Re: [jose] Richard Barnes' Discuss on draft-ietf-jose-json-web-signature-33: (with DISCUSS and COMMENT)

Mike Jones <Michael.Jones@microsoft.com> Tue, 21 October 2014 18:59 UTC

Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: jose@ietfa.amsl.com
Delivered-To: jose@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5BAFC1A87C3; Tue, 21 Oct 2014 11:59:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Sje4szrC7vtP; Tue, 21 Oct 2014 11:59:42 -0700 (PDT)
Received: from na01-by2-obe.outbound.protection.outlook.com (mail-by2on0138.outbound.protection.outlook.com [207.46.100.138]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 627FF1A8775; Tue, 21 Oct 2014 11:59:42 -0700 (PDT)
Received: from BN3PR0301CA0048.namprd03.prod.outlook.com (25.160.152.144) by DM2PR03MB400.namprd03.prod.outlook.com (10.141.84.153) with Microsoft SMTP Server (TLS) id 15.0.1054.13; Tue, 21 Oct 2014 18:59:40 +0000
Received: from BN1AFFO11FD030.protection.gbl (2a01:111:f400:7c10::104) by BN3PR0301CA0048.outlook.office365.com (2a01:111:e400:401e::16) with Microsoft SMTP Server (TLS) id 15.0.1054.13 via Frontend Transport; Tue, 21 Oct 2014 18:59:40 +0000
Received: from mail.microsoft.com (131.107.125.37) by BN1AFFO11FD030.mail.protection.outlook.com (10.58.52.168) with Microsoft SMTP Server (TLS) id 15.0.1049.20 via Frontend Transport; Tue, 21 Oct 2014 18:59:39 +0000
Received: from TK5EX14MBXC286.redmond.corp.microsoft.com ([169.254.1.93]) by TK5EX14HUBC102.redmond.corp.microsoft.com ([157.54.7.154]) with mapi id 14.03.0210.003; Tue, 21 Oct 2014 18:58:53 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Richard Barnes <rlb@ipv.sx>, Jim Schaad <ietf@augustcellars.com>
Thread-Topic: [jose] Richard Barnes' Discuss on draft-ietf-jose-json-web-signature-33: (with DISCUSS and COMMENT)
Thread-Index: Ac/nrOuRDqkag9cnQbuqhrjolD201QDgToaAAFQcxoAAOFOo0A==
Date: Tue, 21 Oct 2014 18:58:52 +0000
Message-ID: <4E1F6AAD24975D4BA5B16804296739439BB1E2D8@TK5EX14MBXC286.redmond.corp.microsoft.com>
References: <4E1F6AAD24975D4BA5B16804296739439BB0D32E@TK5EX14MBXC286.redmond.corp.microsoft.com> <00e501cfeb2e$26744210$735cc630$@augustcellars.com> <CAL02cgTbaZyq0oDnA6nO_FX9TzzWg3d4d=6oNT0VHcCb5_C3Lw@mail.gmail.com>
In-Reply-To: <CAL02cgTbaZyq0oDnA6nO_FX9TzzWg3d4d=6oNT0VHcCb5_C3Lw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [157.54.51.35]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(10019020)(6009001)(438002)(43784003)(189002)(199003)(51704005)(106466001)(81156004)(44976005)(230783001)(6806004)(68736004)(69596002)(76482002)(19580395003)(15975445006)(31966008)(85306004)(50986999)(107046002)(95666004)(120916001)(84676001)(99396003)(33656002)(92726001)(50466002)(86362001)(92566001)(55846006)(87936001)(85806002)(2656002)(4396001)(76176999)(86612001)(54356999)(104016003)(15202345003)(20776003)(47776003)(66066001)(80022003)(64706001)(97736003)(46102003)(26826002)(85852003)(21056001)(23676002)(77096002); DIR:OUT; SFP:1102; SCL:1; SRVR:DM2PR03MB400; H:mail.microsoft.com; FPR:; MLV:ovrnspm; PTR:InfoDomainNonexistent; MX:1; A:1; LANG:en;
X-Microsoft-Antispam: UriScan:;
X-Microsoft-Antispam: BCL:0;PCL:0;RULEID:;SRVR:DM2PR03MB400;
X-O365ENT-EOP-Header: Message processed by - O365_ENT: Allow from ranges (Engineering ONLY)
X-Forefront-PRVS: 0371762FE7
Received-SPF: Pass (protection.outlook.com: domain of microsoft.com designates 131.107.125.37 as permitted sender) receiver=protection.outlook.com; client-ip=131.107.125.37; helo=mail.microsoft.com;
Authentication-Results: spf=pass (sender IP is 131.107.125.37) smtp.mailfrom=Michael.Jones@microsoft.com;
X-OriginatorOrg: microsoft.onmicrosoft.com
Archived-At: http://mailarchive.ietf.org/arch/msg/jose/S35xmkG25IY4RdFs8LDK9uP-0Cc
Cc: "jose-chairs@tools.ietf.org" <jose-chairs@tools.ietf.org>, The IESG <iesg@ietf.org>, "jose@ietf.org" <jose@ietf.org>, "draft-ietf-jose-json-web-signature@tools.ietf.org" <draft-ietf-jose-json-web-signature@tools.ietf.org>
Subject: Re: [jose] Richard Barnes' Discuss on draft-ietf-jose-json-web-signature-33: (with DISCUSS and COMMENT)
X-BeenThere: jose@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Javascript Object Signing and Encryption <jose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/jose>, <mailto:jose-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/jose/>
List-Post: <mailto:jose@ietf.org>
List-Help: <mailto:jose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/jose>, <mailto:jose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Oct 2014 18:59:49 -0000

