Re: [OAUTH-WG] Fwd: New Version Notification for draft-sakimura-oauth-tcse-00.txt
Sergey Beryozkin <sberyozkin@gmail.com> Thu, 26 September 2013 12:40 UTC
Return-Path: <sberyozkin@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3AD2A21F995F for <oauth@ietfa.amsl.com>; Thu, 26 Sep 2013 05:40:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wkhPs9q6onbL for <oauth@ietfa.amsl.com>; Thu, 26 Sep 2013 05:40:27 -0700 (PDT)
Received: from mail-wi0-x22c.google.com (mail-wi0-x22c.google.com [IPv6:2a00:1450:400c:c05::22c]) by ietfa.amsl.com (Postfix) with ESMTP id BDA0E21F9998 for <oauth@ietf.org>; Thu, 26 Sep 2013 05:40:26 -0700 (PDT)
Received: by mail-wi0-f172.google.com with SMTP id hn9so6971798wib.17 for <oauth@ietf.org>; Thu, 26 Sep 2013 05:40:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=hTdVS+Dej5ylvX92snr9ctVHiyiII5fIoMTsl5mQApg=; b=fMXCVsk2GrrzhHBDAI4s7OqCeuI7GtgE9pqk0lML9iDQXjwdfAgxYKtLFEoa14QfDa 1Bopj0U/7OOKLebSqdfhGKIDVoZBeMOdwW++Hf236BtPUhOeOsgk79xBYGpJIS6wwI/u 3iJCXGsyIxIN4PgGfkpZd3K6J50hV4eVQ+35fGOVbIjSGqTlRl0vMo7R2Id9LCgt2Zey 1eMDVCLkzP5S7rux1uQPucMAzddoXy3DAO4Anq0AcqnvNRxD5b5oNHzLTpuq4SAb62s3 DalH9w0PvKSoTO+LvPWkVH94FQttx+SFVlnvcE9Mw/7we6/LjUW0+Y4B+ii4A9N//D2k lLyw==
X-Received: by 10.180.208.97 with SMTP id md1mr596058wic.41.1380199219483; Thu, 26 Sep 2013 05:40:19 -0700 (PDT)
Received: from [192.168.2.5] ([89.100.141.107]) by mx.google.com with ESMTPSA id mb7sm3127790wic.10.1969.12.31.16.00.00 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 26 Sep 2013 05:40:18 -0700 (PDT)
Message-ID: <52442B31.6060602@gmail.com>
Date: Thu, 26 Sep 2013 13:40:17 +0100
From: Sergey Beryozkin <sberyozkin@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130623 Thunderbird/17.0.7
MIME-Version: 1.0
To: John Bradley <ve7jtb@ve7jtb.com>
References: <20130730095129.29309.12243.idtracker@ietfa.amsl.com> <CABzCy2CC3Oi2J7GZJVBa07=xtjMXvy9ah_h_ZwwZQXDd4qtSzw@mail.gmail.com> <5224FFBB.9050400@oracle.com> <CABzCy2C=eLUGu4uFx=mX=EQ7PGAAsNBi1JFVkfDoCfo9PQZy3Q@mail.gmail.com> <72735227-DF50-41F0-B744-9ED1706339B5@ve7jtb.com>
In-Reply-To: <72735227-DF50-41F0-B744-9ED1706339B5@ve7jtb.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: oauth <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-sakimura-oauth-tcse-00.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Sep 2013 12:40:28 -0000
Hi On 06/09/13 00:44, John Bradley wrote: > At this point we don't know of any attack against the request, however > that is not guaranteed to remain the case. > > If we send the secret in plain text through the browser it likely will > never get IETF acceptance. > > We use HMAC a fair bit already I don't think that would be a significant > hurdle for clients. > > The quoted text is trying to prevent the AS from leaking the value back > to the attacker, that would be fatal flaw if it is plaintext, and not > optimal if it is a HMAC. > > AS could do something like include it in code unencrypted etc, just > trying to prevent that. > Given that Resource owner credentials grant did get IETF acceptance without any problems (due to HTTPS being recommended I guess) and due to the comment below that if we have a case where the device is compromised then passing a transient sensitive value in clear does not really makes the device client any more insecure than it already is, would it make sense to keep the current approach in place ? I did a quick try at implementing it few weeks ago and it was easy to do... Sergey > On 2013-09-05, at 4:34 PM, Nat Sakimura <sakimura@gmail.com > <mailto:sakimura@gmail.com>> wrote: > >> Depending on the level of assurance that you might want to achieve, it >> could have been a random string. That's how some of the existing but >> widely deployed implementations are doing. >> >> I have taken a step forward to do the hashing to give a little more >> protection that even if a malware on the device captures the request, >> it would not be able to use it in time. That's a kind of >> man-in-the-middle and by that time happens, your device is fairly >> badly compromised so there are opinion that it would not matter much >> by that time that just a random string would suffice. If the WG feels >> that way, I am happy to change it to a random string as well. >> >> The current "hash" design was a middle ground between a random string >> and HMAC etc. >> >> >> 2013/9/3 Prateek Mishra <prateek.mishra@oracle.com >> <mailto:prateek.mishra@oracle.com>> >> >> Nat - is there cryptanalysis of the proposed model available anyplace? >> >> Extending