Re: [OAUTH-WG] Draft for “web_message” Response Mode - Asking For Feedback

Karsten Meyer zu Selhausen | Hackmanit <karsten.meyerzuselhausen@hackmanit.de> Thu, 11 January 2024 14:52 UTC

Return-Path: <karsten.meyerzuselhausen@hackmanit.de>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0657FC17C8A9 for <oauth@ietfa.amsl.com>; Thu, 11 Jan 2024 06:52:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=hackmanit.de
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vhHCgG3HyxmX for <oauth@ietfa.amsl.com>; Thu, 11 Jan 2024 06:52:09 -0800 (PST)
Received: from mail-wm1-x32f.google.com (mail-wm1-x32f.google.com [IPv6:2a00:1450:4864:20::32f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8CB99C1524DC for <oauth@ietf.org>; Thu, 11 Jan 2024 06:52:08 -0800 (PST)
Received: by mail-wm1-x32f.google.com with SMTP id 5b1f17b1804b1-40e629c5a42so2326335e9.0 for <oauth@ietf.org>; Thu, 11 Jan 2024 06:52:08 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hackmanit.de; s=google; t=1704984726; x=1705589526; darn=ietf.org; h=in-reply-to:autocrypt:from:references:cc:to:content-language :subject:user-agent:mime-version:date:message-id:from:to:cc:subject :date:message-id:reply-to; bh=B7ANVlvA0vwy+NqXOQmvOVhdDYsdNGbXuhUyBu2NNgI=; b=EE9JPXoVGR+iLrFR0EQS6DCdhMZieZT/HrLwCc+a2rvA8UmWpEmu0iwoXlktFwCJrd F+QeBQXsoj39OnFv2V3hIrYiENzwqpGqt6uA3avcB4W+N0wIzGw1/CoL2OG1oq1+exjm 27L1BXCKSNLBWmOtCpeTkIR/yvbjV9YPAi7+U=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1704984726; x=1705589526; h=in-reply-to:autocrypt:from:references:cc:to:content-language :subject:user-agent:mime-version:date:message-id:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=B7ANVlvA0vwy+NqXOQmvOVhdDYsdNGbXuhUyBu2NNgI=; b=i/jyVoaXdRq0WyoaNlRbIQAVjat2MJnTP2PUutX/49lcVJNMdcKRDNMg67j9hglFUU ZcuY5P3UFdT8+HuV4MIDft6bShsh8Ok4nUY5nzWul9r0nwTg9bccwYDOtxYcj2+w+0NZ kkrY9xIIr3wbXzrKpuIIf4bV9IwtEV8WrizqP2BD0F3auN1QvAETYPpIe5WIUtln1an0 OT69vq4GDFrDS9tLK7F9ITgvssdXgUlcqyi5JuVmXMEgtCk76cBY1YkkGD86Ro3kN7A1 7dXOt8Pfg386A8324wHxqngDN+A2ShByACac8lOwHjmnIHM2u7Q/sP+FrfHc+gwHBUQp UpWg==
X-Gm-Message-State: AOJu0YyelaSkg4tjZ9yWlHc4EEhmP5i291M5/ErbwTB+kCbaMekpEHC3 W3ymiv4kPkHO2M0fWqclEjapk6B9ic4DwQ==
X-Google-Smtp-Source: AGHT+IHEtNOkvBfFuUwxX8ukGY5//FaKP36bhehzQu3FDvOn3BTDEWW8g6nXCaW8WUZg0rbbByUu3Q==
