Re: [jose] [Cfrg] RFC Draft: PASETO - Platform-Agnotic SEcurity TOkens

Neil Madden <neil.e.madden@gmail.com> Mon, 23 April 2018 16:43 UTC

Return-Path: <neil.e.madden@gmail.com>
X-Original-To: jose@ietfa.amsl.com
Delivered-To: jose@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2477412D86A; Mon, 23 Apr 2018 09:43:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vEx3WuERg2EJ; Mon, 23 Apr 2018 09:43:29 -0700 (PDT)
Received: from mail-wr0-x22a.google.com (mail-wr0-x22a.google.com [IPv6:2a00:1450:400c:c0c::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 75A0112D86E; Mon, 23 Apr 2018 09:43:29 -0700 (PDT)
Received: by mail-wr0-x22a.google.com with SMTP id p5-v6so15321225wre.12; Mon, 23 Apr 2018 09:43:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=ZcFD5jt65Gx2YcBO/WVu28oyWo6kAOE3UXrPdq7zd0U=; b=pfHUJWzvBmYVtuu/Q5biUjwp2WCqCG/G7j8hs87W/2obG54J5KUMgrsUGotBXKFIuk ocnGKjf9UnCbDqh6m/abKB5HqSUrU1te2re0TnLPiWakYtoYR4yFsHcQ+riNgET2T3+F J31h6plphu4uN4NNNnPmSLFM7ceKlPHSPj4uX6DfJQfTNDSlz/KaZqR5V714fJwdklJq jgVWmLiqx0PL3tFlhywllycANgy+bq5VNRJvk/lKSsCoK/RchLzUoCDYowIFjYysbluK Js4KePXiyDp/fLm4wz8M/+ha+sVX0AdMkDeaqLcxndL+17mqr/5xw/PLAWrNchzljjE2 faZQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=ZcFD5jt65Gx2YcBO/WVu28oyWo6kAOE3UXrPdq7zd0U=; b=Y5rkJCnp/hDOAoALpluNkw52cWMqBiY6XENWlOAeNqKCCV6bTwHbsxJGyI8DGRneuW VItuJsxpI6dxddEutrbHr0acFbNJo5T3pH3a7ypABvvD6AB4wqVSMtB/jR4PbXPIa+7Y 7Bv2Hlloz0+idsH0ksb8NOctknYNok7G7vgiWYR0LARh1wRhTHWixUhB8xmPgDE9B6hU gD7hPGbQxZK5tpRV/GiNjwDC2nMJZ8u3CS8tAWJjQ7JcbKz0+A4B8+//+lCAKQI4fHc5 X2Nb30oLxwe6wCd/Fe+3XT5akTH/CDMdWa4w2InrcBy9lHLxaKsiFxAyaq1Qqrr/2r2Z 5bLQ==
X-Gm-Message-State: ALQs6tCIjaYTWNbT5No7Hm/BC2Acjg/8GhuzfxJzo/ll609gK4+dtDzK N9sWK6irexevFk9MSJJZC/I2wqGsKfU=
X-Google-Smtp-Source: AIpwx48qeEQRueb+Omqc1RAexjzhXaYpGb4pd6w84w0zs0JVUArTPKNo7Ew7N8NKmX9wuOeyLECebw==
X-Received: by 10.28.12.129 with SMTP id 123mr9811810wmm.75.1524501807897; Mon, 23 Apr 2018 09:43:27 -0700 (PDT)
Received: from guest2s-mbp.home (72.142.200.146.dyn.plus.net. [146.200.142.72]) by smtp.gmail.com with ESMTPSA id n14-v6sm15221857wrj.16.2018.04.23.09.43.25 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 23 Apr 2018 09:43:26 -0700 (PDT)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 11.3 \(3445.6.18\))
From: Neil Madden <neil.e.madden@gmail.com>
In-Reply-To: <CACf5n78R3Fur_eunfiQnM9+enbV5vrXs8aW1sfmU6HhV6_3WVA@mail.gmail.com>
Date: Mon, 23 Apr 2018 17:43:25 +0100
Cc: Mike Jones <Michael.Jones=40microsoft.com@dmarc.ietf.org>, Carsten Bormann <cabo@tzi.org>, "cfrg@ietf.org" <cfrg@ietf.org>, "jose@ietf.org" <jose@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <9F9C6A42-0E89-4AB9-915C-8B208D9C31FD@gmail.com>
References: <CAKws9z15m6WY+-mz5D01vxB4s-TE7nQN56=ssYt=vz3z4gAj6A@mail.gmail.com> <DBC2F048-C949-4362-8FD0-A43A54767B03@gmail.com> <CAKws9z277JLfv7Pb9wSkJ7zYR8FzoAfiXuFS6Vq0x32-3bWx7Q@mail.gmail.com> <DB58CEFE-ED93-4C1C-9212-B622DFCCFFB9@gmail.com> <A6784DBB-C147-40B7-8A5C-E96F431020F6@tzi.org> <SN6PR00MB0301F595CF57BF58D4BAA4D2F5B40@SN6PR00MB0301.namprd00.prod.outlook.com> <CACf5n78R3Fur_eunfiQnM9+enbV5vrXs8aW1sfmU6HhV6_3WVA@mail.gmail.com>
To: David Adrian <davadria@umich.edu>
X-Mailer: Apple Mail (2.3445.6.18)
Archived-At: <https://mailarchive.ietf.org/arch/msg/jose/sz6XzHkVP2eWip_OiV5OkPggWWA>
Subject: Re: [jose] [Cfrg] RFC Draft: PASETO - Platform-Agnotic SEcurity TOkens
X-BeenThere: jose@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Javascript Object Signing and Encryption <jose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/jose>, <mailto:jose-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/jose/>
List-Post: <mailto:jose@ietf.org>
List-Help: <mailto:jose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/jose>, <mailto:jose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Apr 2018 16:43:34 -0000

> On 23 Apr 2018, at 14:44, David Adrian <davadria@umich.edu> wrote:
> 
> > If we have to invent a new standard each time an existing standard is implemented with a security flaw, we have a lot of work to do.
> 
> You fundamentally cannot fix a standard with unusable to the point of broken negotiation by extending the negotiation. If you don't want PASETO to be a new standard, call it JOSEv3.

I don’t believe that PASETO is actually fundamentally different from JOSE in this respect. Is there a meaningful distinction between v1.local.<token> and {“alg”:”v1.local”}.<token> ?

One of the critical vulnerabilities historically in JOSE implementations was [1], whereby if an implementation was using RSA signed JWTs an attacker could get the server’s public key and use it as if it was a HMAC key to produce a forged JWT with {“alg”:”HS256”} in the header. If the JWT library just provided a verify(String jwt, Key key) function then it might be tricked into using the attacker’s choice of algorithm (HS256) with the server’s RSA public key and the JWT would validate. Oops!

This flaw has been rightly criticised, including by the authors of PASETO. Don’t let the attacker chose the algorithm!

But wait, aren’t PASETO implementations potentially vulnerable to *exactly the same vulnerability*?! If my server is set up to use v2.public (Ed25519) signed PASETO tokens, what is to stop an attacker grabbing my Ed25519 public key (which is a 32 byte value) and using it to create a PASETO token using v2.local? Recall that v2.local takes a 32 byte symmetric key. If the PASETO library just has a function verify(String paseto, Key key) and looks at the header to decide how to process the token, then it will have exactly the same vulnerability that those JOSE libraries had. So how does PASETO the spec make this vulnerability less likely?

Looking at the reference implementation [2], it seems that if the library user didn’t set an allowed purpose then the only thing stopping this is a type check on the public key class. In other words, the implementor took extra safe-guards beyond those documented in the specification. Phew!

Am I missing something here? As far as I can tell, the PASETO docs and draft RFC don’t even mention this as a consideration. How is this better than JOSE?

[1] https://auth0.com/blog/critical-vulnerabilities-in-json-web-token-libraries/
[2] https://github.com/paragonie/paseto/blob/master/src/Parser.php#L159

Neil