protocols by throwing in a smidgen of hashing and a >> tablespoon of encryption is often a bad idea. One of the strengths >> of /RFC/ 6749 is that it avoids stuff like that. >> >> What do you mean when you say - >> >> [quote] >> The server MUST NOT include the "tcsh" value in the form that any >> entity but itself can extract it. >> [\quote] >> >> Is this even theoretically achievable without a stateful server >> that maintains a table of [code x tcsh] pairs? >> >> If not, how should the server embed tcsh in "code" and what >> constructions are recommended? >> >> - prateek >> >>> As some of you know, passing the authorization code securely to a >>> native app on iOS platform is next to impossible. Malicious >>> application may register the same custom scheme as the victim >>> application and hope to obtain the code, whose success rate is >>> rather high. >>> >>> We have discussed about it during the OpenID Conenct Meeting at >>> IETF 87 on Sunday, and over a lengthy thread on the OpenID >>> AB/Connect work group list. I have captured the discussion in the >>> form of I-D. It is pretty short and hopefully easy to read. >>> >>> IMHO, although it came up as an issue in OpenID Connect, this is >>> a quite useful extension to OAuth 2.0 in general. >>> >>> Best, >>> >>> Nat Sakimura >>> >>> ---------- Forwarded message ---------- >>> From: <internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>> >>> Date: 2013/7/30 >>> Subject: New Version Notification for >>> draft-sakimura-oauth-tcse-00.txt >>> To: Nat Sakimura <sakimura@gmail.com >>> <mailto:sakimura@gmail.com>>, John Bradley >>> <jbradley@pingidentity.com <mailto:jbradley@pingidentity.com>>, >>> Naveen Agarwal <naa@google.com <mailto:naa@google.com>> >>> >>> >>> >>> A new version of I-D, draft-sakimura-oauth-tcse-00.txt >>> has been successfully submitted by Nat Sakimura and posted to the >>> IETF repository. >>> >>> Filename: draft-sakimura-oauth-tcse >>> Revision: 00 >>> Title: OAuth Transient Client Secret Extension for >>> Public Clients >>> Creation date: 2013-07-29 >>> Group: Individual Submission >>> Number of pages: 7 >>> URL: >>> http://www.ietf.org/internet-drafts/draft-sakimura-oauth-tcse-00.txt >>> Status: http://datatracker.ietf.org/doc/draft-sakimura-oauth-tcse >>> Htmlized: http://tools.ietf.org/html/draft-sakimura-oauth-tcse-00 >>> >>> >>> Abstract: >>> The OAuth 2.0 public client utilizing code flow is susceptible >>> to the >>> code interception attack. This specification describe a mechanism >>> that acts as a control against this threat. >>> >>> >>> >>> >>> >>> Please note that it may take a couple of minutes from the time of >>> submission >>> until the htmlized version and diff are available at >>> tools.ietf.org <http://tools.ietf.org/>. >>> >>> The IETF Secretariat >>> >>> >>> >>> >>> -- >>> Nat Sakimura (=nat) >>> Chairman, OpenID Foundation >>> http://nat.sakimura.org/ >>> @_nat_en >>> >>> >>> _______________________________________________ >>> OAuth mailing list >>> OAuth@ietf.org <mailto:OAuth@ietf.org> >>> https://www.ietf.org/mailman/listinfo/oauth >> >> >> >> >> -- >> Nat Sakimura (=nat) >> Chairman, OpenID Foundation >> http://nat.sakimura.org/ >> @_nat_en >> _______________________________________________ >> OAuth mailing list >> OAuth@ietf.org <mailto:OAuth@ietf.org> >> https://www.ietf.org/mailman/listinfo/oauth > > > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth >
- [OAUTH-WG] Fwd: New Version Notification for draf… Nat Sakimura
- Re: [OAUTH-WG] New Version Notification for draft… Nat Sakimura
- Re: [OAUTH-WG] Fwd: New Version Notification for … Morteza Ansari (moransar)
- Re: [OAUTH-WG] New Version Notification for draft… Sergey Beryozkin
- Re: [OAUTH-WG] New Version Notification for draft… John Bradley
- Re: [OAUTH-WG] New Version Notification for draft… Sergey Beryozkin
- Re: [OAUTH-WG] Fwd: New Version Notification for … Prateek Mishra
- Re: [OAUTH-WG] Fwd: New Version Notification for … John Bradley
- Re: [OAUTH-WG] Fwd: New Version Notification for … Phil Hunt
- Re: [OAUTH-WG] Fwd: New Version Notification for … John Bradley
- Re: [OAUTH-WG] Fwd: New Version Notification for … Nat Sakimura
- Re: [OAUTH-WG] Fwd: New Version Notification for … Phil Hunt
- Re: [OAUTH-WG] Fwd: New Version Notification for … Nat Sakimura
- Re: [OAUTH-WG] Fwd: New Version Notification for … John Bradley
- Re: [OAUTH-WG] Fwd: New Version Notification for … Axel.Nennker
- Re: [OAUTH-WG] Fwd: New Version Notification for … Sergey Beryozkin