Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-signed-http-request-03.txt

Nat Sakimura <n-sakimura@nri.co.jp> Tue, 07 March 2017 12:25 UTC

Return-Path: <sakimura@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2030012940A for <oauth@ietfa.amsl.com>; Tue, 7 Mar 2017 04:25:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.888
X-Spam-Level:
X-Spam-Status: No, score=-1.888 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FORGED_FROMDOMAIN=0.229, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RCVD_IN_SORBS_SPAM=0.5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0wSpRgt8KG2M for <oauth@ietfa.amsl.com>; Tue, 7 Mar 2017 04:25:52 -0800 (PST)
Received: from mail-qk0-f174.google.com (mail-qk0-f174.google.com [209.85.220.174]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1786C128AC9 for <oauth@ietf.org>; Tue, 7 Mar 2017 04:25:52 -0800 (PST)
Received: by mail-qk0-f174.google.com with SMTP id v125so224791qkh.2 for <oauth@ietf.org>; Tue, 07 Mar 2017 04:25:52 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=rm4222rfQmWOo3HCsTeBDq8+i+KjwCJ7qSX+5wuYRd8=; b=D0akG7hmv74E5Z5JwiXNLumm0jkns107i68e+D0VUYwI6UDQagBOka5LhF+DFNtjP1 Zrv/Bq2sXt7YQ/VuLAsKogvk75xRjjEGuGBN0eaiVC/XzfpnTzitevex5OFgOotGp4uq P3OZWJ9oWWcONOfXjFHGmOiYrQ99u8/qqmmJ15x8ju3dnrzD4JC7t4XcC/4RClhnZwQE YwdYBHDZ2dPsFoPBMYl46hcckivVS3soA3D/YoKq2qDFxKQqAKjUitL/bUFGiA2RbJxh VlFk1+XC6SD2mGRw53msSZgGJHU+NuVNAQv8g5NM6P2nP4NTUr92PjmXH58hDR7RRLtH TFBw==
X-Gm-Message-State: AMke39kAmJ/8S8Co556BcNL8U3bzVDUX6CNaU1vsQPymQWjRNClGlsB5DeeahIJIhopXAm4qnytg5cqg9wX3PA==
X-Received: by 10.237.44.229 with SMTP id g92mr20532866qtd.204.1488889551006; Tue, 07 Mar 2017 04:25:51 -0800 (PST)
MIME-Version: 1.0
References: <147067404527.23058.17317554291756036969.idtracker@ietfa.amsl.com> <05e001d29712$424a5960$c6df0c20$@nri.co.jp> <34babded-e458-e4e2-4582-26063e304276@free.fr>
In-Reply-To: <34babded-e458-e4e2-4582-26063e304276@free.fr>
From: Nat Sakimura <n-sakimura@nri.co.jp>
Date: Tue, 07 Mar 2017 12:25:40 +0000
Message-ID: <CABzCy2C00tJitbd+zhRS8+xMx1yFCc-apBHM5PfG+GOM6WemRQ@mail.gmail.com>
To: Denis <denis.ietf@free.fr>, oauth@ietf.org
Content-Type: multipart/alternative; boundary="94eb2c1249e6cc379f054a231cbe"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/V0nPnAulhf83Vz1kG6HO9UAH9Iw>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-signed-http-request-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Mar 2017 12:25:54 -0000

Thanks Denis,

Yes. As currently specified, ts is an integer. My previous mail requested
it to be string instead so that I can used it as a nonce generated in the
style of H(timestamp|client_id|key) etc. I agree this is the place to
discuss replay protection etc. (Not in JAR, which is just a container
format.)

And, I have not yet posted oauth-jpop as an I-D :-) It is still in my repo
only and it has got more things to be done before it can be posted.
Hopefully, I can add more text and post it by Friday this week to make the
deadline for the next IETF.

Best,

Nat



On Tue, Mar 7, 2017 at 7:59 PM Denis <denis.ietf@free.fr> wrote:

