Re: [OAUTH-WG] mistake in draft-ietf-oauth-v2-http-mac-01

William Mills <wmills_92105@yahoo.com> Fri, 10 August 2012 16:57 UTC

Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CDDCA21F877B for <oauth@ietfa.amsl.com>; Fri, 10 Aug 2012 09:57:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.452
X-Spam-Level:
X-Spam-Status: No, score=-2.452 tagged_above=-999 required=5 tests=[AWL=-0.454, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_35=0.6]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wsAEJkLKO84H for <oauth@ietfa.amsl.com>; Fri, 10 Aug 2012 09:57:39 -0700 (PDT)
Received: from nm11.bullet.mail.sp2.yahoo.com (nm11.bullet.mail.sp2.yahoo.com [98.139.91.81]) by ietfa.amsl.com (Postfix) with ESMTP id 8BDC621F8775 for <oauth@ietf.org>; Fri, 10 Aug 2012 09:57:39 -0700 (PDT)
Received: from [72.30.22.79] by nm11.bullet.mail.sp2.yahoo.com with NNFMP; 10 Aug 2012 16:57:36 -0000
Received: from [98.139.91.15] by tm13.bullet.mail.sp2.yahoo.com with NNFMP; 10 Aug 2012 16:57:36 -0000
Received: from [127.0.0.1] by omp1015.mail.sp2.yahoo.com with NNFMP; 10 Aug 2012 16:57:36 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 792011.57242.bm@omp1015.mail.sp2.yahoo.com
Received: (qmail 47484 invoked by uid 60001); 10 Aug 2012 16:57:36 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1344617856; bh=wosk1gXkvgUDNC5BY7uJR+cuWfE4CT8756bRW5H1/1c=; h=X-YMail-OSG:Received:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=TtMx9VEre0RJFPXjf3i7aFtu9OuJ+qrpQZ5xWVC8mRiaDL+Da+iDuCi/IlPu1HfAfqSIFkY1TmdJM6V+sxz9ORcb8MyGXxoh9n25ZLdWO93b187haakhxPDDPOxNSZUmDxMoeuF+F6hsyCeboSu6bap3MUlNjIsIr1LWqEOLUxo=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=leim08zBVc/8t+FvBiQ5HMpd7sXzoTPphIOAKKHIB3w+JZGXft8XmcdSOKmvv0NMW3SKSpQZRQnozogv7VMA4IspEG2mqBTzmjB7AGDSNy89em4vkMFbI9pKlwGMjNVqx3UrkLJRXzIbvkjOeQPjBej1AuA0eqHfpWkiLlWvucg=;
X-YMail-OSG: tlROLv4VM1nt7KD8EWqL7snOlU_FyegCd0raqLNCRILqib6 dPBL90JWlTxZyRJ1ehpLgpVSve1tghXfAuNKc0NuPrQP3oWCsPsOLsiutJAx sLy1MvsDJ8Nk31Eda.mDoxNww5DQE6GhA2MSSFhO1d7F4bmV_bi92in7WOCP V_elqiL6q7G3V5_RZqqWNbx6LnUqBcU.eXICxZhxl1QrkCyFWrnPwtxv_N.n aFQQIIvHFnT.if2VnpRQCJUZ_isd2MSsBYYM5rGPxPC3zXt60Dox4FUYMcDj 0WLp5jTL7X.5LImDmKbFb8PFuwkzbOkoednx2NmVp7qOe12n.UAMpZzMNFIL 3eUN7aNBRySy8Xv43way0uUQ8XS5VgnLH.Zsr1JQbMyRBQT5f43LEriT1fcW fWBNqLhyR7mYr9sN_rIeXXmAWhYd5E5_J7wuEMkA.TdWDDYsUulgm4p9E_3K kweTYCFrti2nR.0y5EviE5sEgpWahS82XZkRxpghqAca7tbV.c4nTZHZBMDO fea8-
Received: from [209.131.62.115] by web31813.mail.mud.yahoo.com via HTTP; Fri, 10 Aug 2012 09:57:35 PDT
X-Mailer: YahooMailWebService/0.8.121.416
References: <CAOKdZ1dzVcKBDt6CSLuHwc4NzUVd_hUMWdpJVS6=ncdJo05=UQ@mail.gmail.com> <502280D8.40708@mitre.org> <9AD4EEF7-6187-4A4F-A855-32819BCB8321@gmx.net> <5022D344.40600@mitre.org> <EEBC9705-16C0-4697-8F38-28660C3CB553@ve7jtb.com> <5023CC18.9090809@mitre.org> <1344531175.4871.YahooMailNeo@web31812.mail.mud.yahoo.com> <3940317E-948C-4909-9B8F-2689A6B8D4EB@gmail.com> <1344534823.39489.YahooMailNeo@web31801.mail.mud.yahoo.com> <5B59B739-F8E7-4F5A-A39C-8C46055D0E98@ve7jtb.com> <1344537819.41154.YahooMailNeo@web31803.mail.mud.yahoo.com> <283C0846-4D26-4B3B-AD6D-7F895E8AF47D@gmx.net> <B33BFB58CCC8BE4998958016839DE27E067DF372@IMCMBX01.MITRE.ORG> <50252211.2010105@cdatazone.org> <9630A9AB-300F-476C-9FC6-4779695DE559@gmail.com>
Message-ID: <1344617855.44198.YahooMailNeo@web31813.mail.mud.yahoo.com>
Date: Fri, 10 Aug 2012 09:57:35 -0700
From: William Mills <wmills_92105@yahoo.com>
To: Dick Hardt <dick.hardt@gmail.com>, Rob Richards <rrichards@cdatazone.org>
In-Reply-To: <9630A9AB-300F-476C-9FC6-4779695DE559@gmail.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="767760015-741155742-1344617855=:44198"
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] mistake in draft-ietf-oauth-v2-http-mac-01
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Aug 2012 16:57:40 -0000