> > > > > DISCUSS:
> > > > > ------------------------------------------------------------------
> > > > > --
> > > > > --
> > > > >
> > > > > Section 6.
> > > > > """
> > > > > These Header Parameters MUST be integrity protected if the
> > > > > information that they convey is to be utilized in a trust decision.
> > > > > """
> > > > > This smells really fishy to me.  What's your attack scenario?  I'm
> > > > > pretty certain that there's no way any of these fields can be
> > > > > altered in such a way that (1) the signature will validate, and
> > > > > (2) the recipient will accept a key it shouldn't.  By way of
> > > > > contrast, CMS doesn't sign the certificate fields, and the
> > > > > Certificate payload in TLS is only signed as a side effect of the
> > > > > protocol's verification that the
> > > remote end has been the same through the whole handshake (which
> > > doesn't apply here).
> > > >
> > > > The attack scenario is trivial to describe.  If an attacker can
> > > > change
> > > information used in a trust decision, the trust decision has no
> > > validity.  Unless the information is integrity-protected, the attacker
> > > could change the non- integrity-protected portions of the JWS in an
> > undetectable way.
> > > >
> > > > That's hand waving, not an attack scenario.  Allow me to elaborate on
> > this:
> > > >
> > > > There is no possible attack scenario for the key identifiers that
> > > > identify a *key*
> > > (vs. a cert) -- jwk, jku, and kid.  For any given signed object, there
> > > is exactly one key that can validate the signature (otherwise the
> > > crypto is broken).  If the attacker changes the validation key, then
> > > the signature won't validate.  So there is no need to integrity
> > > protect these headers, since there's no point to the attacker changing
> > them.  RFC 2634 actually has text to this effect:
> There is a difference between how a key is referenced and how a key reference is used in a trust decision.
> 
> This is the difference between:
> Here is where you go to get the key, and you know the key is associated with the entity because you have it in your database someplace, and
> Here is where you go to get the key, and you know the key is associated with the entity because the URL is parsed to get that information.
> 
> In the first case, there is no need to sign the pointer to the key.  In the second case there is.  Possible attack below:
> 
> If you use the URL:  "https://augustcellars.com/jose-signing-key" and you make a trust decision that the key is associated with augustcellars.com, then this should be signed.  If  not then it the same key could be published by "https://augustwest.com/jose-signing-key" (just a simple copy) and the jku changed to point to the new address.  In this case you don't know who actually signed the object, just that the key can be used to verify the signature successfully.
> 
> I'm not clear on what security property you think this is violating.
> 
> If you've made the decision to trust both augustcellars.com and augustwest.com to assert trusted keys, then you've trusted augustwest.com and there's no issue.
> If you're using the domain name in the HTTPS URI to identify the signer, then all augustwest.com can do is make it look as though it signed the object, which it could have done anyway with a different key.  It can't make it look as though augustcellars.com signed the object when it didn't.
> Still not seeing an attack here.

I think Jim laid out the attack pretty clearly, but I understand that perceptions vary.  Given that you're asking to relax the security properties of the draft and Jim believes that the current language mitigates a real attack or attacks, I don't think that as editor I should relax the security properties without clear direction from the working group to do so, and in particular, without an agreement from Jim that the attack isn't real or doesn't matter.  Discussions can obviously continue on this, and at least as I see it, will need to unless you're willing to declare yourself in the rough on this, Richard.

				Thanks again,
				-- Mike

> --Richard
> 
>  
> 
> Jim
> 
> > > >
> > > > """
> > > >    The first version of this attack is a simple denial of service attack
> > > >    where an invalid certificate is substituted for the valid
> > > >    certificate. This renders the message unverifiable, as the public key
> > > >    in the certificate no longer matches the private key used to sign the
> > > >    message.
> > > > """
> > >
> > > It's not clear to me that enabling the attacker to substitute keys and
> > > get the recipient to attempt to validate the signature with a key of
> > > the attacker's choosing doesn't constitute at least a portion of a
> > > viable attack scenario.  It may or may not (knowing for sure is beyond
> > > my specific cryptographic expertise in this area) and it may not now
> > > but may be in the future (when new attacks are created).  Requiring
> > > these parameters to be integrity protected when used in a trust decision
> > does no harm and may do substantial good.
> > >
> > > > With regard to the certificate identifiers ("x5u", "x5c", "x5t", and
> > > > "x5t#S256"),
> > > the risks that Jim points out [RFC2634, Section 5] are real, but only
> > > apply in certain narrow circumstances.  Namely, the only time a risk
> > > arises is when two certificates have been issued for the same public key,
> > with different attributes.
> > > This is exceedingly rare in practice, and all current secure messaging
> > > systems get along fine without protection against this attack.  And it
> > > might not even be an attack -- you could envision cases with "x5u"
> > > where the signer purposely presents different certificates to different
> > relying parties!
> > > > So the blanket requirement that these fields MUST be integrity
> > > > protected is not
> > > appropriate.  It is only required for certain special situations using
> > certificates.
> > > Proposed revision:
> > > > Delete: "These Header Parameters MUST be integrity protected if the
> > > information that they convey is to be utilized in a trust decision."
> > >
> > > Researching the history a bit more, this text was added to address
> > > issue #104
> > > http://trac.tools.ietf.org/wg/jose/trac/ticket/104 raised by Jim
> > > Schaad.  Unless Jim agrees that it is now somehow unnecessary, I don't
> > > believe that it's reasonable for us to now remove it.  Also, see Jim's
> > > related comments about trust statements and trust decisions in issue #74.
> > >
> > > > Add new paragraph: "In situations where multiple certificates with
> > > > different
> > > attributes may be issued over the same public key, there is a risk
> > > that one of these certificates may be substituted for another. In such
> > > situations, the creator of a JWS object MUST integrity protect the "x5u",
> > "x5c", "x5t", and "x5t#S256"
> > > attributes, if present."
> > > >
> > > > For what it's worth, Sean had us add language in a number of places
> > > > that
> > > basically said that information is only as trustworthy as its source
> > > and the means by which it is obtained.  If I remember correctly, this was
> > one of those places.
> > > >