Re: [OAUTH-WG] Fwd: New Version Notification for draft-sakimura-oauth-tcse-00.txt

Sergey Beryozkin <sberyozkin@gmail.com> Thu, 26 September 2013 12:40 UTC

Return-Path: <sberyozkin@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3AD2A21F995F for <oauth@ietfa.amsl.com>; Thu, 26 Sep 2013 05:40:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wkhPs9q6onbL for <oauth@ietfa.amsl.com>; Thu, 26 Sep 2013 05:40:27 -0700 (PDT)
Received: from mail-wi0-x22c.google.com (mail-wi0-x22c.google.com [IPv6:2a00:1450:400c:c05::22c]) by ietfa.amsl.com (Postfix) with ESMTP id BDA0E21F9998 for <oauth@ietf.org>; Thu, 26 Sep 2013 05:40:26 -0700 (PDT)
Received: by mail-wi0-f172.google.com with SMTP id hn9so6971798wib.17 for <oauth@ietf.org>; Thu, 26 Sep 2013 05:40:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=hTdVS+Dej5ylvX92snr9ctVHiyiII5fIoMTsl5mQApg=; b=fMXCVsk2GrrzhHBDAI4s7OqCeuI7GtgE9pqk0lML9iDQXjwdfAgxYKtLFEoa14QfDa 1Bopj0U/7OOKLebSqdfhGKIDVoZBeMOdwW++Hf236BtPUhOeOsgk79xBYGpJIS6wwI/u 3iJCXGsyIxIN4PgGfkpZd3K6J50hV4eVQ+35fGOVbIjSGqTlRl0vMo7R2Id9LCgt2Zey 1eMDVCLkzP5S7rux1uQPucMAzddoXy3DAO4Anq0AcqnvNRxD5b5oNHzLTpuq4SAb62s3 DalH9w0PvKSoTO+LvPWkVH94FQttx+SFVlnvcE9Mw/7we6/LjUW0+Y4B+ii4A9N//D2k lLyw==
X-Received: by 10.180.208.97 with SMTP id md1mr596058wic.41.1380199219483; Thu, 26 Sep 2013 05:40:19 -0700 (PDT)
Received: from [192.168.2.5] ([89.100.141.107]) by mx.google.com with ESMTPSA id mb7sm3127790wic.10.1969.12.31.16.00.00 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 26 Sep 2013 05:40:18 -0700 (PDT)
Message-ID: <52442B31.6060602@gmail.com>
Date: Thu, 26 Sep 2013 13:40:17 +0100
From: Sergey Beryozkin <sberyozkin@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130623 Thunderbird/17.0.7
MIME-Version: 1.0
To: John Bradley <ve7jtb@ve7jtb.com>
References: <20130730095129.29309.12243.idtracker@ietfa.amsl.com> <CABzCy2CC3Oi2J7GZJVBa07=xtjMXvy9ah_h_ZwwZQXDd4qtSzw@mail.gmail.com> <5224FFBB.9050400@oracle.com> <CABzCy2C=eLUGu4uFx=mX=EQ7PGAAsNBi1JFVkfDoCfo9PQZy3Q@mail.gmail.com> <72735227-DF50-41F0-B744-9ED1706339B5@ve7jtb.com>
In-Reply-To: <72735227-DF50-41F0-B744-9ED1706339B5@ve7jtb.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: oauth <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-sakimura-oauth-tcse-00.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Sep 2013 12:40:28 -0000

Hi
On 06/09/13 00:44, John Bradley wrote:
> At this point we don't know of any attack against the request, however
> that is not guaranteed to remain the case.
>
> If we send the secret in plain text through the browser it likely will
> never get IETF acceptance.
>
> We use HMAC a fair bit already I don't think that would be a significant
> hurdle for clients.
>
> The quoted text is trying to prevent the AS from leaking the value back
> to the attacker,  that would be fatal flaw if it is plaintext, and not
> optimal if it is a HMAC.
>
> AS could do something like include it in code unencrypted etc, just
> trying to prevent that.
>

Given that Resource owner credentials grant did get IETF acceptance 
without any problems (due to HTTPS being recommended I guess) and due to 
the comment below that if we have a case where the device is compromised 
then passing a transient sensitive value in clear does not really makes 
the device client any more insecure than it already is, would it make 
sense to keep the current approach in place ? I did a quick try at 
implementing it few weeks ago and it was easy to do...

Sergey

> On 2013-09-05, at 4:34 PM, Nat Sakimura <sakimura@gmail.com
> <mailto:sakimura@gmail.com>> wrote:
>
>> Depending on the level of assurance that you might want to achieve, it
>> could have been a random string. That's how some of the existing but
>> widely deployed implementations are doing.
>>
>> I have taken a step forward to do the hashing to give a little more
>> protection that even if a malware on the device captures the request,
>> it would not be able to use it in time. That's a kind of
>> man-in-the-middle and by that time happens, your device is fairly
>> badly compromised so there are opinion that it would not matter much
>> by that time that just a random string would suffice. If the WG feels
>> that way, I am happy to change it to a random string as well.
>>
>> The current "hash" design was a middle ground between a random string
>> and HMAC etc.
>>
>>
>> 2013/9/3 Prateek Mishra <prateek.mishra@oracle.com
>> <mailto:prateek.mishra@oracle.com>>
>>
>>     Nat - is there cryptanalysis of the proposed model available anyplace?
>>
>>     Extending protocols by throwing in a smidgen of hashing and a
>>     tablespoon of encryption is often a bad idea. One of the strengths
>>     of /RFC/ 6749 is that it avoids stuff like that.
>>
>>     What do you mean when you say -
>>
>>     [quote]
>>     The server MUST NOT include the "tcsh" value in the form that any
>>     entity but itself can extract it.
>>     [\quote]
>>
>>     Is this even theoretically achievable without a stateful server
>>     that maintains a table of [code x tcsh] pairs?
>>
>>     If not, how should the server embed tcsh in "code" and what
>>     constructions are recommended?
>>
>>     - prateek
>>
>>>     As some of you know, passing the authorization code securely to a
>>>     native app on iOS platform is next to impossible. Malicious
>>>     application may register the same custom scheme as the victim
>>>     application and hope to obtain the code, whose success rate is
>>>     rather high.
>>>
>>>     We have discussed about it during the OpenID Conenct Meeting at
>>>     IETF 87 on Sunday, and over a lengthy thread on the OpenID
>>>     AB/Connect work group list. I have captured the discussion in the
>>>     form of I-D. It is pretty short and hopefully easy to read.
>>>
>>>     IMHO, although it came up as an issue in OpenID Connect, this is
>>>     a quite useful extension to OAuth 2.0 in general.
>>>
>>>     Best,
>>>
>>>     Nat Sakimura
>>>
>>>     ---------- Forwarded message ----------
>>>     From: <internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>>
>>>     Date: 2013/7/30
>>>     Subject: New Version Notification for
>>>     draft-sakimura-oauth-tcse-00.txt
>>>     To: Nat Sakimura <sakimura@gmail.com
>>>     <mailto:sakimura@gmail.com>>, John Bradley
>>>     <jbradley@pingidentity.com <mailto:jbradley@pingidentity.com>>,
>>>     Naveen Agarwal <naa@google.com <mailto:naa@google.com>>
>>>
>>>
>>>
>>>     A new version of I-D, draft-sakimura-oauth-tcse-00.txt
>>>     has been successfully submitted by Nat Sakimura and posted to the
>>>     IETF repository.
>>>
>>>     Filename:        draft-sakimura-oauth-tcse
>>>     Revision:        00
>>>     Title:           OAuth Transient Client Secret Extension for
>>>     Public Clients
>>>     Creation date:   2013-07-29
>>>     Group:           Individual Submission
>>>     Number of pages: 7
>>>     URL:
>>>     http://www.ietf.org/internet-drafts/draft-sakimura-oauth-tcse-00.txt
>>>     Status: http://datatracker.ietf.org/doc/draft-sakimura-oauth-tcse
>>>     Htmlized: http://tools.ietf.org/html/draft-sakimura-oauth-tcse-00
>>>
>>>
>>>     Abstract:
>>>        The OAuth 2.0 public client utilizing code flow is susceptible
>>>     to the
>>>        code interception attack.  This specification describe a mechanism
>>>        that acts as a control against this threat.
>>>
>>>
>>>
>>>
>>>
>>>     Please note that it may take a couple of minutes from the time of
>>>     submission
>>>     until the htmlized version and diff are available at
>>>     tools.ietf.org <http://tools.ietf.org/>.
>>>
>>>     The IETF Secretariat
>>>
>>>
>>>
>>>
>>>     --
>>>     Nat Sakimura (=nat)
>>>     Chairman, OpenID Foundation
>>>     http://nat.sakimura.org/
>>>     @_nat_en
>>>
>>>
>>>     _______________________________________________
>>>     OAuth mailing list
>>>     OAuth@ietf.org  <mailto:OAuth@ietf.org>
>>>     https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>
>>
>> --
>> Nat Sakimura (=nat)
>> Chairman, OpenID Foundation
>> http://nat.sakimura.org/
>> @_nat_en
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>