> Hi Nat,
>
> I see that you are now back to the list.
>
> Please take note that "draft-ietf-oauth-signed-http-request-03.txt" has
> expired on February 9, 2017 .
>
> You said: "perhaps change ts to string to accommodate nonce like string"
>
> In this draft, ts is defined as:
>
>    ts RECOMMENDED.  The timestamp.  This integer provides replay
>       protection of the signed JSON object.  Its value MUST be a number
>       containing an integer value representing number of whole integer
>       seconds from midnight, January 1, 1970 GMT.
>
> Section 7 is silent about replay protection and this is the single
> instance where "ts" is mentioned in the document.
>
> Hence it is rather hazy to understand how to deal with this value which is
> misnamed since it should rather be called:
> "iat" which means "Issued At".
>
> A "nonce" is a concept which does not exist in OAuth 2.0 documents (but
> which does exist in Open ID Connect documents).
>
> The core of the discussion is to explain how to achieve *replay
> protection of the signed JSON object*.
>
> I sent an email on Fri, 17 Feb 2017 21:51:18 +0100 with the following
> title :
> Re: [OAUTH-WG] Last Call: <draft-ietf-oauth-jwsreq-11.txt>
> (The OAuth 2.0 Authorization Framework: JWT Secured Authorization Request
> (JAR)) to Proposed Standard
> and *I got no response*.
>
> Please take a look at* ITEM 1* in the email from Friday, 17 February 2017
> which addresses replay protection of the signed JSON object
> and proposes a solution for OAuth 2.0 (which could be used as well by Open
> ID Connect).
>
> I take the opportunity of this email to comment on the individual draft
> you posted at:  http://bit.ly/oauth-jpop
> and which is called: draft-sakimura-oauth-jpop-00
>
> The Abstract states:
>
> Only the party *in possession of* a corresponding cryptographic key with
> the Jpop token can use it to get access
> to the associated resources unlike in the case of the bearer token
> described in [RFC6750]
> <https://xml2rfc.tools.ietf.org/cgi-bin/xml2rfc.cgi?Submit=Submit&format=ascii&mode=html&type=ascii&url=https://bitbucket.org/Nat/oauth-rjwtprof/raw/tip/draft-sakimura-oauth-jpop.xml#RFC6750>
> where any party in
> possession of the access token can access the resource.
>
> The text should rather be changed into:
>
> Only the party *able to use* a corresponding cryptographic key with the
> Jpop token can use it to get access
> to the associated resources
>
> You know that in case of a collusion between clients, this method will be
> ineffective.
>
> Simply stating in the Security Considerations section "The client's secret
> key must be kept securely. " is insufficient.
>
> Also the text is speaking of a nonce which is not a value that has been
> registered by IANA.
>
>
> Denis
>
> Hi Justin, John, and Hannes
>
> Is there an appetite to change the draft in such a way as:
>
> - do not wrap access token itself. It could include at_hash though.
>   Rationale: Pop access token can be pretty large and I do not want to
>   double base64url encode.
> - perhaps change ts to string to accommodate nonce like string.
>
> Essentially, what I want to do is not the http signing but just the pop
> based client authentication, which is very simple.
>
> While I was writing it up, it occurred that if the above modification were
> done, your draft will be a superset of what I wanted to do.
>
> My write up is here: http://bit.ly/oauth-jpop
>
> Financial API uses cases needs something like that.
> (Another possibility is a sender confirmation.)
>
> Best,
>
> Nat Sakimura
>
> --
> PLEASE READ :This e-mail is confidential and intended for the
> named recipient only. If you are not an intended recipient,
> please notify the sender  and delete this e-mail.
>
>
>
> -----Original Message-----
> From: OAuth [mailto:oauth-bounces@ietf.org <oauth-bounces@ietf.org>] On Behalf Ofinternet-drafts@ietf.org
> Sent: Tuesday, August 9, 2016 1:34 AM
> To: i-d-announce@ietf.org
> Cc: oauth@ietf.org
> Subject: [OAUTH-WG] I-D Action:
>
> draft-ietf-oauth-signed-http-request-03.txt
>
>
>
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> This draft is a work item of the Web Authorization Protocol of the IETF.
>
>         Title           : A Method for Signing HTTP Requests for OAuth
>         Authors         : Justin Richer
>                           John Bradley
>                           Hannes Tschofenig
> 	Filename        : draft-ietf-oauth-signed-http-request-03.txt
> 	Pages           : 13
> 	Date            : 2016-08-08
>
> Abstract:
>    This document a method for offering data origin authentication and
>    integrity protection of HTTP requests.  To convey the relevant data
>    items in the request a JSON-based encapsulation is used and the JSON
>    Web Signature (JWS) technique is re-used.  JWS offers integrity
>    protection using symmetric as well as asymmetric cryptography.
>
>
> The IETF datatracker status page for this draft is:https://datatracker.ietf.org/doc/draft-ietf-oauth-signed-http-request/
>
> There's also a htmlized version available at:https://tools.ietf.org/html/draft-ietf-oauth-signed-http-request-03
>
> A diff from the previous version is available at:https://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-signed-http-request-03
>
>
> Please note that it may take a couple of minutes from the time of
>
> submission
>
> until the htmlized version and diff are available at tools.ietf.org.
>
> Internet-Drafts are also available by anonymous FTP at:ftp://ftp.ietf.org/internet-drafts/
>
> _______________________________________________
> OAuth mailing listOAuth@ietf.orghttps://www.ietf.org/mailman/listinfo/oauth
>
>
> _______________________________________________
> OAuth mailing listOAuth@ietf.orghttps://www.ietf.org/mailman/listinfo/oauth
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
-- 

Nat Sakimura

Chairman of the Board, OpenID Foundation