Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt

John Bradley <ve7jtb@ve7jtb.com> Thu, 28 February 2013 17:23 UTC

Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0AE8821F8B04 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:23:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.371
X-Spam-Level:
X-Spam-Status: No, score=-2.371 tagged_above=-999 required=5 tests=[AWL=-1.227, BAYES_00=-2.599, FRT_ADOBE2=2.455, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pyKrIXeBeRVy for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:23:25 -0800 (PST)
Received: from mail-pb0-f53.google.com (mail-pb0-f53.google.com [209.85.160.53]) by ietfa.amsl.com (Postfix) with ESMTP id 88B4A21F8AC3 for <oauth@ietf.org>; Thu, 28 Feb 2013 09:23:25 -0800 (PST)
Received: by mail-pb0-f53.google.com with SMTP id un1so1193756pbc.12 for <oauth@ietf.org>; Thu, 28 Feb 2013 09:23:25 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=Ao98uxVG8wm/54d16hqL4gwqsND8SRze0C0ReJ9B/6k=; b=V5mefsLY6mScswsBN6gVNaYvYBnIpM8HWi6ovhFNIo60vGOzjQyzDSawG1eVhY8fpG SHgO7KoiYikxhwR2TYIQ6QBO22Y6L94oMSs1LAg8yO2+HNGjvWig2lBgkjLy/5vtHzR2 R6/+he8jdFhPwkxBCWnQPkuoZQHin7aFdAoBeC77Zsz4DR2v9ehyvRtrEsr1x+pIoA2M WaOTma/hqpHN0F9jzMv+24ns7U7vROmyrBt0nzXS430YEpc+ZVrCrMppwwCxKdZbfomu cczq08c4TzM4ysP76XaI7rAgzqrjY5M6viBlhllopSU7mVzed3WwNoG9XXlOHY+OXMg9 Qhag==
X-Received: by 10.66.158.230 with SMTP id wx6mr14166997pab.147.1362072205243; Thu, 28 Feb 2013 09:23:25 -0800 (PST)
Received: from [192.168.41.99] (ip-64-134-220-138.public.wayport.net. [64.134.220.138]) by mx.google.com with ESMTPS id pn9sm8976855pbb.22.2013.02.28.09.23.22 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 28 Feb 2013 09:23:23 -0800 (PST)
Content-Type: multipart/signed; boundary="Apple-Mail=_DB38E877-9011-49F7-A88E-0C87BCC6708B"; protocol="application/pkcs7-signature"; micalg="sha1"
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <98272BAD-131B-4151-BBB8-0937E8D6781A@adobe.com>
Date: Thu, 28 Feb 2013 09:23:20 -0800
Message-Id: <0F47E4EE-7482-45C9-B0C4-D8B0A21E63AF@ve7jtb.com>
References: <20130225124642.7425.65145.idtracker@ietfa.amsl.com> <1361956373.9883.YahooMailNeo@web31807.mail.mud.yahoo.com> <21030204-8EA7-4FB0-9DD3-2B6C8CA57E02@gmx.net> <98272BAD-131B-4151-BBB8-0937E8D6781A@adobe.com>
To: Antonio Sanso <asanso@adobe.com>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQltgOXCsg+pNUnwZhcWxUFyxV5IDwWxnXxK/XtehWH4aj4RLsaLMjv2SfDIOaTzdheIUdRh
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 17:23:27 -0000

The communication between AS and RS is not direct it is through the client in this case.   If TLS covers all the connections and is sufficient you probably don't need MAC:)

If you were to send the symmetric key in the JWT unencrypted than there is no real point in signing anything as any one intercepting the request can just sign a new one.

For symmetric keys being distributed through the access token the key needs to be encrypted to the intended RS to provide value.

John B.

On 2013-02-28, at 2:37 AM, Antonio Sanso <asanso@adobe.com> wrote:

> Hi Hannes,
> 
> apologies if I do the same question again but there is still one point that is a little obscure to me.
> 
> As long I did understand the situation for MAC is the following one.
> 
> The communication between the client and the authentication server must be https but this is not true for the communication between authentication server and resource server.
> Hence the need of this key exchange.
> 
> Is it correct? Should be the case why we do not have the same problem in the JWT Bearer case? Is because in that case https is as well mandatory between authentication server and resource server?
> 
> Thanks a lot and regards
> 
> Antonio
> 
> 
> On Feb 28, 2013, at 11:28 AM, Hannes Tschofenig wrote:
> 
>> Hi Bill, 
>> 
>> I believe you are misreading the document. In draft-ietf-oauth-v2-http-mac the client still uses the MAC when it accesses a protected resource. 
>> The only place where the JWT comes into the picture is with the description of the access token. This matters from a key distribution point of view. The session key for the MAC is included in the encrypted JWT. The JWT is encrypted by the authorization server and decrypted by the resource server. 
>> 
>> Information about how header fields get included in the MAC is described in Section 5.
>> 
>> The nonce isn't killed it is just called differently: seq-nr. The stuff in the original MAC specification actually wasn't a nonce (from the semantic point of view). 
>> The extension parameter is there implicitly by allowing additional header fields to be included in the MAC computation.
>> 
>> I need to look at the port number field again. 
>> 
>> Ciao
>> Hannes
>> 
>> On Feb 27, 2013, at 11:12 AM, William Mills wrote:
>> 
>>> Just read the draft quickly.  
>>> 
>>> Since we're now leaning on JWT do we need to include the token in this?  Why not just make an additional "Envelope MAC" thing and have the signature include the 3 JWT parts in the signature base string?  That object then just becomes a JSON container for the kid, timestamp, signature method, signature etc. That thing then is a 4th base64 encoded JSON thing in the auth header.
>>> 
>>> How header fields get included in the signature needs definition.
>>> 
>>> Why did you kill the port number, nonce, and extension parameter out of the signature base string?
>>> 
>>> The BNF appears to have no separators between values.
>>> 
>>> -bill
>>> 
>>> 
>>> From: "internet-drafts@ietf.org" <internet-drafts@ietf.org>
>>> To: i-d-announce@ietf.org 
>>> Cc: oauth@ietf.org 
>>> Sent: Monday, February 25, 2013 4:46 AM
>>> Subject: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
>>> 
>>> 
>>> A New Internet-Draft is available from the on-line Internet-Drafts directories.
>>> This draft is a work item of the Web Authorization Protocol Working Group of the IETF.
>>> 
>>>   Title          : OAuth 2.0 Message Authentication Code (MAC) Tokens
>>>   Author(s)      : Justin Richer
>>>                         William Mills
>>>                         Hannes Tschofenig
>>>   Filename        : draft-ietf-oauth-v2-http-mac-03.txt
>>>   Pages          : 26
>>>   Date            : 2013-02-25
>>> 
>>> Abstract:
>>> This specification describes how to use MAC Tokens in HTTP requests
>>> to access OAuth 2.0 protected resources.  An OAuth client willing to
>>> access a protected resource needs to demonstrate possession of a
>>> crytographic key by using it with a keyed message digest function to
>>> the request.
>>> 
>>> The document also defines a key distribution protocol for obtaining a
>>> fresh session key.
>>> 
>>> 
>>> The IETF datatracker status page for this draft is:
>>> https://datatracker.ietf.org/doc/draft-ietf-oauth-v2-http-mac
>>> 
>>> There's also a htmlized version available at:
>>> http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-03
>>> 
>>> A diff from the previous version is available at:
>>> http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-v2-http-mac-03
>>> 
>>> 
>>> Internet-Drafts are also available by anonymous FTP at:
>>> ftp://ftp.ietf.org/internet-drafts/
>>> 
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>> 
>>> 
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth