Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011
Mark Mcgloin <mark.mcgloin@ie.ibm.com> Wed, 04 January 2012 11:43 UTC
Return-Path: <mark.mcgloin@ie.ibm.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 415EB21F8600 for <oauth@ietfa.amsl.com>; Wed, 4 Jan 2012 03:43:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.558
X-Spam-Level:
X-Spam-Status: No, score=-2.558 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, MIME_BASE64_BLANKS=0.041]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aw1Ixqmk+vWA for <oauth@ietfa.amsl.com>; Wed, 4 Jan 2012 03:43:00 -0800 (PST)
Received: from e06smtp11.uk.ibm.com (e06smtp11.uk.ibm.com [195.75.94.107]) by ietfa.amsl.com (Postfix) with ESMTP id 9507021F85E8 for <oauth@ietf.org>; Wed, 4 Jan 2012 03:42:59 -0800 (PST)
Received: from /spool/local by e06smtp11.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for <oauth@ietf.org> from <mark.mcgloin@ie.ibm.com>; Wed, 4 Jan 2012 11:42:57 -0000
Received: from d06nrmr1507.portsmouth.uk.ibm.com ([9.149.38.233]) by e06smtp11.uk.ibm.com ([192.168.101.141]) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Wed, 4 Jan 2012 11:42:26 -0000
Received: from d06av02.portsmouth.uk.ibm.com (d06av02.portsmouth.uk.ibm.com [9.149.37.228]) by d06nrmr1507.portsmouth.uk.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id q04BgPP51925124; Wed, 4 Jan 2012 11:42:25 GMT
Received: from d06av02.portsmouth.uk.ibm.com (loopback [127.0.0.1]) by d06av02.portsmouth.uk.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id q04BgOAn021438; Wed, 4 Jan 2012 04:42:25 -0700
Received: from d06ml091.portsmouth.uk.ibm.com (d06ml091.portsmouth.uk.ibm.com [9.149.104.170]) by d06av02.portsmouth.uk.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id q04BgODX021419; Wed, 4 Jan 2012 04:42:24 -0700
In-Reply-To: <4F0394D6.1090006@mtcc.com>
References: <CALaySJKhYQQdmjvWBLS3mwzzrDt35jfDn2xZCuDOk=hpwEUiKQ@mail.gmail.com> <CAC4RtVDyiuqCGO25nZQEVxi0uchTi2gu_peh=+FwmWwZsQ=LEQ@mail.gmail.com> <CAC4RtVCvnz7n9Ei08h7QRruesJ=GeOMOOvBkNAVmcc8_gzg7QQ@mail.gmail.com> <8AB6F5CC-E9A2-4A07-9AA0-83FB7C67A221@oracle.com> <4EEA3951.5010904@mtcc.com> <OF6C9EBE7C.1B053FE3-ON80257968.003C02DF-80257968.003CAA12@ie.ibm.com> <4EEB5BDD.7080401@mtcc.com> <4F038CB9.1040403@mtcc.com> <F674B8D6-54D6-4B39-A494-9D7EB6E058D6@oracle.com> <4F0394D6.1090006@mtcc.com>
X-KeepSent: D88021B6:E1FD29B9-8025797B:004036CF; type=4; name=$KeepSent
To: Michael Thomas <mike@mtcc.com>
X-Mailer: Lotus Notes Release 8.5.1FP5 SHF29 November 12, 2010
Message-ID: <OFD88021B6.E1FD29B9-ON8025797B.004036CF-8025797B.00404EA6@ie.ibm.com>
From: Mark Mcgloin <mark.mcgloin@ie.ibm.com>
Date: Wed, 04 Jan 2012 11:42:19 +0000
X-MIMETrack: Serialize by Router on D06ML091/06/M/IBM(Release 8.5.2FP1 ZX852FP1HF12|September 28, 2011) at 04/01/2012 11:42:19
MIME-Version: 1.0
Content-type: text/plain; charset="UTF-8"
Content-transfer-encoding: base64
x-cbid: 12010411-5024-0000-0000-00000141A02B
Cc: Barry Leiba <barryleiba@computer.org>, oauth WG <oauth@ietf.org>, "oauth-bounces@ietf.org" <oauth-bounces@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Jan 2012 11:43:01 -0000
Hi Michael Can you clearly word the threat for which this countermeasure (or lack of) applies thanks Mark Michael Thomas <mike@mtcc.com> wrote on 03/01/2012 23:52:54: > From: > > Michael Thomas <mike@mtcc.com> > > To: > > Phillip Hunt <phil.hunt@oracle.com> > > Cc: > > Mark Mcgloin/Ireland/IBM@IBMIE, Barry Leiba > <barryleiba@computer.org>, oauth WG <oauth@ietf.org>, "oauth- > bounces@ietf.org" <oauth-bounces@ietf.org> > > Date: > > 03/01/2012 23:53 > > Subject: > > Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011 > > On 01/03/2012 03:46 PM, Phillip Hunt wrote: > > -1. I think you should be suggesting alternative text at this > stage. We all have same responsibilities here. > > My "responsibility", such as it is, is to bring up that the document's > threat mitigations suggested don't work. I am only a recent and > reluctant participant, versus the principals of this working group > who have been around for many years. > > But if you insist, here's my concise suggestion to that points that I > raised objections to: > > "No known mitigation exists." > > Mike > > > > > Phil > > > > On 2012-01-03, at 15:18, Michael Thomas<mike@mtcc.com> wrote: > > > >> Barry -- It's now been two weeks and I haven't heard anything to > >> the objections I raised. It is not my responsibility to come up with > >> mitigation that works, it's the working group's. If there is no reasonable > >> mitigation it should just say that. > >> > >> Mike > >> > >> On 12/16/2011 