Re: [OAUTH-WG] Security of OAuth on Andriod [Was: Re: Token Mediating and session Information Backend For Frontend (TMI BFF)]

"SOMMER, DOMINIK" <dominik.sommer@milesandmore.com> Wed, 17 March 2021 08:04 UTC

Return-Path: <prvs=703ed5d97=dominik.sommer@milesandmore.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1088D3A0B8C for <oauth@ietfa.amsl.com>; Wed, 17 Mar 2021 01:04:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.365
X-Spam-Level:
X-Spam-Status: No, score=-2.365 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.248, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=milesandmore.com header.b=HF2AIWV/; dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=lufthansagroup.onmicrosoft.com header.b=pnDl+Yb6
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9wYvC8OlsZ14 for <oauth@ietfa.amsl.com>; Wed, 17 Mar 2021 01:04:29 -0700 (PDT)
Received: from mx1.lhsystems.com (mx1.lhsystems.com [80.77.214.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4C7483A0B88 for <OAUTH@ietf.org>; Wed, 17 Mar 2021 01:04:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=milesandmore.com; i=@milesandmore.com; q=dns/txt; s=ibmqlh-201908-AACwux8Wm9; t=1615968269; x=1647504269; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=31dJy2dLPRSKEd95NQJbhaao27UHGvLNtUJO5Ug9gOE=; b=HF2AIWV/iTCoEHo2qf75VrheK9gbXVLXlL1U9f1+McjsnFG1WsXmNEYB SYvY33oZjfbKp2qwJEqpq0ZnPGnt4s7FiKPwnXm9+iukyUJVLwyYYbnA8 HIfyKoYYCFumiqz/0lIajnV7UXHsXp+o0EapDLFamBiA8S2x14SfL5Ia3 Q=;
IronPort-SDR: rAmMQOMiM/OFK3PRyPnVO25YuatkfGZT+8KBBeE6Vg53u6B9h5zo3hxBZuGxI1zKyBA3J7Neea nB8mxOEWN4qw==
X-IronPort-Anti-NAV: true
X-TimeStamp-GMT1: 17 Mar 2021 08:04:26 -0000
Received: from unknown (HELO smailin.ads.dlh.de) ([57.56.251.80]) by mx1.lhsystems.com with ESMTP/TLS/ECDHE-RSA-AES256-SHA; 17 Mar 2021 09:04:26 +0100
Received: from SW-FRAADS-EDG02.cns.fra.dlh.de (57.20.0.11) by SW-FRAADS-HUB33.ads.dlh.de (57.56.251.80) with Microsoft SMTP Server (TLS) id 14.3.498.0; Wed, 17 Mar 2021 09:04:25 +0100
Received: from EUR01-VE1-obe.outbound.protection.outlook.com (104.47.1.51) by mxO365.app.lufthansa.com (80.77.212.235) with Microsoft SMTP Server (TLS) id 14.3.498.0; Wed, 17 Mar 2021 09:04:19 +0100
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=EjXXq2tYhv26BMAhpkHN9W+rggJTBxb0N89U98ePp0i5g9BV7hed8sakdV8DHIsK33XGOr3IN3NnT/QGJqRyfR3MJNoRFtK19XamuwA5uajN2X+d+DyH+KWDiBuOiwgfin2rLDArmueo9+HD2lZ8G/i6afYc1vziIn8EqKtLfkoZVq2+cMyOpYp62O5XXYxffgfyWIDSpE2295hGEwdJyKM8UDrOb5wOnwrMKcWP90EcCQ+Q9GftpPaZK/rtAXmThg/hdLWBp3skDYPmrBttc9MyEmnlDCinozwctzFg0qV2WIcQVgqacE9TmQ/pAgI/Gq3tbnLsJxBHg9rPC68V3w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=wbUgaAqRVb3tjGhueLFBgvxtvWIA8/BqcIMfXX3Ii40=; b=PFMlZHFkhojHFvcSwdClz7JF4jEjhbcqPSZs9i8qy99m0Uy9W00f4/Kq+ZohTVqDov3EUhxRm3d/YYxSkOrFi/U91NG645YG7bZvaqoMUsd4WNBgLr3hkZs68j/gwQXcRmR7du4Emuw11NaHANoaFPAXVwNObE3iTjUZsknCKNAT9nm/nWfypfQE2Makjv2DbsJoBq2PRv7y2+st6OLL5W0SX/RMRlV+2BAo8aS/DlqqT4qyrtY149vG5neeegWSp+buQUqopIbASvAq6POnI3nZEyAPTsDn1XrPPMui2luXRrxyQBSAyVIVmfQNkv6jxU5EfBemcSsg7yOrU81Ilg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=milesandmore.com; dmarc=pass action=none header.from=milesandmore.com; dkim=pass header.d=milesandmore.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lufthansagroup.onmicrosoft.com; s=selector1-lufthansagroup-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=wbUgaAqRVb3tjGhueLFBgvxtvWIA8/BqcIMfXX3Ii40=; b=pnDl+Yb6wM9PAb4D5aEk9KXL+SiCtjQi+Pn2YaUpcxiT2OKqaYt9cuxZ4jOYieMawAHgx8STHZAJgeJzn7QS/JVrdbtbGIH2ez2m78CFQzPLuNRU2zOkJ729QcAiTWB1VL/PLOGuFR04oX6ciN6Mcwu9B98qWlPAy1P64rv6+QI=
