Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1])
 by ietfa.amsl.com (Postfix) with ESMTP id 612BB1A6FC9
 for <oauth@ietfa.amsl.com>; Tue,  2 Dec 2014 11:13:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level: 
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5
 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, T_RP_MATCHES_RCVD=-0.01]
 autolearn=ham
Received: from mail.ietf.org ([4.31.198.44])
 by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id IMESlY_zxUsn for <oauth@ietfa.amsl.com>;
 Tue,  2 Dec 2014 11:13:19 -0800 (PST)
Received: from smtpvbsrv1.mitre.org (smtpvbsrv1.mitre.org [198.49.146.234])
 by ietfa.amsl.com (Postfix) with ESMTP id 638081A6FB7
 for <oauth@ietf.org>; Tue,  2 Dec 2014 11:13:18 -0800 (PST)
Received: from smtpvbsrv1.mitre.org (localhost.localdomain [127.0.0.1])
 by localhost (Postfix) with SMTP id 1970572E1B2;
 Tue,  2 Dec 2014 14:13:18 -0500 (EST)
Received: from IMCCAS01.MITRE.ORG (imccas01.mitre.org [129.83.29.78])
 by smtpvbsrv1.mitre.org (Postfix) with ESMTP id 0BDF172E1BB;
 Tue,  2 Dec 2014 14:13:18 -0500 (EST)
Received: from IMCMBX01.MITRE.ORG ([169.254.1.102]) by IMCCAS01.MITRE.ORG
 ([129.83.29.68]) with mapi id 14.03.0174.001; Tue, 2 Dec 2014 14:13:17 -0500
From: "Richer, Justin P." <jricher@mitre.org>
To: Bill Mills <wmills_92105@yahoo.com>
Thread-Topic: [OAUTH-WG] Review of draft-ietf-oauth-introspection-01
Thread-Index: AQHQDiJoqgGZL6bZ70SXEfjMbJe4Jpx8qaoAgABMtwCAAAciAIAAAPSAgAABWoA=
Date: Tue, 2 Dec 2014 19:13:16 +0000
Message-ID: <46D29E35-5A69-4687-BC44-45462DEA8D47@mitre.org>
References: <131139F2-0F73-4315-B52A-9F609B55EF4C@mitre.org>
 <244078391.3267266.1417547353925.JavaMail.yahoo@jws10601.mail.bf1.yahoo.com>
In-Reply-To: <244078391.3267266.1417547353925.JavaMail.yahoo@jws10601.mail.bf1.yahoo.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.146.15.76]
Content-Type: multipart/alternative;
 boundary="_000_46D29E355A694687BC4445462DEA8D47mitreorg_"
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/oauth/2gR-wlZ333tJz4DYXXXJ5pqJDqA
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Review of draft-ietf-oauth-introspection-01
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>,
 <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>,
 <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Dec 2014 19:13:25 -0000

--_000_46D29E355A694687BC4445462DEA8D47mitreorg_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

That's all fine -- it's all going over TLS anyway (RS->AS) just like the or=
iginal token fetch by the client (C->AS). Doesn't mean you need TLS *into* =
the RS (C->RS) with a good PoP token.

Can you explain how this is related to "act on behalf of"? I don't see any =
connection.

 -- Justin

On Dec 2, 2014, at 2:09 PM, Bill Mills <wmills_92105@yahoo.com<mailto:wmill=
s_92105@yahoo.com>> wrote:

Fetching the public key for a token might be fine, but what if the introspe=
ction endpoint returns the symmetric key?  Data about the user?  Where does=
 this blur the line between this and "act on behalf of"?


On Tuesday, December 2, 2014 11:05 AM, "Richer, Justin P." <jricher@mitre.o=
rg<mailto:jricher@mitre.org>> wrote:


The call to introspection has a TLS requirement, but the call to the RS wou=
ldn't necessarily have that requirement. The signature and the token identi=
fier are two different things. The identifier doesn't do an attacker any go=
od on its own without the verifiable signature that's associated with it an=
d the request. What I'm saying is that you introspect the identifier and ge=
t back something that lets you, the RS, check the signature.

 -- Justin

On Dec 2, 2014, at 1:40 PM, Bill Mills <wmills_92105@yahoo.com<mailto:wmill=
s_92105@yahoo.com>> wrote:

"However, I think it's very clear how PoP tokens would work. ..."

I don't know if that's true.  POP tokens (as yet to be fully defined) would=
 then also have a TLS or transport security requirement unless there is tok=
en introspection client auth in play I think.  Otherwise I can as an attack=
er take that toklen and get info about it that might be useful, and I don't=
 think that's what we want.

