Re: [OAUTH-WG] Question lengths in draft-sakimura-oauth-tcse-03

Brian Campbell <bcampbell@pingidentity.com> Mon, 12 May 2014 21:57 UTC

Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8939D1A035D for <oauth@ietfa.amsl.com>; Mon, 12 May 2014 14:57:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.578
X-Spam-Level:
X-Spam-Status: No, score=-3.578 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eq3OQAO1c1kO for <oauth@ietfa.amsl.com>; Mon, 12 May 2014 14:57:07 -0700 (PDT)
Received: from na6sys009bog013.obsmtp.com (na6sys009bog013.obsmtp.com [74.125.150.66]) by ietfa.amsl.com (Postfix) with ESMTP id D64501A0783 for <oauth@ietf.org>; Mon, 12 May 2014 14:57:05 -0700 (PDT)
Received: from mail-ie0-f179.google.com ([209.85.223.179]) (using TLSv1) by na6sys009bob013.postini.com ([74.125.148.12]) with SMTP ID DSNKU3FDq6nXEIDPhIRoR85G+CL59d1NhWRO@postini.com; Mon, 12 May 2014 14:57:00 PDT
Received: by mail-ie0-f179.google.com with SMTP id rd18so2774874iec.38 for <oauth@ietf.org>; Mon, 12 May 2014 14:56:58 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type; bh=013IcdjIsvdoDpEdlOgbB2xx0+uLwciCzztCu20uu9M=; b=PSbtVRZ5WjLp9itmEW9L862mVp/KR+GywpHHj42H0tZLYoiOOPKwwSdeWpBJG7vQPq WnT9p+wXEKylEwsqUiGresutzMUi2O1ltmDIoNuWTI1mGxi0Y+O8pd48utuiboOO3+b8 Cyv5WE+fEYqZFckK/unuCnclG0B2Aa7wS0RZ6GiAYjzKEmW/Zn5sNmpdwroMwBJRw4Rm icCP86oOu4diw+CF5CQC1HfRS2Vx/t0wRgN16HZGyzWjqJrzwQMU16sZlFpO02OgDNu1 TaLqdtbPT9Jx4j2DA/TVREN9HSELWzIOAJapba/4HAASndV6QHUvYBPoGfBMu6cSHsEx bv1Q==
X-Gm-Message-State: ALoCoQk5GtPjl8cPxrpz3vXjxVr7cYldVcl0xyVWz3x/kn8WXLrS/8VKva7DE1xs7kIAkoaU3cohQ7P1GFH6QgFfRg4kOwfmLc2WwfwxRW0PGyOS59seKtq669ie8R8YK7rKTPX5w8A8
X-Received: by 10.50.4.70 with SMTP id i6mr50447262igi.40.1399931818385; Mon, 12 May 2014 14:56:58 -0700 (PDT)
X-Received: by 10.50.4.70 with SMTP id i6mr50447241igi.40.1399931818239; Mon, 12 May 2014 14:56:58 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.64.240.201 with HTTP; Mon, 12 May 2014 14:56:28 -0700 (PDT)
In-Reply-To: <CA+k3eCQJRymEDERy=3yvioetg-7Tz025gaZJ1FS4DYmkTGRhcQ@mail.gmail.com>
References: <CA+k3eCTZOheb0HCetS88EXcP-8LJQrYPRuwVcd4NWaWxUAVO1g@mail.gmail.com> <sjm4n0uk8be.fsf@mocana.ihtfp.org> <21A361B0-4E8F-4DAB-9EEB-D48FBCBDFFED@ve7jtb.com> <CA+k3eCQJRymEDERy=3yvioetg-7Tz025gaZJ1FS4DYmkTGRhcQ@mail.gmail.com>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Mon, 12 May 2014 15:56:28 -0600
Message-ID: <CA+k3eCTguJMR-94-KyfpT2_3kQZQQgH3QV6VwawPLoSnBxqVbQ@mail.gmail.com>
To: John Bradley <ve7jtb@ve7jtb.com>
Content-Type: multipart/alternative; boundary="001a11c32a88bcfdcc04f93b066f"
Archived-At: http://mailarchive.ietf.org/arch/msg/oauth/75gKkZ_pgVsbj6XpafAEthixL1Q
Cc: oauth <oauth@ietf.org>, Naveen Agarwal <naa@google.com>
Subject: Re: [OAUTH-WG] Question lengths in draft-sakimura-oauth-tcse-03
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 May 2014 21:57:09 -0000

And it'd give the AS some direct guidance on protecting itself from crazy
long code_challenge values rather than relying on the client not to do
something creative.


On Mon, May 12, 2014 at 3:54 PM, Brian Campbell
<bcampbell@pingidentity.com>wrote:

> Right but that's why I'm asking why not just put the limit on
> code_challange rather than inferring it from code_verifyer + challenge
> algorithm, which probably bounds it but doesn't necessarily do so? It's not
> a big deal but would read more clearly, I think.
>
>
> On Mon, May 12, 2014 at 3:48 PM, John Bradley <ve7jtb@ve7jtb.com> wrote:
>
>> I think octets is more consistent with other JW* and OAuth specs.
>>
>> The code_challange is the same length as the code_verifyer or is a hash
>> of the code_verifyer so likely smaller than 128octets (43 ish for base64
>> 256 bit)
>>
>> Limiting the code_verifyer size sets the upper bound for code_challange,
>> unless someone comes up with a really creative code challenge algorithm.
>>
>> I will talk to nat about changing it to octets when I see him tomorrow.
>>
>> John B.
>>
>> On May 12, 2014, at 11:15 PM, Derek Atkins <warlord@MIT.EDU> wrote:
>>
>> > Brian Campbell <bcampbell@pingidentity.com> writes:
>> >
>> >> I notice that code_verifier is defined as "high entropy cryptographic
>> random
>> >> string of length less than 128 bytes"  [1], which brought a few
>> questions and
>> >> comments to mind. So here goes:
>> >>
>> >> Talking about the length of a string in terms of bytes is always
>> potentially
>> >> confusing. Maybe characters would be an easier unit for people like me
>> to wrap
>> >> their little brains around?
>> >
>> > It depends if it really is characters or bytes.  For example there are
>> > many multi-byte UTF-8 characters, so if it really is bytes then saying
>> > characters is wrong because it could overflow.  So let's make sure we
>> > know what we're talking about.  Historically, if we're talking bytes the
>> > IETF often uses the phrase "octets".  Would that be less confusing?
>> >
>> >> Why are we putting a length restriction on the code_verifier anyway?
>> It seems
>> >> like it'd be more appropriate to restrict the length of the
>> code_challenge
>> >> because that's the thing the AS will have to maintain somehow (store
>> in a DB
>> >> or memory or encrypt into the code). Am I missing something here?
>> >>
>> >> Let me also say that I hadn't looked at this document since its early
>> days in
>> >> draft -00 or -01 last summer but I like the changes and how it's been
>> kept
>> >> pretty simple for the common use-case while still allowing for crypto
>> agility/
>> >> extension. Nice work!
>> >>
>> >> [1]
>> http://tools.ietf.org/html/draft-sakimura-oauth-tcse-03#section-3.3
>> >
>> > -derek
>> >
>> >> _______________________________________________
>> >> OAuth mailing list
>> >> OAuth@ietf.org
>> >> https://www.ietf.org/mailman/listinfo/oauth
>> >
>> > --
>> >       Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory
>> >       Member, MIT Student Information Processing Board  (SIPB)
>> >       URL: http://web.mit.edu/warlord/    PP-ASEL-IA     N1NWH
>> >       warlord@MIT.EDU                        PGP key available
>>
>>
>
>
> --
>    [image: Ping Identity logo] <https://www.pingidentity.com/>
> Brian Campbell
> Portfolio Architect
>   @ bcampbell@pingidentity.com  [image: phone] +1 720.317.2061  Connect
> with us…  [image: twitter logo] <https://twitter.com/pingidentity> [image:
> youtube logo] <https://www.youtube.com/user/PingIdentityTV> [image:
> LinkedIn logo] <https://www.linkedin.com/company/21870> [image: Facebook
> logo] <https://www.facebook.com/pingidentitypage> [image: Google+ logo]<https://plus.google.com/u/0/114266977739397708540> [image:
> slideshare logo] <http://www.slideshare.net/PingIdentity> [image:
> flipboard logo] <http://flip.it/vjBF7> [image: rss feed icon]<https://www.pingidentity.com/blogs/>
>    [image: Register for Cloud Identity Summit 2014 | Modern Identity
> Revolution | 19–23 July, 2014 | Monterey, CA]<https://www.cloudidentitysummit.com/>
>
>


-- 
   [image: Ping Identity logo] <https://www.pingidentity.com/>
Brian Campbell
Portfolio Architect
  @ bcampbell@pingidentity.com  [image: phone] +1 720.317.2061  Connect
with us…  [image: twitter logo] <https://twitter.com/pingidentity> [image:
youtube logo] <https://www.youtube.com/user/PingIdentityTV> [image:
LinkedIn logo] <https://www.linkedin.com/company/21870> [image: Facebook
logo] <https://www.facebook.com/pingidentitypage> [image: Google+
logo]<https://plus.google.com/u/0/114266977739397708540> [image:
slideshare logo] <http://www.slideshare.net/PingIdentity> [image: flipboard
logo] <http://flip.it/vjBF7> [image: rss feed
icon]<https://www.pingidentity.com/blogs/>
   [image: Register for Cloud Identity Summit 2014 | Modern Identity
Revolution | 19–23 July, 2014 | Monterey,
CA]<https://www.cloudidentitysummit.com/>