Received: from AM0PR09MB2803.eurprd09.prod.outlook.com (2603:10a6:208:12a::26) by AM0PR09MB4404.eurprd09.prod.outlook.com (2603:10a6:20b:148::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3933.32; Wed, 17 Mar 2021 08:04:22 +0000
Received: from AM0PR09MB2803.eurprd09.prod.outlook.com ([fe80::8f3:8afe:b1ac:a202]) by AM0PR09MB2803.eurprd09.prod.outlook.com ([fe80::8f3:8afe:b1ac:a202%5]) with mapi id 15.20.3955.018; Wed, 17 Mar 2021 08:04:22 +0000
From: "SOMMER, DOMINIK" <dominik.sommer@milesandmore.com>
To: "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] Security of OAuth on Andriod [Was: Re: Token Mediating and session Information Backend For Frontend (TMI BFF)]
Thread-Index: AQHXGYKC3KvI6low+U6C3SgHQd5h3KqHpoKAgAArtLA=
Date: Wed, 17 Mar 2021 08:04:13 +0000
Deferred-Delivery: Wed, 17 Mar 2021 08:02:58 +0000
Message-ID: <AM0PR09MB2803BF0A50B14B1E2C5F22A4F36A9@AM0PR09MB2803.eurprd09.prod.outlook.com>
References: <CAGL0X-qvLz=gG06Q3mL5yNs5f-eqSwxO-g=K=cDKdmC8VP+UEg@mail.gmail.com> <AE8B3F28-D7B3-4A70-8E0D-2F673970E008@forgerock.com> <8b0b9840-1a80-d06f-316b-8a5273ad2124@aol.com> <C63FB3A1-CAEE-491C-8589-127A878559F9@forgerock.com> <CAJTOVTbXpU5HmeXUY90kcM4qe5gOQAhdT6RrZTZ8qPLykeJsWQ@mail.gmail.com>
In-Reply-To: <CAJTOVTbXpU5HmeXUY90kcM4qe5gOQAhdT6RrZTZ8qPLykeJsWQ@mail.gmail.com>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=milesandmore.com;
x-originating-ip: [193.24.32.58]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 1f30c77d-b803-4945-cd17-08d8e91b468a
x-ms-traffictypediagnostic: AM0PR09MB4404:
x-microsoft-antispam-prvs: <AM0PR09MB44049E802A42ADB8110FC7E7F36A9@AM0PR09MB4404.eurprd09.prod.outlook.com>
x-eop: bypass_spam_filtering
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM0PR09MB2803.eurprd09.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(346002)(376002)(366004)(39850400004)(136003)(396003)(186003)(66556008)(76116006)(66574015)(966005)(9686003)(8676002)(66476007)(19627235002)(26005)(55016002)(316002)(478600001)(52536014)(53546011)(66446008)(6506007)(71200400001)(6916009)(33656002)(83380400001)(6666004)(8936002)(166002)(7696005)(15650500001)(5660300002)(2906002)(64756008)(66946007)(86362001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_AM0PR09MB2803BF0A50B14B1E2C5F22A4F36A9AM0PR09MB2803eurp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AM0PR09MB2803.eurprd09.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 1f30c77d-b803-4945-cd17-08d8e91b468a
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Mar 2021 08:04:22.9255 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72e15514-5be9-46a8-8b0b-af9b1b77b3b8
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: YjqagfZtLAoefYSpYsKOm6eUcLft73aCk5BQzetaOvVwBMXqfE7a+ElwHv6JiLcl4fHMfndiDAPJ9zBQFh/BUhzTQ9mwkpz4pQ1KT4LcjJw=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR09MB4404
X-OriginatorOrg: milesandmore.com
X-EXCLAIMER-MD-CONFIG: 5a548768-c397-4167-aef4-f33627bbf3ec
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/AF7Rvbp1HFGiwVVYNdBYnANLGbQ>
Subject: Re: [OAUTH-WG] Security of OAuth on Andriod [Was: Re: Token Mediating and session Information Backend For Frontend (TMI BFF)]
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Mar 2021 08:04:32 -0000

I’d throw in PKCE as a means of assuring that the client who made the user follow the auth flow in the first place, is apparently the only one able to “redeem” the auth code returned to the redirect_uri.


Von: OAuth <oauth-bounces@ietf.org> Im Auftrag von Om
Gesendet: Mittwoch, 17. März 2021 06:17
An: Neil Madden <neil.madden@forgerock.com>
Cc: Vittorio Bertocci <vittorio.bertocci=40auth0.com@dmarc.ietf.org>; oauth <oauth@ietf.org>; Warren Parad <wparad=40rhosys.ch@dmarc.ietf.org>
Betreff: Re: [OAUTH-WG] Security of OAuth on Andriod [Was: Re: Token Mediating and session Information Backend For Frontend (TMI BFF)]

If I read this correctly, https://tools.ietf.org/html/draft-ietf-oauth-v2-1-01#section-10 the 2.1 draft already addresses this under best practices.

On Mon, Mar 15, 2021 at 3:31 PM Neil Madden <neil.madden@forgerock.com<mailto:neil.madden@forgerock.com>> wrote:
I want to come back to this topic as a new thread.

As I understand things, the difference on Android is that any app can claim to be a generic web browser and so claim to handle all URIs. Whereas on iOS only specifically vetted apps can claim to be web browsers. Is that correct?

If so, this does seem like a quite large hole in security of OAuth on Android. Should we be considering a new draft recommending alternative measures (such as attestation) on Android? Presumably the same issue is also true on most desktop OS?

— Neil


On 23 Feb 2021, at 15:20, George Fletcher <gffletch@aol.com<mailto:gffletch@aol.com>> wrote:

Unfortunately, in the mobile app world this isn't sufficient. On iOS using Universal Links will bind the https redirect_url to your app in a secure way but it doesn't work the same way on Android with App Links. There is still a problem with "mobile app impersonation". If you have an app that you want to ensure is "your" app then the most secure way is to look at "app attestation". This is however, way off topic for this thread :)
On 2/14/21 9:28 AM, Neil Madden wrote:

Public clients are implicitly authenticated by their ownership of the registered redirect_uri. This why it’s important to use a redirect_uri for which ownership can be reasonably established, such as HTTPS endpoints with exact URI matching.



There are more things that can go wrong with that (see the security BCP), but it can be made reasonably secure.



— Neil



On 14 Feb 2021, at 13:48, Stoycho Sleptsov <stoycho.sleptsov@gmail.com><mailto:stoycho.sleptsov@gmail.com> wrote:





I would like to add my reasons about the "Why are developers creating BFF for their frontends to communicate with an AS",

with the objective to verify if they are valid.



I need the client app. to be authenticated at the AS (to determine if it is a first-party app., for example).

If we decide to implement our client as a frontend SPA , then we have no other option except through a BFF, as PKCE does not help for authentication.



Or is it considered a bad practice to do that?



Regards,

Stoycho.

Sitz der Gesellschaft / Corporate Headquarters: Miles & More GmbH, Frankfurt am Main, Registereintragung / Registration: Amtsgericht Frankfurt am Main HRB 116409
Geschaeftsfuehrung / Management Board: Sebastian Riedle, Dr. Oliver Schmitt



_______________________________________________

OAuth mailing list

OAuth@ietf.org<mailto:OAuth@ietf.org>

https://www.ietf.org/mailman/listinfo/oauth



ForgeRock values your Privacy<https://www.forgerock.com/your-privacy>_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth


--
- Regards,
Omkar Khair