-bill






--_000_46D29E355A694687BC4445462DEA8D47mitreorg_
Content-Type: text/html; charset="us-ascii"
Content-ID: <29A28B68A0874D468B5E8A849AE1AE65@imc.mitre.org>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space;">
That's all fine -- it's all going over TLS anyway (RS-&gt;AS) just like the=
 original token fetch by the client (C-&gt;AS). Doesn't mean you need TLS *=
into* the RS (C-&gt;RS) with a good PoP token.&nbsp;
<div><br>
</div>
<div>Can you explain how this is related to &quot;act on behalf of&quot;? I=
 don't see any connection.</div>
<div><br>
</div>
<div>&nbsp;-- Justin</div>
<div><br>
<div>
<div>On Dec 2, 2014, at 2:09 PM, Bill Mills &lt;<a href=3D"mailto:wmills_92=
105@yahoo.com">wmills_92105@yahoo.com</a>&gt; wrote:</div>
<br class=3D"Apple-interchange-newline">
<blockquote type=3D"cite">
<div style=3D"background-color: rgb(255, 255, 255); font-family: HelveticaN=
eue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-=
size: 12px;">
<div id=3D"yui_3_16_0_1_1417479933319_116280" dir=3D"ltr"><span id=3D"yui_3=
_16_0_1_1417479933319_116283">Fetching the public key for a token might be =
fine, but what if the introspection endpoint returns the symmetric key? &nb=
sp;Data about the user? &nbsp;Where does this blur
 the line between this and &quot;act on behalf of&quot;?</span></div>
<div class=3D"qtdSeparateBR" id=3D"yui_3_16_0_1_1417479933319_116279"><br>
<br>
</div>
<div class=3D"yahoo_quoted" style=3D"display: block;" id=3D"yui_3_16_0_1_14=
17479933319_116250">
<div style=3D"font-family: HelveticaNeue, Helvetica Neue, Helvetica, Arial,=
 Lucida Grande, sans-serif; font-size: 12px;" id=3D"yui_3_16_0_1_1417479933=
319_116249">
<div style=3D"font-family: HelveticaNeue, Helvetica Neue, Helvetica, Arial,=
 Lucida Grande, sans-serif; font-size: 16px;" id=3D"yui_3_16_0_1_1417479933=
319_116248">
<div dir=3D"ltr" id=3D"yui_3_16_0_1_1417479933319_116278"><font size=3D"2" =
face=3D"Arial" id=3D"yui_3_16_0_1_1417479933319_116277">On Tuesday, Decembe=
r 2, 2014 11:05 AM, &quot;Richer, Justin P.&quot; &lt;<a href=3D"mailto:jri=
cher@mitre.org">jricher@mitre.org</a>&gt; wrote:<br>
</font></div>
<br>
<br>
<div class=3D"y_msg_container" id=3D"yui_3_16_0_1_1417479933319_116247">
<div id=3D"yiv8657710027">
<div id=3D"yui_3_16_0_1_1417479933319_116246">The call to introspection has=
 a TLS requirement, but the call to the RS wouldn't necessarily have that r=
equirement. The signature and the token identifier are two different things=
. The identifier doesn't do an attacker
 any good on its own without the verifiable signature that's associated wit=
h it and the request. What I'm saying is that you introspect the identifier=
 and get back something that lets you, the RS, check the signature.
<div id=3D"yui_3_16_0_1_1417479933319_116276"><br clear=3D"none">
</div>
<div id=3D"yui_3_16_0_1_1417479933319_116275">&nbsp;-- Justin</div>
<div id=3D"yui_3_16_0_1_1417479933319_116245"><br clear=3D"none">
<div id=3D"yui_3_16_0_1_1417479933319_116244">
<div class=3D"yiv8657710027yqt7402436989" id=3D"yiv8657710027yqt21556">
<div id=3D"yui_3_16_0_1_1417479933319_116274">On Dec 2, 2014, at 1:40 PM, B=
ill Mills &lt;<a rel=3D"nofollow" shape=3D"rect" ymailto=3D"mailto:wmills_9=
2105@yahoo.com" target=3D"_blank" href=3D"mailto:wmills_92105@yahoo.com" id=
=3D"yui_3_16_0_1_1417479933319_116273">wmills_92105@yahoo.com</a>&gt;
 wrote:</div>
<br clear=3D"none" class=3D"yiv8657710027Apple-interchange-newline">
<blockquote type=3D"cite" id=3D"yui_3_16_0_1_1417479933319_116243">
<div style=3D"background-color:rgb(255, 255, 255);font-family:HelveticaNeue=
, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;font-size=
:12px;" id=3D"yui_3_16_0_1_1417479933319_116242">
<div id=3D"yiv8657710027yui_3_16_0_1_1417479933319_82481"><span>&quot;</spa=
n><span class=3D"yiv8657710027" id=3D"yiv8657710027yui_3_16_0_1_14174799333=
19_83601" style=3D"font-size:15.5555562973022px;">However, I think it's ver=
y clear how PoP tokens would work. ...&quot;</span></div>
<div class=3D"yiv8657710027qtdSeparateBR" id=3D"yiv8657710027yui_3_16_0_1_1=
417479933319_82480">
<br clear=3D"none">
</div>
<div class=3D"yiv8657710027qtdSeparateBR" dir=3D"ltr" id=3D"yiv8657710027yu=
i_3_16_0_1_1417479933319_82480">
I don't know if that's true. &nbsp;POP tokens (as yet to be fully defined) =
would then also have a TLS or transport security requirement unless there i=
s token introspection client auth in play I think. &nbsp;Otherwise I can as=
 an attacker take that toklen and get info
 about it that might be useful, and I don't think that's what we want.</div=
>
<div class=3D"yiv8657710027qtdSeparateBR" dir=3D"ltr" id=3D"yiv8657710027yu=
i_3_16_0_1_1417479933319_82480">
<br clear=3D"none">
</div>
<div class=3D"yiv8657710027qtdSeparateBR" dir=3D"ltr" id=3D"yiv8657710027yu=
i_3_16_0_1_1417479933319_82480">
-bill</div>
<div class=3D"yiv8657710027qtdSeparateBR" id=3D"yiv8657710027yui_3_16_0_1_1=
417479933319_82480">
<br clear=3D"none">
</div>
<div class=3D"yiv8657710027qtdSeparateBR" id=3D"yiv8657710027yui_3_16_0_1_1=
417479933319_82480">
<br clear=3D"none">
<br clear=3D"none">
</div>
</div>
</blockquote>
</div>
</div>
</div>
</div>
</div>
<br>
</div>
</div>
</div>
</div>
</div>
</blockquote>
</div>
<br>
</div>
</body>
</html>

--_000_46D29E355A694687BC4445462DEA8D47mitreorg_--