06:55 AM, Michael Thomas wrote: > >>> On 12/16/2011 03:02 AM, Mark Mcgloin wrote: > >>>> Michael, > >>>> > >>>> I will review the comments from Phil where he suggests some changes in > >>>> section 4.1.4 of the threat model > >>>> > >>>> I am unclear exactly what you are proposing. If you want to propose a > >>>> clearly worded revamp of that section in the next couple of days, I am > >>>> willing to review and accept legitimate changes. Clearly worded means > >>>> concise, technically accurate and devoid of alarmist phrases > and words used > >>>> out of context, such as existential. Can I suggest you review with a > >>>> colleague before posting here. > >>> Barry -- I have gone through this section and made comments > >>> and was blown off seemingly without reading them at all, and > >>> now I'm being told to come up with text for which I can be blown > >>> off again: "Can I suggest you review..." > >>> > >>> The fact of the matter is that my comments say that the > >>> threats are understated and mitigations that are proposed do not > >>> work. It's not my job alone to fix this. It's the working group's. > >>> In fact if I were to propose text, it would be along the lines of > >>> "can't be mitigated" because I do not know how to fix them. If > >>> nobody else can come up with a better mitigation, then that > >>> *is* what should be there, not some hand waving nonsense that > >>> doesn't work. > >>> > >>> Mike, "instruct users..." feh > >>> > >>>> Regards > >>>> Mark > >>>> > >>>> oauth-bounces@ietf.org wrote on 15/12/2011 18:15:45: > >>>> > >>>>> From: > >>>>> > >>>>> Michael Thomas<mike@mtcc.com> > >>>>> > >>>>> To: > >>>>> > >>>>> Phil Hunt<phil.hunt@oracle.com> > >>>>> > >>>>> Cc: > >>>>> > >>>>> Barry Leiba<barryleiba@computer.org>, oauth WG<oauth@ietf.org> > >>>>> > >>>>> Date: > >>>>> > >>>>> 15/12/2011 18:16 > >>>>> > >>>>> Subject: > >>>>> > >>>>> Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec > >>>> 2011 > >>>>> Sent by: > >>>>> > >>>>> oauth-bounces@ietf.org > >>>>> > >>>>> On 12/15/2011 09:54 AM, Phil Hunt wrote: > >>>>>> Note: one change recommended below... > >>>>>> > >>>>>> With regards to 4.1.4… > >>>>>> 4.1.4. Threat: End-user credentials phished using compromised or > >>>>>> embedded browser > >>>>>> > >>>>>> A malicious application could attempt to phish end-user passwords > >>>> by > >>>>>> misusing an embedded browser in the end-user > authorization process, > >>>>>> or by presenting its own user-interface instead of > allowing trusted > >>>>>> system browser to render the authorization user interface. By > >>>> doing > >>>>>> so, the usual visual trust mechanisms may be bypassed (e.g. TLS > >>>>>> confirmation, web site mechanisms). By using an embedded or > >>>> internal > >>>>>> client application user interface, the client application has > >>>> access > >>>>>> to additional information it should not have access to (e.g. uid/ > >>>>>> password). > >>>>>> > >>>>>> > >>>>>> [mat] I think it's also worth mentioning either here, or in another > >>>>>> threat that there is a further social engineering misuse/attack where > >>>> an > >>>>>> app offers/demands to keep your credentials so that you don't have to > >>>> go > >>>>>> through the authorization rigmarole. Users are already conditioned to > >>>>>> give their credentials up to do things -- just this morning I > >>>>> noticed facebook > >>>>>> asking for my email password which they promise with sugar on top to > >>>> not > >>>>>> store. It might be worth mentioning that things like CAPTCHA could be > >>>>>> deployed to defend against that sort of attack/misuse. > >>>>>> > >>>>>> [Phil] I don't think we need to really add much here. We could > >>>>> write whole essays on this topic and likely will. > >>>>>> I think the point is simply to educate the client developer that > >>>>> there is no need for a client application to ever have access to a > >>>>> raw uid/password (or any other user credential). > >>>>>> [/Phi] > >>>>>> > >>>>> Remember: I came here not understanding whether this threat was real or > >>>> not. > >>>>> A threat document that can't be bothered to elaborate on one of the > >>>> biggest > >>>>> existential threats to the protocol is worthless. The way it is worded > >>>>> now does > >>>>> not make it crystal clear that, yes, this means UIWebView's in iPhone > >>>>> apps, etc too. > >>>>> It should because it needs to scream: THIS THREAT APPLIES TO YOU, AUTH > >>>>> SERVER. > >>>>> > >>>>> > >>>>>> [snip] > >>>>>> > >>>>>> Countermeasures: > >>>>>> > >>>>>> o Client developers and end-user can be educated to trust an > >>>>>> external System-Browser only. > >>>>>> > >>>>>> > >>>>>> [mat] I assume that this is in here just for the amusement factor > >>>> because > >>>>>> it is not a credible countermeasure. > >>>>>> > >>>>>> [Phil] I agree, Firefox recently demonstrated how poorly users > >>>>> recognize the security signals in the browser by dropping the "lock" > >>>>> icon without announcement. When I found out, I had already been > >>>>> using it for some time and hadn't noticed. This counter measure > >>>>> should be changed to: > >>>>>> o The OAuth flow is designed so that client applications never > >>>>> need to know user passwords. Where possible Client applications > >>>>> SHOULD avoid directly asking for user credentials during an > >>>>> authorization flow. > >>>>>> [/Phil] > >>>>>> > >>>>> The basic problem here is that the client app is not trusted. So if it's > >>>>> a bad > >>>>> actor this admonition will be ignored. If it's a good actor, there > >>>>> wasn't a threat > >>>>> in first place. So the mitigation completely misses the mark. > >>>>> > >>>>>> o Client applications could be validated prior publication in a > >>>>>> application market. > >>>>>> > >>>>>> [mat] How would this be done in practice? > >>>>>> [Phil] I think this needs to change to: > >>>>>> > >>>>>> o Client applications could be validated for acceptable practices > >>>>> by the Resource Site provider prior to issuing production Client > >>>> Credentials. > >>>>> When, exactly, can we expect to see this in the field? Neither Twitter > >>>>> or Facebook > >>>>> do this. And even if they were so inclined, the draft provides exactly > >>>>> zero guidance > >>>>> as to what exactly that "validated" might mean in practice. The way I > >>>>> read this is: > >>>>> "we don't know how to mitigate this". > >>>>>> [/Phil] > >>>>>> o Client developers should not collect authentication information > >>>>>> directly from users and should instead use redirects > to and back > >>>>>> from a trusted external system-browser. > >>>>>> > >>>>>> > >>>>>> [mat] How would the resource/authentication server enforce such a > >>>> thing? > >>>>>> [Phil] This is a best practice for the client developer. [Phil] > >>>>>> > >>>>>> > >>>>> I don't even know what that means in the context of embedded apps. > >>>>> Has anybody even tried this? At the very least, an example flow might > >>>>> be useful for the uninitiated client developer. > >>>>> > >>>>> Mike > >>>>> _______________________________________________ > >>>>> OAuth mailing list > >>>>> OAuth@ietf.org > >>>>> https://www.ietf.org/mailman/listinfo/oauth > >>>>> > >>> _______________________________________________ > >>> OAuth mailing list > >>> OAuth@ietf.org > >>> https://www.ietf.org/mailman/listinfo/oauth > >> _______________________________________________ > >> OAuth mailing list > >> OAuth@ietf.org > >> https://www.ietf.org/mailman/listinfo/oauth >
- [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmode… Barry Leiba
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Barry Leiba
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Barry Leiba
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Mark Mcgloin
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… André DeMarre
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Phil Hunt
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Mark Mcgloin
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Phillip Hunt
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Mark Mcgloin
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Peter Saint-Andre
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Mark Mcgloin
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Barry Leiba
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Torsten Lodderstedt
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… William Mills
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… William Mills
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Eran Hammer-Lahav
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… William Mills
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Mark Mcgloin
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Mark Mcgloin
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Justin Richer
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… William Mills
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… William Mills
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… George Fletcher
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Mark Mcgloin
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas