Re: [OAUTH-WG] Call for Adoption - OAuth Proof of Possession Tokens with HTTP Message Signature

Warren Parad <wparad@rhosys.ch> Thu, 07 October 2021 10:08 UTC

Return-Path: <wparad@rhosys.ch>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A74EC3A0CB0 for <oauth@ietfa.amsl.com>; Thu, 7 Oct 2021 03:08:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.087
X-Spam-Level:
X-Spam-Status: No, score=-2.087 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rhosys.ch
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k2Wsf4Yplzvt for <oauth@ietfa.amsl.com>; Thu, 7 Oct 2021 03:08:29 -0700 (PDT)
Received: from mail-yb1-xb29.google.com (mail-yb1-xb29.google.com [IPv6:2607:f8b0:4864:20::b29]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BC80C3A0CAE for <oauth@ietf.org>; Thu, 7 Oct 2021 03:08:29 -0700 (PDT)
Received: by mail-yb1-xb29.google.com with SMTP id u32so12108145ybd.9 for <oauth@ietf.org>; Thu, 07 Oct 2021 03:08:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rhosys.ch; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=AQrS5NFhq85sX7wk1mN1496EDSxBUS4gwVbr9l33jZA=; b=gOOa9+B5lgat7mTr/YSd/8DTY4Nnd9JGSnUDxy94Q8ArCEkv4m3dohrO7i7oHkjSRp J4K8IgXteNYPknxEWwK0o+XeBn2sn8x1ehn48acwwyW3RKuv9qj5VCp70szf2fF9AHmG lL91aSwNThCfXnGU7eHw3nhZUd83vLKrIZPaJ60K4LpMScN5J+MB2iSLc1vqJBCm/SKi yaWapBj+lwQ7MIJ2Rox/sgdwRaVKxT4OdvFk/NPwoEsuYIw+6IRSXfKBU/9VarDT88VM ivJW986KvWqkL3dvzJJIImu2a1qw42Sa1nbUVr6OGxpzaP0ZPaNlV74grlYw/XnnoB/g 8i2g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=AQrS5NFhq85sX7wk1mN1496EDSxBUS4gwVbr9l33jZA=; b=uiEA0PpKE1BZNru3b2qb8zofz9lxwV064wQE7hHc/9lnUHJdMs4NDb0t+xIVfTBDN5 zsNsabLWOKmCtLM3pho2ZFBfu+5odqGX4/D+XoFoKDaHX6xay5MaL17AmOEAyLn9Wosh zucznoaZHFtAXV2r3cYRYnxJTq4PdWLhvYHaeccYSYVQlc7Yxzcv2lg2PDEBR2I67nDm GLIyyvuvQuSll4jNtyJNYheb8vNEnBSdymAxHMLdnJQ6SJrQgeO+J2JaD/4uBZjepVNw Jcb80ejsVw/23E37qSxzttdD2mq7PxsSyZqi4hWWaIy37WAYcFqQDIij3qUM4l6BqQtf Cyiw==
X-Gm-Message-State: AOAM532D2RnSzNlZZIJcVBUJbmGG7g2ZnxJUIr2kn5TTrUOQ7pcz92eS LvaLabNVj79BhAMDLnOH/oOKIiQZhxpdAyYrxIetX9taOcVxB9s=
X-Google-Smtp-Source: ABdhPJx/BsBQ99e3PDIWUU7a1i4/iH/HkuE0fZiKYUrd460UICv79SUaDKzjuwqzpX1XiEXoHFFFyqmwtfeGOX3mDjM=
X-Received: by 2002:a25:ea54:: with SMTP id o20mr3712626ybe.209.1633601307164; Thu, 07 Oct 2021 03:08:27 -0700 (PDT)
MIME-Version: 1.0
References: <CADNypP9QXCEjJmkhBvTHn68kDcJ2Mfg-tSQx1-hvfPoOTXCKzA@mail.gmail.com> <CAGBSGjqasD=eYnsMm7gZB2g+=C4abZoVi7FH4e7EFfgwKdjS8w@mail.gmail.com> <CAD9ie-uH9xGL9orTFxEd=tfhO6Q-S3sDHrQDtU7h0_dr6YeLOg@mail.gmail.com> <EE56CE99-5592-40AF-9BA5-7F3886ED315A@mit.edu> <CAD9ie-t9i1sVLhVhJp-mWSchV_x0b3no7i4qNXvcaQS+8OqCVA@mail.gmail.com> <CAGBSGjrgVbGWwFq6LDX_2Vhv7yQkwtEEjy36GpLj-bN+MtcX-w@mail.gmail.com> <CAD9ie-vJiwBSV71z4_2TJJO7A52mV763XvXmEPsEFgOMFVOwyQ@mail.gmail.com> <3e3ca312-6c03-d3ea-cf6f-e13ba22a9545@free.fr>
In-Reply-To: <3e3ca312-6c03-d3ea-cf6f-e13ba22a9545@free.fr>
From: Warren Parad <wparad@rhosys.ch>
Date: Thu, 07 Oct 2021 12:08:16 +0200
Message-ID: <CAJot-L38FOvT2do2H1jUCbYUE3ERExh=OJKEiJtm5sqXitFHkg@mail.gmail.com>
To: Denis <denis.ietf@free.fr>
Cc: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000009e5e3105cdc0714b"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/1ydvRcMO89UcUkeiMhXQo4tVuzI>
Subject: Re: [OAUTH-WG] Call for Adoption - OAuth Proof of Possession Tokens with HTTP Message Signature
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Oct 2021 10:08:35 -0000

I do not support adoption.

While I love the idea to be able to restrict the usage of the access token
by the client, enabling longer expiry access tokens, and preventing usage
to perform unexpected actions with that token, the reasons I do not support
the adoption are as follows:

* The draft depends on another draft and personally not one that I even
agree with. Saying that the "draft is officially adopted" doesn't justify
depending on it.
* I reject the use of an additional header to transmit additional
authorization information. Due to the nature of this information may be
conveyed and stored throughout a number of systems which would all need
access to this complexity. As headers and authorization evolves the
introduction and replacement of existing headers provides additional
security vulnerabilities.
* The draft does not support multiple clients with access to the access
token who all should be able to provide different client signatures and all
be verifiable by the RS.
* This forces the RS to lookup two pieces of information in the case of
signed JWTs, the JWKs from the AS and the JWKs from the client
* The argument in the introduction is flawed

Bearer tokens are simple to implement but also have the significant
> security downside of allowing anyone who sees the access token to use that
> token.


This is not a complete argument because I can replace the words in the
sentence and justify that HTTPSig should never be used by the same argument:

> HTTPSig tokens are incredibly complex to implement but also have the
> significant security downside of allowing anyone who sees the access token
> and signature to use that token.


We need to come up with a better argument such as: *This allows a client to
reduce use of the token to a smaller window to where the signature is also
valid.*
That would allow us to better focus on the value that the RFC would
provide, rather than getting stuck with arbitrary implementation of another
RFC draft as it would apply to OAuth.



Warren Parad

Founder, CTO
Secure your user data with IAM authorization as a service. Implement
Authress <https://authress.io/>.


On Thu, Oct 7, 2021 at 11:03 AM Denis <denis.ietf@free.fr> wrote:

