
b=D1ovQVKZmSqyX6vD3Q8q8tBcqj8Vnqf7YZWhusElf4383xP7lUYpToirJurF7EKM+
nKFyc1GJHjtcWgzPjRs8Q==
Received: from smtp-out2.google.com (fpx33.prod.google.com [10.253.24.33])
by chris.corp.google.com with ESMTP id k63DjvoL029723
for <dix@ietf.org>; Mon, 3 Jul 2006 06:46:57 -0700
Received: by smtp-out2.google.com with SMTP id 33so432045fpx
for <dix@ietf.org>; Mon, 03 Jul 2006 06:46:57 -0700 (PDT)
Received: by 10.253.1.18 with SMTP id 18mr989442fpa;
Mon, 03 Jul 2006 06:46:57 -0700 (PDT)
Received: by 10.253.14.2 with HTTP; Mon, 3 Jul 2006 06:46:57 -0700 (PDT)
Message-ID: <1b587cab0607030646kfcfeeau726596d097a55a5b@mail.google.com>
Date: Mon, 3 Jul 2006 14:46:57 +0100
From: "Ben Laurie" <benl@google.com>
To: "Sam Hartman" <hartmans-ietf@mit.edu>
Subject: Re: [Ietf-http-auth] Re: [dix] Notes on Web authentication
enhancements
In-Reply-To: <tsl3bdoiq9g.fsf@cz.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
References: <20060619220742.40B85222427@laser.networkresonance.com>
<tsl3bdoiq9g.fsf@cz.mit.edu>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 6d95a152022472c7d6cdf886a0424dc6
Cc: Digital Identity Exchange <dix@ietf.org>,
ietf-http-auth@lists.osafoundation.org
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org
On 6/29/06, Sam Hartman <hartmans-ietf@mit.edu> wrote: > Hi. > > First, I'd like to thank you for this excellent starting point for the > discussion. I do have a few comments, but this is a great taxonomy. > > > > Requirements > > 2. Hijack-Resistant Authentication (HRA) > An authentication system in which credentials which are bound to > protocol messages in such a way that attacker who observes the > credentials can't use them to authenticate messages of their > choice. The rationale for this feature is to make cut-and-paste > attacks difficult. > > > I think this description and the subsequent discussion in > transporting/binding credentials has some concepts I'd like to > distinguish muddled together. > > Some schemes will provide integrity: a man in the middle can observe > the conversation but cannot modify the content of the request or > response. > > Some schemes will provide confidentiality even given the practical > difficulties with server certificate validation. > > I argue in section 4.5 and 5 of version 01 of my phishing requirements > draft that providing confidentiality of the resulting page is > important even given these practical server certificate issues. So, > I'd like to ask you to add that as a potential requirement I might want so I can ask for it. > Also, let's be careful to distinguish this from HRA. > > > You don't seem to have a requirement that corresponds to section 4.6 > of 01 of my phishing requirements draft. This was one of the issues > muddled into the confusing mutual authentication section in 00 of my > draft. I contend that if there are a small number of RPs that by > policy should be allowed to accept a given identity,there is a > security benefit in restricting the identity to only those RPs. In > particular, if a user successfully authenticates the user knows that > because their identity was successfully accepted, they have > authenticated to one of the valid RPs. I'd be happy to discuss > specific customer deployments where this will be useful with you > off-list. I understand based on your review of my 00 draft that you > don't like this requirement. I still think it reasonable to discuss. > > > > TLS Client AUthentication > > Your taxonomy assumes that TLS is a valid approach to client > authentication. As I understand HTTP, that is only true assuming > there are no proxies between the user and the RP. HTTP proxies support the CONNECT method for this (all they do is copy the raw connection data in both directions). Note that if proxies didn't do this, then server authentication would also be impossible. > We could extend HTTP to allow a proxy to assert authentication > information it received via TLS to the next hop. It might be possible > but would be more challenging to extend HTTP so that a client could > give a proxy credentials to use for TLS client authentication outbound > from that proxy. I think these issues are important to consider when > comparing how credentials and authentication are transported. > (Personally, I wish we could just ignore the whole issue of proxies. > I don't think that will be acceptable to the market though.) > > > > Transporting and Binding Credentials > > > An additional issue is hijacking: without cryptographic > binding, an attacker who observes a request can make future > requests in the name of the user via a cut-and-paste attack > (remember, the token is bearer). If you take the threat of > this type of attack seriously, you need to run the traffic > over SSL/TLS. [1] > > > [1] Note that if you're worried about this class of attack, you need > *every* PDU to be cryptographically bound to the credential with > all designs. If, for instance, you use cert-based auth but then > transition to cookies over HTTP for state management, there's a > cut-and-paste attack there. > > > I think the primary paragraph is misleading. We've started from an > assumption that there are practical problems that prevent server certificates from being validated. Given this assumption I don't understand how TLS actually gives us protection against the hijacking. > > I also think the footnote ignores an important deployment model. I > may be concerned about whether I have reached the right RP while not > concerned about network level hijacking. So I'm not at all convinced > that you always need to protect every exchange if you are concerned > about hijacking in some situations. > > Thanks again for your excellent work and for your consideration of my > comments. > > --Sam > > _______________________________________________ > Ietf-http-auth mailing list > Ietf-http-auth@osafoundation.org > http://lists.osafoundation.org/cgi-bin/mailman/listinfo/ietf-http-auth > _______________________________________________ dix mailing list dix@ietf.org https://www1.ietf.org/mailman/listinfo/dix
- [dix] Notes on Web authentication enhancements Eric Rescorla
- [dix] RE: [Ietf-http-auth] Notes on Web authentic… Hallam-Baker, Phillip
- Re: [dix] RE: [Ietf-http-auth] Notes on Web authe… Sam Hartman
- [dix] Re: [Ietf-http-auth] Notes on Web authentic… Mark Nottingham
- [dix] Re: [Ietf-http-auth] Notes on Web authentic… Eric Rescorla
- [dix] Re: [Ietf-http-auth] Notes on Web authentic… Dick Hardt
- [dix] Re: [Ietf-http-auth] Notes on Web authentic… Dick Hardt
- [dix] Re: [Ietf-http-auth] Notes on Web authentic… Dick Hardt
- [dix] Re: [Ietf-http-auth] Notes on Web authentic… Eric Rescorla
- [dix] Re: [Ietf-http-auth] Notes on Web authentic… Eric Rescorla
- [dix] Re: [Ietf-http-auth] Notes on Web authentic… Dick Hardt
- Re: [dix] Re: [Ietf-http-auth] Notes on Web authe… Ben Laurie
- Re: [dix] Re: [Ietf-http-auth] Notes on Web authe… Ben Laurie
- Re: [dix] Re: [Ietf-http-auth] Notes on Web authe… Dick Hardt
- [dix] Re: [Ietf-http-auth] Notes on Web authentic… Stephan Fowler
- [dix] Re: [Ietf-http-auth] Notes on Web authentic… Mark Nottingham
- [dix] Re: [Ietf-http-auth] Notes on Web authentic… Eric Rescorla
- [dix] Re: [Ietf-http-auth] Notes on Web authentic… Eric Rescorla
- [dix] Re: [Ietf-http-auth] Notes on Web authentic… Mark Nottingham
- [dix] RE: [Ietf-http-auth] Notes on Web authentic… Hallam-Baker, Phillip
- [dix] Re: [Ietf-http-auth] Notes on Web authentic… Dick Hardt
- [dix] BOF plans (Was: Notes on Web authentication… Pete Resnick
- [dix] Re: [Ietf-http-auth] Notes on Web authentic… Robert Sayre
- [dix] Re: [Ietf-http-auth] Notes on Web authentic… Joe Orton
- Re: [dix] BOF plans (Was: Notes on Web authentica… Ben Laurie
- [dix] Re: [Ietf-http-auth] Notes on Web authentic… Stephan Fowler
- Re: [dix] Re: [Ietf-http-auth] Notes on Web authe… Eliot Lear
- Re: [dix] BOF plans (Was: Notes on Web authentica… Eliot Lear
- [dix] Re: [Ietf-http-auth] Notes on Web authentic… Robert Sayre
- Re: [dix] Re: [Ietf-http-auth] Notes on Web authe… Eric Rescorla
- Re: [Ietf-http-auth] Re: [dix] BOF plans (Was: No… thayes0993
- Re: [Ietf-http-auth] Re: [dix] BOF plans (Was: No… Eliot Lear
- Re: [Ietf-http-auth] Re: [dix] BOF plans (Was: No… Robert Sayre
- Re: [dix] BOF plans (Was: Notes on Web authentica… John Merrells
- Re: [Ietf-http-auth] Re: [dix] BOF plans (Was: No… Gavin Baumanis
- Re: [dix] Notes on Web authentication enhancements Sam Hartman
- Re: [dix] BOF plans Sam Hartman
- [dix] Google Account Authorization - slightly off… Dick Hardt
- Re: [Ietf-http-auth] Re: [dix] BOF plans Sam Hartman
- Re: [dix] Google Account Authorization - slightly… Ben Laurie
- Re: [Ietf-http-auth] Re: [dix] Notes on Web authe… Ben Laurie
- Re: [Ietf-http-auth] Re: [dix] BOF plans (Was: No… Ben Laurie
- Re: [Ietf-http-auth] Re: [dix] Notes on Web authe… Eric Rescorla
- Re: [Ietf-http-auth] Re: [dix] Notes on Web authe… Sam Hartman
- Re: [Ietf-http-auth] Re: [dix] Notes on Web authe… Sam Hartman
- Re: [Ietf-http-auth] Re: [dix] Notes on Web authe… Eric Rescorla
- Re: [dix] Re: [Ietf-http-auth] Notes on Web authe… Sam Hartman
- Re: [Ietf-http-auth] Re: [dix] Notes on Web authe… Sam Hartman
- Re: [Ietf-http-auth] Re: [dix] Notes on Web authe… Eric Rescorla
- Re: [Ietf-http-auth] Re: [dix] Notes on Web authe… Sam Hartman
- Re: [Ietf-http-auth] Re: [dix] Notes on Web authe… Gavin Baumanis
- Re: [dix] Re: [Ietf-http-auth] Notes on Web authe… Dick Hardt
- Re: [dix] Re: [Ietf-http-auth] Notes on Web authe… Sam Hartman