X-Received: by 2002:a05:600c:348f:b0:40d:5bbf:71f2 with SMTP id a15-20020a05600c348f00b0040d5bbf71f2mr478275wmq.5.1704984726219; Thu, 11 Jan 2024 06:52:06 -0800 (PST)
Received: from [192.168.179.4] (p54b6f23c.dip0.t-ipconnect.de. [84.182.242.60]) by smtp.gmail.com with ESMTPSA id fc19-20020a05600c525300b0040d839e7bb3sm6169349wmb.19.2024.01.11.06.52.05 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 11 Jan 2024 06:52:05 -0800 (PST)
Message-ID: <c1a22108-bd75-4e23-b854-944022200915@hackmanit.de>
Date: Thu, 11 Jan 2024 15:52:06 +0100
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Content-Language: en-US
To: Filip Skokan <panva.ip@gmail.com>
Cc: oauth <oauth@ietf.org>, Louis Jannett <louis.jannett@rub.de>, Christian Mainka <christian.mainka@hackmanit.de>
References: <ea11f400-45b4-4ef2-a926-f3f89697bca9@hackmanit.de> <bc5ccf22-47b3-4ca0-996e-c1cebcbe9a36@hackmanit.de> <CALAqi__ACWaAX_CoDQQ3wa_59Gnqr5KFMfgmffw0Gh4v878cjg@mail.gmail.com> <b367c755-07ea-4c19-9fb1-b63bb108e512@hackmanit.de> <CALAqi__SLUg1VztZ8CAfZOhd-m=uqgz=WPDvhfDU9P6KP1gn9A@mail.gmail.com>
From: Karsten Meyer zu Selhausen | Hackmanit <karsten.meyerzuselhausen@hackmanit.de>
Autocrypt: addr=karsten.meyerzuselhausen@hackmanit.de; keydata= xsFNBFh1IBMBEADV73c10lB7zeFy6/ezLFzOBp8z6Zy1zUyIrf6RoBk1GQWREcGEGeaL90Pj F5plZeASVJdsEYnYXdgcIPE0tlBq6al6OYoWtH/VbFPWEPLVhA3rL1iXVJveD3J40OzSYP8N G7bla3zQ2+TXOB3iDPPsHZUdHCLASkIIWQK6+fE1C2epAdPtnsLsb++1d080jfXXwgyUUh4y bimcy9Jg5oZ4QMwnSq3Y+x38PNb+nTgjDi1X/89/WsNd7Bdh4Zvw3CAuc/W58CFaDjb7liUD YRoAp6ysnjPKEUSnAnMpgaiXJc1gFoL+ahdKJ3D9XTn28NTjUrvOkVidsuKbyxnXP9I6BO6i 2jzjrH6TEAfIYMjZlYTyPZTt271SW5iAHYwvPZWlqQTBT2P/d4gHl0To5b4e+UXxjQgxqUyi QIcxh3Ris21Kx4lKQKDXYWiwNTZzx8AdqrcxCWfK+MRpFyk0B+4uDMm7Apm5ZWwDKN/JnVsJ yokkkrrHs/elRCUGtN9NyhJQf3VnE87862Pej8PVvQJr3uVnoNX2yieTvJZftIOBG1b9ta6Z BcYyn3un1rSn7lBPg+RSnPemposVorQpjGwT+Dhg13Bpv5q0JfSc//js/nB6A4iq5YssdtQ7 35QBWLLaF1oCxalvrQVDD4Sh06eAUQsga9xeE0yv7sxqdsozdwARAQABzUJLYXJzdGVuIE1l eWVyIHp1IFNlbGhhdXNlbiA8a2Fyc3Rlbi5tZXllcnp1c2VsaGF1c2VuQGhhY2ttYW5pdC5k ZT7CwX8EEwEIACkFAl/4WSsCGyMFCQ+L3RcHCwkIBwMCAQYVCAIJCgsEFgIDAQIeAQIXgAAK CRBFNcDn2xbxSKWlD/9BVhp53BFytM1EQ17x1TB76zFygZA33KZeQIWLkw/M8yWkuzgGTFJ8 Lx+kmC3xnk4WG6nIv4paU4y+K2+WlAQg3FR0CN0oHgb6gOSHu9ISDMdZm8Kzmie2hKSOG8wA 56oVhRYXElt3Oe22usywpcfCf8C1t0SjHkufUWgVFspaplKsEN6NwdSBLxQ0gzfEkl3RTfLV JEopw5MlLzKxM1EAbL0QZdORX6cIJI96BecnXA0fwlV2PmM+TSPUDzBFOneZBOdtgCduKVhG