> I am not supportive of adoption of this document by the WG *at this time*.
>
> As I said during the last interim meeting, at this time, there is no
> security considerations section, nor a privacy considerations section.
>
> The current draft describes a mechanism but does not state how the signing
> key will be established and / or come from.
>
> From a security considerations point of view, if the client has the
> control of the private key, it might be able to voluntary transmit
> the private key to another client in order to mount a client collaborative
> attack. If the client is unable to transmit the private key
> to another client in order to mount a collaborative attack, it might be
> able to perform all the cryptographic computations that
> the other client needs. It is important to state which protections (or
> detection) features will be obtained as well as which protections
> (or detection) features will not be obtained. A top-down approach is
> currently missing.
>
> From a privacy considerations point of view, if the same public key is
> used to sign the messages whatever the RS is, this will allow
> different RSs to link the requests from the same client. It is important
> to state which protections (or detection) features will be obtained
> as well as which protections (or detection) features will not be obtained.
>
> Let us wait to have both the security considerations section and the
> privacy considerations section written,
> before adopting this draft as a WG document.
>
> Denis
>
> Remember token binding? It was a stable draft. The OAuth WG spent a bunch
> of cycles building on top of token binding, but token binding did not get
> deployed, so no token binding for OAuth.
>
> As I mentioned, I think Justin and Annabelle (and anyone else interested)
> can influence HTTP Sig to cover OAuth use cases.
>
> /Dick
>
> ᐧ
>
> On Wed, Oct 6, 2021 at 2:48 PM Aaron Parecki <aaron@parecki.com> wrote:
>
>> This actually seems like a great time for the OAuth group to start
>> working on this more closely given the relative stability of this draft as
>> well as the fact that it is not yet an RFC. This is a perfect time to be
>> able to influence the draft if needed, rather than wait for it to be
>> finalized and then have to find a less-than-ideal workaround for something
>> unforeseen.
>>
>> Aaron
>>
>> On Wed, Oct 6, 2021 at 2:25 PM Dick Hardt <dick.hardt@gmail.com> wrote:
>>
>>> I meant it is not yet adopted as an RFC.
>>>
>>> To be clear, I think you are doing great work on the HTTP Sig doc, and a
>>> number of concerns I have with HTTP signing have been addressed => I just
>>> think that doing work in the OAuth WG on a moving and unproven draft in the
>>> HTTP WG is not a good use of resources in the OAuth WG at this time.
>>>
>>>
>>> ᐧ
>>>
>>> On Wed, Oct 6, 2021 at 2:20 PM Justin Richer <jricher@mit.edu> wrote:
>>>
>>>> > HTTP Sig looks very promising, but it has not been adopted as a draft
>>>>
>>>> Just to be clear, the HTTP Sig draft is an official adopted document of
>>>> the HTTP Working Group since about a year ago. I would not have suggested
>>>> we depend on it for a document within this WG otherwise.
>>>>
>>>>  — Justin
>>>>
>>>> On Oct 6, 2021, at 5:08 PM, Dick Hardt <dick.hardt@gmail.com> wrote:
>>>>
>>>> I am not supportive of adoption of this document at this time.
>>>>
>>>> I am supportive of the concepts in the document. Building upon
>>>> existing, widely used, proven security mechanisms gives us better security.
>>>>
>>>> HTTP Sig looks very promising, but it has not been adopted as a draft,
>>>> and as far as I know, it is not widely deployed.
>>>>
>>>> We should wait to do work on extending HTTP Sig for OAuth until it has
>>>> stabilized and proven itself in the field. We have more than enough work to
>>>> do in the WG now, and having yet-another PoP mechanism is more likely to
>>>> confuse the community at this time.
>>>>
>>>> An argument to adopt the draft would be to ensure HTTP Sig can be used
>>>> in OAuth.
>>>> Given Justin and Annabelle are also part of the OAuth community, I'm
>>>> sure they will be considering how HTTP Sig can apply to OAuth, so the
>>>> overlap is serving us already.
>>>>
>>>> /Dick
>>>>
>>>>
>>>> ᐧ
>>>>
>>>> On Wed, Oct 6, 2021 at 2:04 PM Aaron Parecki <aaron@parecki.com> wrote:
>>>>
>>>>> I support adoption of this document.
>>>>>
>>>>> - Aaron
>>>>>
>>>>> On Wed, Oct 6, 2021 at 2:02 PM Rifaat Shekh-Yusef <
>>>>> rifaat.s.ietf@gmail.com> wrote:
>>>>>
>>>>>> All,
>>>>>>
>>>>>> As a followup on the interim meeting today, this is a *call for
>>>>>> adoption *for the *OAuth Proof of Possession Tokens with HTTP
>>>>>> Message Signature* draft as a WG document:
>>>>>> https://datatracker.ietf.org/doc/draft-richer-oauth-httpsig/
>>>>>>
>>>>>> Please, provide your feedback on the mailing list by* October 20th*.
>>>>>>
>>>>>> Regards,
>>>>>>  Rifaat & Hannes
>>>>>>
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>
>>>>
>>>>
> _______________________________________________
> OAuth mailing listOAuth@ietf.orghttps://www.ietf.org/mailman/listinfo/oauth
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>