Re: [OAUTH-WG] OAuth Security Topics -- Recommend authorization code instead of implicit

Aaron Parecki <aaron@parecki.com> Mon, 19 November 2018 23:49 UTC

Return-Path: <aaron@parecki.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D46E3130DE4 for <oauth@ietfa.amsl.com>; Mon, 19 Nov 2018 15:49:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=parecki-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oCcdrvCrd6Aa for <oauth@ietfa.amsl.com>; Mon, 19 Nov 2018 15:49:30 -0800 (PST)
Received: from mail-io1-xd2e.google.com (mail-io1-xd2e.google.com [IPv6:2607:f8b0:4864:20::d2e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B4C74128C65 for <oauth@ietf.org>; Mon, 19 Nov 2018 15:49:30 -0800 (PST)
Received: by mail-io1-xd2e.google.com with SMTP id x6so45721ioa.9 for <oauth@ietf.org>; Mon, 19 Nov 2018 15:49:30 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=parecki-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=h9f+pbMQuBEbLBXyWa3qdFp/cbiTaolz1HOB4T7Q2Jg=; b=GIufu3UjM9Dl8xoZyA0L4v38JQYO3Oa3adZ3mFrqI2boEwMmndpf8bVFsWbRgo/jbY 4GSPa2ZXi5DgaRtX309uYpt4i1XTh6GoehtEekwjV1LjpKCwthGShFBuk6cpRmW1z65c etbYJtBS4FNK7PsF/746AjsDicjXP8CledjAFJxKLRD3KdY9uGWcAeGRnsBueGi5RYMj 434ghpHF0VujSwg7COu7A4MkueQSHCg/eS0Q5mVyxr6jDyfECroMgzPG/ybNmmUWSME8 GkdyZxZxOUNviqayPzbAFZ2Rqrb+N69c4HSq23tmTU51DMXs0FImwFBhXinOdR9iUwYE 2tow==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=h9f+pbMQuBEbLBXyWa3qdFp/cbiTaolz1HOB4T7Q2Jg=; b=PfnYzKKHNrkZAPKmniVl5eg+rAuyiWGoxN6+SnJ3Uz9Q7rH0wfAUFDMHgn53UmhKL7 nbBQsjivH27u7eksg08E9ljD2Q+Nzv5q29FNejTAyCxdOp2DK3CJlFUbffszvXUlBg3P fgIP1XOw8mpBICXQOfC4AYckvFiVQCCv2LJ/bTxrOMyGn6kvcchheoaMmh5jH/OURDyv NWzohfTuS7sdzLmTsqOOhNe2vc1eqzhuJwVidNYsveJ9Q0wCea6wH2Ewr9h9rroQ5Yix FgwRdvbW1nU9SUfOFijAlifNyp+x1qgm6ACUdKu2TJhp2Txfc9GASl/Usz2mJ1eDbdJK psdw==
X-Gm-Message-State: AA+aEWZ46nu/FWjVrvNQKcf0gbY8NarP9BZGdGaz4Svb8ENfGBwwzycx skXfeN1DIBrmMDCPYLCZKQY0RZdkBsM=
X-Google-Smtp-Source: AFSGD/XHOm7zjCemwceGVE+Cnj0Gj6CRcwUz2AfNpA6IqA3zEo/bm6Tn75h4iiZgttEFEj3LuJyoLg==
X-Received: by 2002:a6b:4f14:: with SMTP id d20-v6mr20394953iob.68.1542671369738; Mon, 19 Nov 2018 15:49:29 -0800 (PST)
Received: from mail-io1-f52.google.com (mail-io1-f52.google.com. [209.85.166.52]) by smtp.gmail.com with ESMTPSA id e64-v6sm10904098iof.12.2018.11.19.15.49.28 for <oauth@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 19 Nov 2018 15:49:29 -0800 (PST)
Received: by mail-io1-f52.google.com with SMTP id m19so66786ioh.3 for <oauth@ietf.org>; Mon, 19 Nov 2018 15:49:28 -0800 (PST)
X-Received: by 2002:a6b:8d8a:: with SMTP id p132mr20036543iod.290.1542671368409; Mon, 19 Nov 2018 15:49:28 -0800 (PST)
MIME-Version: 1.0
References: <VI1PR0801MB211266BA6F6E06FFB3081425FAD80@VI1PR0801MB2112.eurprd08.prod.outlook.com> <BL0PR00MB029244CACC634E2D2E923B77F5D80@BL0PR00MB0292.namprd00.prod.outlook.com>
In-Reply-To: <BL0PR00MB029244CACC634E2D2E923B77F5D80@BL0PR00MB0292.namprd00.prod.outlook.com>
From: Aaron Parecki <aaron@parecki.com>
Date: Mon, 19 Nov 2018 15:49:17 -0800
X-Gmail-Original-Message-ID: <CAGBSGjq+=F4N2zFvHXP78LQVTA1r3JcKFPw=cb5ycxRk5h5qmA@mail.gmail.com>
Message-ID: <CAGBSGjq+=F4N2zFvHXP78LQVTA1r3JcKFPw=cb5ycxRk5h5qmA@mail.gmail.com>
To: OAuth WG <oauth@ietf.org>
Cc: Hannes Tschofenig <Hannes.Tschofenig@arm.com>, Michael.Jones=40microsoft.com@dmarc.ietf.org
Content-Type: multipart/alternative; boundary="000000000000eb5bb3057b0d2aa4"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/QTFbp5nug_-GUsUcuS1f0-tjpO8>
Subject: Re: [OAUTH-WG] OAuth Security Topics -- Recommend authorization code instead of implicit
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Nov 2018 23:49:33 -0000

My understanding was that the scope of the discussion was limited to OAuth,
and does not cover OpenID Connect ID Tokens. With that in mind, I support
the recommendation to use the authorization code instead of the implicit
flow.

----
Aaron Parecki
aaronparecki.com
@aaronpk <http://twitter.com/aaronpk>



On Mon, Nov 19, 2018 at 2:13 PM Mike Jones <Michael.Jones=
40microsoft.com@dmarc.ietf.org> wrote:

> This description of the situation is an oversimplification.  OpenID
> Connect secures the implicit flow against token injection attacks by
> including the at_hash (access token hash) in the ID Token, enabling the
> client to validate that the access token was created by the issuer in the
> ID Token (which is also the OAuth Issuer, as described in RFC 8414
> <https://tools.ietf.org/html/rfc8414>).  (Note that this mitigation was
> described in draft-ietf-oauth-mix-up-mitigation
> <https://tools.ietf.org/html/draft-ietf-oauth-mix-up-mitigation-01>.)
>
>
>
> Given the prevalence of this known-good solution for securing the implicit
> flow, I would request that the draft be updated to describe this
> mitigation.  At the same time, I’m fine with the draft recommending the
> code flow over the implicit flow when this mitigation is not used.
>
>
>
>                                                                 Thank you,
>
>                                                                 -- Mike
>
>
>
> *From:* OAuth <oauth-bounces@ietf.org> *On Behalf Of * Hannes Tschofenig
> *Sent:* Monday, November 19, 2018 2:34 AM
> *To:* oauth <oauth@ietf.org>
> *Subject:* [OAUTH-WG] OAuth Security Topics -- Recommend authorization
> code instead of implicit
>
>
>
> Hi all,
>
>
>
> The authors of the OAuth Security Topics draft came to the conclusion that
> it is not possible to adequately secure the implicit flow against token
> injection since potential solutions like token binding or JARM are in an
> early stage of adoption. For this reason, and since CORS allows
> browser-based apps to send requests to the token endpoint, Torsten
> suggested to use the authorization code instead of the implicit grant in
> call cases in his presentation (see
> https://datatracker.ietf.org/meeting/103/materials/slides-103-oauth-sessb-draft-ietf-oauth-security-topics-01
> ).
>
>
>
> A hum in the room at IETF#103 concluded strong support for his
> recommendations. We would like to confirm the discussion on the list.
>
>
>
> Please provide a response by December 3rd.
>
>
>
> Ciao
>
> Hannes & Rifaat
>
>
>
> IMPORTANT NOTICE: The contents of this email and any attachments are
> confidential and may also be privileged. If you are not the intended
> recipient, please notify the sender immediately and do not disclose the
> contents to any other person, use it for any purpose, or store or copy the
> information in any medium. Thank you.
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>