Re: [OAUTH-WG] Secdir review of draft-ietf-oauth-saml2-bearer-21

Brian Campbell <bcampbell@pingidentity.com> Wed, 15 October 2014 13:44 UTC

Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4EDF11A6FD4 for <oauth@ietfa.amsl.com>; Wed, 15 Oct 2014 06:44:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.679
X-Spam-Level:
X-Spam-Status: No, score=-1.679 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oMLnoExpODUO for <oauth@ietfa.amsl.com>; Wed, 15 Oct 2014 06:44:18 -0700 (PDT)
Received: from na3sys009aog102.obsmtp.com (na3sys009aog102.obsmtp.com [74.125.149.69]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DDB341A6FCF for <oauth@ietf.org>; Wed, 15 Oct 2014 06:44:16 -0700 (PDT)
Received: from mail-ig0-f177.google.com ([209.85.213.177]) (using TLSv1) by na3sys009aob102.postini.com ([74.125.148.12]) with SMTP ID DSNKVD56MBMPvXBrhDYJec09UWWBL8OVYtC0@postini.com; Wed, 15 Oct 2014 06:44:16 PDT
Received: by mail-ig0-f177.google.com with SMTP id a13so1412331igq.4 for <oauth@ietf.org>; Wed, 15 Oct 2014 06:44:16 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:content-type; bh=N04x3PadiC2NHSw8yOo2Qy9bYpUAVTQBjXXnwPKFzMU=; b=PhijaMTzYWloBc31uZTY8oP+itu9mkXdQDHudAqjrMK61+D2HuoMMbDZPGS3pOzSO0 qMRW0kriqNRbKD3g1wlp69nslQh6/AjNkAFMhUX2ul8DI625Q38SJ3Ew8zEGAkhLweSB vBdz+yDE8/voHn/9Rky5O1uGBgZVmJuQjLsGLEzPQvJ8Uvp2oDvj33k95nMimpkSwdTT 9GO5LK2Sd6W832DhvawHCyUVaEd1u43TrtinB2X5T+hMiCejYJVO2CwEq95TmL4vZeZA XQBZ8vsNWmT3aX7gYzc6dSatGzdVz5/gvXGBeSxo3MuVZ7Rt8hcEPb6c7zgMirriJq5P 11vQ==
X-Gm-Message-State: ALoCoQkHH2P4y2BmvH5nAGhHE+Ihk5r46koGJovLpB2Ks3hKQTAngGl6KMZ/Sv7wpuiIjDzgSnQ+3dxFyhaviyh8zhPugTqxbPShNYZBmMFE3UgPckTFt2d34ORJEWn8rT9CWKlrTf7X
X-Received: by 10.43.76.199 with SMTP id zf7mr2648575icb.57.1413380656147; Wed, 15 Oct 2014 06:44:16 -0700 (PDT)
X-Received: by 10.43.76.199 with SMTP id zf7mr2648551icb.57.1413380655903; Wed, 15 Oct 2014 06:44:15 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.64.12.137 with HTTP; Wed, 15 Oct 2014 06:43:45 -0700 (PDT)
In-Reply-To: <CAAX2Qa1WBo=RMXDqbqHJx8pRZqcUYJJDVCJN2-ZxCcKmf_h-uw@mail.gmail.com>
References: <AEBDE45E-963A-47B5-997F-416562FE1B32@inria.fr> <CAAX2Qa1WBo=RMXDqbqHJx8pRZqcUYJJDVCJN2-ZxCcKmf_h-uw@mail.gmail.com>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Wed, 15 Oct 2014 07:43:45 -0600
Message-ID: <CA+k3eCRnCd=_Gd3wzt+kN5fSNQn=D_SDBdACWALvhqTS39aSnw@mail.gmail.com>
To: The IESG <iesg@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>, draft-ietf-oauth-saml2-bearer@tools.ietf.org, Vincent Roca <vincent.roca@inria.fr>, oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="001a11c3b252ed93960505765399"
Archived-At: http://mailarchive.ietf.org/arch/msg/oauth/STs8Ob3aq6yHYxmZ-jiSmw2ChOw
Subject: Re: [OAUTH-WG] Secdir review of draft-ietf-oauth-saml2-bearer-21
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Oct 2014 13:44:21 -0000

Thanks for your review and feedback, Vincent.  I'm adding the working group
to the thread so they’re aware of the comments. Replies are inline below...


From: Vincent Roca <vincent.roca@inria.fr>
> Date: Tue, Oct 14, 2014 at 9:10 AM
> Subject: Secdir review of draft-ietf-oauth-saml2-bearer-21
> To: IESG <iesg@ietf.org>, secdir@ietf.org,
> draft-ietf-oauth-saml2-bearer@tools.ietf.org
> Cc: Vincent Roca <vincent.roca@inria.fr>
>
>
> Hello,
>
> I have reviewed this document as part of the security directorate's
> ongoing effort to review all IETF documents being processed by the
> IESG.  These comments were written primarily for the benefit of the
> security area directors. Document editors and WG chairs should treat
> these comments just like any other last call comments.
>
> IMHO, the document is *almost ready*. I just have minor comments:
>
> SAML and OAUTH are already covered by extensive, detailed security and
> privacy
> considerations sections.
>
> I agree with the authors there is no need to duplicate text in the present
> document.
> However I have two comments:
>
> 1- it is mentioned that replay attack protection is not mandatory, but
> there is no
> justification. On the opposite, protection against replay attacks is
> mentioned at
> several places in [OASIS.saml-sec-consider-2.0-os] (e.g., 6.1.2, 6.4.5,
> 6.5.2, 6.5.6,
> 7.1.1.4). I don’t know to what extent the situation differs, but I’m
> curious to know
> why it is so.
>


In the SAML 2.0 Profile for OAuth 2.0 Client Authentication and
Authorization Grants the client is not passive (like a web browser in the
case of many SAML profiles/bindings) but rather an active client which
either creates the assertion itself or obtains it from a trusted 3rd party
system like a security token service. In that sense, it's most analogous to
6.1.2 of OASIS.saml-sec-consider-2.0-os which discusses replay in the
context of the SOAP binding and says there "is little vulnerability to
replay attacks" and that "the best way to prevent replay attacks is to
prevent the message capture in the first place" going on to say that TLS
does this for point to point communication.

The general Assertion Framework for OAuth 2.0 Client Authentication and
Authorization Grants, which the SAML document is a concrete profile of,
discusses replay some in section 8.2 (
https://tools.ietf.org/html/draft-ietf-oauth-assertions-17#section-8.2 )
and says similar things.

In my own personal view, I think tracking assertion ids and rejecting those
that have been seen before does more harm to interoperability and
deployment at scale than good in mitigating a threat that's already
reasonably mitigated by other means. Others have wanted to have the option
in the documents, however, which is (as I recall) where the optionality of
it comes from.




>
> 2- [OASIS.saml-sec-consider-2.0-os] reference does not include any URL.
> It’s probably
> worth to add it.
> http://docs.oasis-open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf
>
>

Perhaps you can help me with the tool usage here?

In the source XML I've got <?rfc include='
http://xml.resource.org/public/rfc/bibxml2/reference.OASIS.saml-sec-consider-2.0-os.xml'
?> in the references and
http://xml.resource.org/public/rfc/bibxml2/reference.OASIS.saml-sec-consider-2.0-os.xml
has that URL via <format type="PDF" target="
http://docs.oasis-open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf"/>
but the URL doesn't show up in the rendered document.

The situation is the same for all the SAML references, FWIW.