bVRDOtJ4LIEQFT7ZvlzYEaWueh8HNC6Y8wZKRaZ4cg8mXJuz+BizA8EEicubkqljKNlTuHB4 0l3R30m4w202U3XNDKmCsLGUVLfNet4mM3wLIw5sr9GUuDvz0+8J9eaAypqgU9NKfUHpecHC /AULjk7TK9hKq2o2mQCRiOOt4Ki6yeC068nQrE97eCS7/YikVHA7TXTchG82x4eqRpgyBonk uRwnuU3sGAty1+D1ehDFzTvGfh9GS8tncKgyAtj9acUIhYDW6yWesSX6B4OenXKnJhjbskAZ LFVegXWAPf1YT3ImCLBnhn8g7ZHwB/icyMaWCXURsO63beRhvAFjXNxKcL6f7gg8uW9z3GhR +Kcz2DRAWO6Xo8MBbed+Nc9z01jSNQBQa5SPnJaeBtfiUY+ZbmHfLs7BTQRYdSATARAAsp2V mr3N7iNND8+M/OyA/OwcDQ6utZh+m4TnKsOVdiNLGpu2U3/2Qg3yrbjic2dWx1CsS6VH2/oO 1e/a4FlxA93wFv/OZjiUjHtEvdIJeHWlCvWOUlMsqyGDc3Q75fNjFw6DGKkiOu9lZaBs6naS BmkvAMGjV5bNKLyIL5j7Im1pCdZ2lCjD7eVwR3RQQKobTmu916htX8g1cB9yFmquu37X+ZBl A4GLJi63Kw0L2r8i8iO1NqDLOfT8IeNkOroEm3SDAuEApGAubKLSPBJ1khQ7kDhpdfzSYKUF tiIHpGWVOImDjqf4JIcF7OIdRPQfFPlwoPnsyBAS8znQJvmqbbMowgFZe3UMLAN78CETZHGM OLBPB873oWyZ07Ar4v/SL5/aD+FRj2VnYEcGwt0HMmMyaN6ed8Udj4OTNZ7ceZA1Tw8/lZuI KCamj0XfJIK6376RCGnqjsEfS65P1KWZXfWphCKWp2c7uWKtau1q8pgiVRoBSAmjvfXRrIvK LhhQyNOiCUDKrvEWpoeq9y5GTrY27ncLov8nSR/SUPOw5HwJmzdFjhOF9XAOtiND/QRH886O IohdlnUu668mwLCmL2ROe7XWcTkFQWLDg+5b0bC9dgfL+HHpWGUdQPG3CCyPG5LfDmnmuXkE eU1kSD27kFe1kM6pfqpCydJW66DuwoMAEQEAAcLBlwQYAQgADwUCX/hZKwIbDAUJD4vdFwA8 CRBFNcDn2xbxSAkQRTXA59sW8UgJEEU1wOfbFvFICRBFNcDn2xbxSAkQRTXA59sW8UgJEEU1 wOfbFvFIQHUP/jKpA/Xco+eCnh1t4jR9c/8AiE1JR+3txOvsaMK8bWjnDtY5bIxOVvVPMUAI DUjNhSWVbHxPt+sZxEol+6oo9IP6MnWYxgx3IW2BWQUlYDyXzH3S8t7YxVo92+yD4kgZLOdq sKEJ2efr8OSgL4tcbAWA36UB8bOOHkOUXzoLLVN4qjuyRn9BPADGpcfxXEQb9iGVwbEZzfJ6 OtvbOHO0qfI3aX7btjqo2muhD1B8auhLQBVOfpn7LOnL8Hk6QKvkFEC3nqBMQbFUSLarmtXa o4cXSyLDmj+efMhbaimgbwxTxh125/ZaYE1q+LdHyHtbbPLAaxHr3dxPk1p0rjQxxXKG7k0p aal8dcVxp0yGEXOeuXr7Xba+uquF1wLf8kZRD0g7L31py3ay3cw+f3ADF/AgC+8lrlUlODa9 +z9sU7RKGF0fAY1gXV8P6GGPlVGJronrSIM2nSMkcCRJzg9vmPGAvrljQTqDQOf12s0jtevq VelIncMyQacOmw6DGKXsUiGRMNsobYe2BWrfXxoYFZ/0biIPnlY23MImgFUWZjnjD1jvkMzH 0u16cXBgjEAkPq5xy21RvXkwCt4T3XzOglDsxi22jmCSLTx45CGkEJaHLJ9tllkjrd3dQVIw P8hzeF0pGduCQAurcejd++jxzlqDk1hIuG9BqPySrt5AIMEG
In-Reply-To: <CALAqi__SLUg1VztZ8CAfZOhd-m=uqgz=WPDvhfDU9P6KP1gn9A@mail.gmail.com>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="------------Lrx0emY0QfNJY80s1xqVDDVO"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/32AoRNgoD03qL3B7ZzMQUkizRDE>
Subject: Re: [OAUTH-WG] Draft for “web_message” Response Mode - Asking For Feedback
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Jan 2024 14:52:14 -0000

Hello Filip,

my bad, you are right. "Compatible" was the wrong word to use.

Yes, a client implementing draft-sakimura-oauth-wmrm-01 would expect a 
different message structure than defined in our draft.

We are not fixed to the message structure in our current draft and are 
open to discuss adjusting it. That's the type of feedback we are asking for.


We would be very interested in the implementations of 
draft-sakimura-oauth-wmrm you mentioned. Can you point us to these 
implementations?


Best regards,
Karsten

On 10.01.2024 09:47, Filip Skokan wrote:
>
>     our draft covers and is compatible to what's called "simple mode"
>     (both with and without prompt) in draft-sakimura-oauth-wmrm-00/-01.
>
>
> So a client that's using a simple mode with web_message today could, 
> without change, utilize your draft as well? That doesn't seem likely 
> given the message structure is not the same as in 
> draft-sakimura-oauth-wmrm. Is that an omission or intentional?
>
> S pozdravem,
> *Filip Skokan*
>
>
> On Wed, 10 Jan 2024 at 09:37, Karsten Meyer zu Selhausen | Hackmanit 
> <karsten.meyerzuselhausen@hackmanit.de> wrote:
>
>     Hello Filip,
>
>     our draft covers and is compatible to what's called "simple mode"
>     (both with and without prompt) in draft-sakimura-oauth-wmrm-00/-01.
>
>     We do not consider the relay mode. The relay mode is motivated by
>     the use of the implicit grant which is discouraged nowadays.
>
>     The main differences to draft-sakimura-oauth-wmrm-01 can be
>     summarized as follows:
>
>       * In general we do not focus on "modes" but instead on the
>         actual communication using the postMessage API. Our draft
>         contains examples for the format/structure for the messages
>         sent using the postMessage API.
>       * Our draft enables iframe flows with user interaction while
>         draft-sakimura-oauth-wmrm-01 only covers iframe flows without
>         user interaction.
>       * Our draft contains security considerations describing threats
>         and giving recommendations to address them.
>       * Our draft briefly discusses the implications of the 3rd party
>         cookie phaseout for iframes.
>
>     Our main motivation is the belief that there is a need for a
>     specification defining how to securely use the postMessage API for
>     OAuth auth. responses. The research of my co-authors underlines
>     this need [1].
>
>     As I said, at the last OSW there was agreement that it would be a
>     good idea to write an RFC for a postMessage-based response mode.
>     draft-sakimura-oauth-wmrm-00 was expired years ago and seemed to
>     be inactive when we started to work on our own draft. In our
>     opinion it is not a great option to rely on an expired draft. As
>     for customers I work with this is not an option at all; they want
>     to implement and use final RFCs whenever possible.
>
>     We are looking for feedback from the WG and are open to
>     collaborate with the authors of draft-sakimura-oauth-wmrm if they
>     want to join the efforts.
>
>
>     Best regards,
>     Karsten
>
>     [1] https://distinct-sso.com/
>
>     On 04.01.2024 12:10, Filip Skokan wrote:
>>     Hello Karsten,
>>
>>     Can you summarize in what ways is your draft compatible
>>     with draft-sakimura-oauth-wmrm-00? Which of the described modes
>>     in Nat's document does it cover?
>>
>>     There are existing implementations (both partial and full)
>>     of draft-sakimura-oauth-wmrm-00 so if your draft is not
>>     compatible I would recommend not using the same response mode
>>     name/identifier in your proposal.
>>
>>     What prompted you to start a new draft rather than
>>     using draft-sakimura-oauth-wmrm-00?
>>
>>     S pozdravem,
>>     *Filip Skokan*
>>
>>
>>     On Thu, 4 Jan 2024 at 12:04, Karsten Meyer zu Selhausen |
>>     Hackmanit <karsten.meyerzuselhausen@hackmanit.de> wrote:
>>
>>         Hi all,
>>
>>         we would like to ask again for feedback on our draft for the
>>         "web_message" response mode:
>>         *https://datatracker.ietf.org/doc/draft-meyerzuselha-oauth-web-message-response-mode/
>>         *
>>
>>         We think it would be very helpful for implementers and
>>         developers to specify a secure standard for a postMessage
>>         API-based response mode.
>>
>>         Best regards,
>>         Karsten*
>>         *
>>
>>         On 23.11.2023 10:11, Karsten Meyer zu Selhausen | Hackmanit
>>         wrote:
>>>
>>>         Hi everyone,
>>>
>>>         at the last OSW the topic of a response mode based on the
>>>         postMessage API came up. This approach is already used by
>>>         multiple parties (e.g., Google) but lacks standardization.
>>>
>>>         There was some sense of agreement that it would be a good
>>>         idea to create an RFC defining this response mode to counter
>>>         security flaws in individual implementations and improve
>>>         interoperability.
>>>
>>>         Because the efforts in the past were long expired (draft -00
>>>         of
>>>         https://datatracker.ietf.org/doc/draft-sakimura-oauth-wmrm/
>>>         expired in 2016) we took the initiative and started to work
>>>         on a new ID for the "web_message" response mode.
>>>
>>>         *We would like to to ask the members of the working group
>>>         for feedback on our draft:
>>>         https://datatracker.ietf.org/doc/draft-meyerzuselha-oauth-web-message-response-mode/*
>>>
>>>
>>>         I see that "draft-sakimura-oauth-wmrm" has been recently
>>>         updated. However, there have not been any changes to its
>>>         contents. What are the plans of the authors for this draft?
>>>
>>>         Best regards
>>>         Karsten
>>>
>>>         -- 
>>>         Karsten Meyer zu Selhausen
>>>         Senior IT Security Consultant
>>>         Phone:	+49 (0)234 / 54456499
>>>         Web:	https://hackmanit.de  | IT Security Consulting, Penetration Testing, Security Training
>>>
>>>         Multi-Factor Authentication (MFA) significantly increases the security of your accounts.
>>>         Learn in our blog posts what the best MFA options are and how FIDO2 goes one step further to solve the world’s password problem:
>>>         https://www.hackmanit.de/en/blog-en/162-what-is-mfa
>>>         https://www.hackmanit.de/en/blog-en/165-what-is-fido2
>>>
>>>         Hackmanit GmbH
>>>         Universitätsstraße 60 (Exzenterhaus)
>>>         44789 Bochum
>>>
>>>         Registergericht: Amtsgericht Bochum, HRB 14896
>>>         Geschäftsführer: Prof. Dr. Jörg Schwenk, Prof. Dr. Juraj Somorovsky, Dr. Christian Mainka, Prof. Dr. Marcus Niemietz
>>
>>         -- 
>>         Karsten Meyer zu Selhausen
>>         Senior IT Security Consultant
>>         Phone:	+49 (0)234 / 54456499
>>         Web:	https://hackmanit.de  | IT Security Consulting, Penetration Testing, Security Training
>>
>>         Multi-Factor Authentication (MFA) significantly increases the security of your accounts.
>>         Learn in our blog posts what the best MFA options are and how FIDO2 goes one step further to solve the world’s password problem:
>>         https://www.hackmanit.de/en/blog-en/162-what-is-mfa
>>         https://www.hackmanit.de/en/blog-en/165-what-is-fido2
>>
>>         Hackmanit GmbH
>>         Universitätsstraße 60 (Exzenterhaus)
>>         44789 Bochum
>>
>>         Registergericht: Amtsgericht Bochum, HRB 14896
>>         Geschäftsführer: Prof. Dr. Jörg Schwenk, Prof. Dr. Juraj Somorovsky, Dr. Christian Mainka, Prof. Dr. Marcus Niemietz
>>
>>         _______________________________________________
>>         OAuth mailing list
>>         OAuth@ietf.org
>>         https://www.ietf.org/mailman/listinfo/oauth
>>
>     -- 
>     Karsten Meyer zu Selhausen
>     Senior IT Security Consultant
>     Phone:	+49 (0)234 / 54456499
>     Web:	https://hackmanit.de  | IT Security Consulting, Penetration Testing, Security Training
>
>     Multi-Factor Authentication (MFA) significantly increases the security of your accounts.
>     Learn in our blog posts what the best MFA options are and how FIDO2 goes one step further to solve the world’s password problem:
>     https://www.hackmanit.de/en/blog-en/162-what-is-mfa
>     https://www.hackmanit.de/en/blog-en/165-what-is-fido2
>
>     Hackmanit GmbH
>     Universitätsstraße 60 (Exzenterhaus)
>     44789 Bochum
>
>     Registergericht: Amtsgericht Bochum, HRB 14896
>     Geschäftsführer: Prof. Dr. Jörg Schwenk, Prof. Dr. Juraj Somorovsky, Dr. Christian Mainka, Prof. Dr. Marcus Niemietz
>
-- 
Karsten Meyer zu Selhausen
Senior IT Security Consultant
Phone:	+49 (0)234 / 54456499
Web:	https://hackmanit.de  | IT Security Consulting, Penetration Testing, Security Training

Multi-Factor Authentication (MFA) significantly increases the security of your accounts.
Learn in our blog posts what the best MFA options are and how FIDO2 goes one step further to solve the world’s password problem:
https://www.hackmanit.de/en/blog-en/162-what-is-mfa
https://www.hackmanit.de/en/blog-en/165-what-is-fido2

Hackmanit GmbH
Universitätsstraße 60 (Exzenterhaus)
44789 Bochum

Registergericht: Amtsgericht Bochum, HRB 14896
Geschäftsführer: Prof. Dr. Jörg Schwenk, Prof. Dr. Juraj Somorovsky, Dr. Christian Mainka, Prof. Dr. Marcus Niemietz