In no particular order:

As I said before, and many have said before me, a major issue with OAuth 1.0a has always been the signing process.  Yes there are libraries.  MAC was begun before there were a significant number of libraries.  You also have to process/parse the post body for oauth_ variables if you're really going to be compliant, and people don't like that much.

OAuth 1.0a has signing with a client secret, but that secret is managed out of band.  MAC+Oauth 2 has the client secret issued with the token.  This is fundamentally different and far more suitable for the consumer/end user client case.  1.0a is structured more for a 3 party model, where the secret is used to authenticate the 3rd party, out of band secret management isn't as much of a problem there.  

1.0a is just clumsy to implement for consumer/end user clients, the OAuth 2 model is far cleaner, and in the end in 1.0a  the secret ends up not a secret anymore.  It ends up being the equivalent of bearer tokens in security.   This is because, I think,  fundamentally the client secret is tied in through the token request/auth stuff and then also in the access to the protected resource.  

We could theoretically have something very similar to the way MAC tokens would be fetched in OAuth 2, and use that secret with OAuth 1.0a signing to access the protected resource.  That would work, but it would be kinda gross.

-bill







________________________________
 From: Dick Hardt <dick.hardt@gmail.com>
To: Rob Richards <rrichards@cdatazone.org> 
Cc: "oauth@ietf.org" <oauth@ietf.org> 
Sent: Friday, August 10, 2012 9:18 AM
Subject: Re: [OAUTH-WG] mistake in draft-ietf-oauth-v2-http-mac-01
 
As an implementor, I would pick a signed JWT over OAuth 1.0A. Just saying.

Given that, there is also a clear need for signing an HTTP(S) request as some sites are choosing OAuth 1.0A over OAuth 2.0 because they don't want to use bearer tokens. 

I never followed what MAC solved that OAuth 1.0A did not solve. Would someone elaborate? We do have an RFC for signing requests, there are lots of libraries already. Why the desire to reinvent OAuth 1.0A?

-- Dick

On Aug 10, 2012, at 8:00 AM, Rob Richards wrote:

> I think you nailed it which that statement. Up until now it as been back and forth about one or the other. Personally I prefer to used layered security and not relying on a single point of attack. It's unrealistic to say everyone is going to want/need/be able to use (take your pick) signed/encrypted JWT. MAC at least offers an alternative, less complicated solution.
> 
> Rob
> 
> On 8/10/12 10:41 AM, Richer, Justin P. wrote:
>> What about security in depth? Signing + TLS is more secure than either alone, isn't it?
>> 
>>  -- Justin
>> 
>> On Aug 10, 2012, at 3:01 AM, Hannes Tschofenig wrote:
>> 
>>> Hi Bill,
>>> 
>>> thanks for the feedback. Let's have a look at this use case:
>>> 
>>> You need to provide me a bit more information regarding your use case. Could you please explain
>>> 
>>> 1) Who is authenticated to whom?
>>> 2) What plaintext connection are you talking about?
>>> 3) What is the problem with encrypted connections? Is this again the "TLS has so bad performance" argument?
>>> 4) Since you are talking about cookies and making them more secure are you trying to come up with a general solution to better cookie security - a topic others are working on as well.
>>> 5) What is the threat you are concerned about?
>>> 
>>> Ciao
>>> Hannes
>>> 
>>> PS: I would heavily argue against standardize a security mechanism that offers weaker protection than bearer when the entire argument has always been "Bearer is so insecure and we need something stronger."
>>> 
>>> On Aug 9, 2012, at 9:43 PM, William Mills wrote:
>>> 
>>>> OK, I'll play and start documenting the use cases.
>>>> 
>>>> Use case #1: Secure authentication in plain text connections:
>>>> 
>>>> Some applications need a secure form authorization, but do not want or need the overhead of encrypted connections.  HTTP cookies and their ilk are replayable credentials and do not satisfy this need.   the MAC scheme using signed HTTP authorization credentials offer the capability to securely authorize a transaction, can offer integrity protection on all or part of an HTTP request, and can provide replay protection.
>>>> 
>>>> -bill
>>>> 
>>>> From: John Bradley <ve7jtb@ve7jtb.com>
>>>> To: William Mills <wmills_92105@yahoo.com>
>>>> Cc: Dick Hardt <dick.hardt@gmail.com>; "oauth@ietf.org" <oauth@ietf.org>
>>>> Sent: Thursday, August 9, 2012 11:26 AM
>>>> Subject: Re: [OAUTH-WG] mistake in draft-ietf-oauth-v2-http-mac-01
>>>> 
>>>> In Vancouver the question was asked about the future of the MAC spec due to it no linger having a editor.
>>>> 
>>>> The Chair and AD indicated a desire to have a document on the use-cases we are trying to address before deciding on progressing MAC or starting a new document.
>>>> 
>>>> Phil Hunt is going to put together a summery of the Vancouver discussion and we are going to work on the use-case/problem description document ASAP.
>>>> 
>>>> People are welcome to contribute to the use-case document.
>>>> 
>>>> Part of the problem with MAC has been that people could never agree on what it was protecting against.
>>>> 
>>>> I think there is general agreement that one or more proof mechanisms are required for access tokens.
>>>> Security for the token endpoint also cannot be ignored.
>>>> 
>>>> 
>>>> John B.
>>>> 
>>>> On 2012-08-09, at 1:53 PM, William Mills wrote:
>>>> 
>>>>> MAC fixes the signing problems encountered in OAuth 1.0a, yes there are libraries out there for OAuth 1.0a.  MAC fits in to the OAuth 2 auth model and will provide for a single codepath for sites that want to use both Bearer and MAC.
>>>>> 
>>>>> From: Dick Hardt <dick.hardt@gmail.com>
>>>>> To: William Mills <wmills_92105@yahoo.com>
>>>>> Cc: "oauth@ietf.org" <oauth@ietf.org>
>>>>> Sent: Thursday, August 9, 2012 10:27 AM
>>>>> Subject: Re: [OAUTH-WG] mistake in draft-ietf-oauth-v2-http-mac-01
>>>>> 
>>>>> 
>>>>> On Aug 9, 2012, at 9:52 AM, William Mills wrote:
>>>>> 
>>>>>> I find the idea of starting from scratch frustrating.  MAC solves a set of specific problems and has a well defined use case.  It's symmetric key based which doesn't work for some folks, and the question is do we try to develop something that supports both PK and SK, or finish the SK use case and then work on a PK based draft.
>>>>>> 
>>>>>> I think it's better to leave them separate and finish out MAC which is *VERY CLOSE* to being done.
>>>>> Who is interested in MAC? People can use OAuth 1.0 if they prefer that model.
>>>>> 
>>>>> For my projects, I prefer the flexibility of a signed or encrypted JWT if I need holder of key.
>>>>> 
>>>>> Just my $.02
>>>>> 
>>>>> -- Dick
>>>>> 
>>>>> 
>>>>> 
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>> 
>>>> 
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth