Re: [OAUTH-WG] WGLC on "JSON Web Token (JWT) Profile for OAuth 2.0 Access Tokens"

vittorio.bertocci@auth0.com Wed, 25 March 2020 16:11 UTC

Return-Path: <vittorio.bertocci@auth0.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1D0553A0A43 for <oauth@ietfa.amsl.com>; Wed, 25 Mar 2020 09:11:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.087
X-Spam-Level:
X-Spam-Status: No, score=-2.087 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, T_SPF_TEMPERROR=0.01, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=auth0.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RoNG5F5-jyzi for <oauth@ietfa.amsl.com>; Wed, 25 Mar 2020 09:11:16 -0700 (PDT)
Received: from mail-pj1-x102c.google.com (mail-pj1-x102c.google.com [IPv6:2607:f8b0:4864:20::102c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8B99D3A0A31 for <oauth@ietf.org>; Wed, 25 Mar 2020 09:11:16 -0700 (PDT)
Received: by mail-pj1-x102c.google.com with SMTP id np9so1224319pjb.4 for <oauth@ietf.org>; Wed, 25 Mar 2020 09:11:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=auth0.com; s=google; h=from:to:cc:references:in-reply-to:subject:date:message-id :mime-version:thread-index:content-language; bh=8Uam5NjmXN/ndlPn3W1t+9ntaYhAK0Mr9ZoDSIq9GPs=; b=i6FSRUAbrxjyzm07zoa6r0D0etVjAaHA6TiAHEK6fZx+j3e7WkV9Q5BLKyohMjd83j WCqW1MZ+ggY+dRNIZL72ZJ8iSUPy03LAZYxV18YciN5YMyK664jzGVXrs/+m0KXdZeRE lLaZg1qPIoAeEjFiQcv7oTA8mNekQNJJ2Bwat2BbHXlEmALqdFDDgo+DzbTMReu/Q83C XKlKnXLCe4nArfuGOmcP1iF8sn86UVHUiMFSM84VBdBMyXxVTO5Grr1y9aQgt27ufpMI HL+vjIhNS14oaTAg5hgxebiu8lJRGEpxvidhQZe+yVsZSJ8zjdVKBxYdHaYicJPBWYV1 wwog==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:references:in-reply-to:subject:date :message-id:mime-version:thread-index:content-language; bh=8Uam5NjmXN/ndlPn3W1t+9ntaYhAK0Mr9ZoDSIq9GPs=; b=N25aaxDTFAPQbCbWPoKJDUU4IAuXmmVU3Fhu0vhE8VBjuaW5smo9stO68ZX5y5AIMF CVa1EAP0hYbAfU8KObtYuH2ndhYH7Mt6fKqDv/qwofU1wC37GF69ehrkvt8K1BQZSV84 rcsITNgKIWgSVApmHRmABkNVHV5JBh1tqTvzaIlAKyNoyJIYdf8R6mfGxqWnCsQL0n4x hgkBPNkSRBMtE6g9pu3teXLwhio/QMg23v+KjHs/PiCPQLqCU4/jRI1TFKupteW20Mn6 cbLZinq8r3tnFKbwGb4SD8lW1iuI+sRQ4i0IQKa2NT2AN5gha2VfJc2AgpE7njZepN3P YyBQ==
X-Gm-Message-State: ANhLgQ2cD7bvqPuhT6i7GppQ+eFN1gA+Klo3X3wDFYQZdOk+ywK6fpxl 6rwe7mfXTjE+Cmir4Ko8hzZdVHIyM0O3Mg==
X-Google-Smtp-Source: ADFU+vs4+tyLLoEvWw+PBEPMIfJdeMFSQvPs3PDxT7NeHgDyldzoMtjVDnFAcSTPwZrEcceXO2UG6g==
X-Received: by 2002:a17:902:d68a:: with SMTP id v10mr4055219ply.130.1585152675688; Wed, 25 Mar 2020 09:11:15 -0700 (PDT)
Received: from vibrosurface7 (c-67-171-8-60.hsd1.wa.comcast.net. [67.171.8.60]) by smtp.gmail.com with ESMTPSA id c9sm4747055pjr.47.2020.03.25.09.11.15 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 25 Mar 2020 09:11:15 -0700 (PDT)
From: vittorio.bertocci@auth0.com
To: 'Brian Campbell' <bcampbell=40pingidentity.com@dmarc.ietf.org>
Cc: "'Richard Backman, Annabelle'" <richanna@amazon.com>, 'oauth' <oauth@ietf.org>
References: <AM0PR08MB37160B8A021052198699CD17FAF00@AM0PR08MB3716.eurprd08.prod.outlook.com> <01ec01d6017c$162eb2e0$428c18a0$@aueb.gr> <CAHdPCmMzRn8iYG025Vq0sQNzgZTOkQJuMJwttDgjMDLESpjptw@mail.gmail.com> <CAO_FVe5UXY4Jxd3LdG6zyXJ8B8nFKYevcHQTVJEAFSdW0ku9tg@mail.gmail.com> <52f18114-4f8e-da86-5735-4c4e8f8d2db5@aol.com> <BL0PR08MB5394CA3CB524E95EA87CD6B6AEF10@BL0PR08MB5394.namprd08.prod.outlook.com> <74da4cc3-359c-c08a-0ae5-54c8ca309f32@aol.com> <D080BE8B-BD0D-4F63-9F33-BA23C2FB42DD@amazon.com> <DM6PR08MB5402639817677AD59898CD65AECE0@DM6PR08MB5402.namprd08.prod.outlook.com> <CA+k3eCS29X28CBXGiUtDAV8nceTcpfJ4Jr_x=E3x8_9crOqsOQ@mail.gmail.com>
In-Reply-To: <CA+k3eCS29X28CBXGiUtDAV8nceTcpfJ4Jr_x=E3x8_9crOqsOQ@mail.gmail.com>
Date: Wed, 25 Mar 2020 09:11:15 -0700
Message-ID: <13b6801d602c0$02ebea00$08c3be00$@auth0.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_13B69_01D60285.568D8730"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQHpUDYTHxkJVh4ssWS8Yidi1aurtgOePuTPAe6K2+4Cw7Q/fALxAaHcAhX/JksB9vfjsQIGwKg5AUrAuMkCKW1rtaeMk1zw
Content-Language: en-us
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/WEzW3oHSKiH2seDwp5jMq7NJAk4>
Subject: Re: [OAUTH-WG] WGLC on "JSON Web Token (JWT) Profile for OAuth 2.0 Access Tokens"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Mar 2020 16:11:26 -0000

Thank you for the perspective- I guessed something similar (“there would be no way for the RS to know what key is used for what").

As stated below, the intent wasn’t to prevent substitution/confusion, but mostly to give ASes license to use different keys if they choose to (for the reasons listed below, or any other reason they might have) and a headsup to RSes so that they don’t make assumptions.

 

From: Brian Campbell <bcampbell=40pingidentity.com@dmarc.ietf.org> 
Sent: Wednesday, March 25, 2020 8:48 AM
To: Vittorio Bertocci <vittorio.bertocci@auth0.com>
Cc: Richard Backman, Annabelle <richanna@amazon.com>; oauth <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on "JSON Web Token (JWT) Profile for OAuth 2.0 Access Tokens"

 

I'm gonna go out on a limb and guess/suggest that implicit in Annabelle's comment was an assumption that signing ATs and ID Tokens with different keys would be done to prevent token substitution/confusion. And there's not really a practical way to achieve that with the mechanics of the jwks_uri. 

 

On Wed, Mar 25, 2020 at 3:53 AM Vittorio Bertocci <vittorio.bertocci=40auth0.com@dmarc.ietf.org <mailto:40auth0.com@dmarc.ietf.org> > wrote:

>§4 p3: The only practical way for the AS to sign ATs and ID Tokens with different keys is to publish the keys in two different JWK sets. This only way to do this today is by publishing separate OAuth 2.0 authorization server metadata and OIDC Discovery metadata files, where the JWK set in the former applies to access tokens and the JWK set in the latter applies to ID Tokens.

Hmm, I don’t follow. The OIDC jwks_uri can contain multiple keys, and they all can be used for signing. What prevents the AS to use one key from that list for IDtokens and another for ATs? Separate discovery docs shouldn’t be necessary. Sure, there would be no way for the RS to know what key is used for what- but similar mechanisms are already in place today for handling signing key rotation: e.g. the discovery doc lists the current key and the future key, but uses only the current- and the RS has no way of distinguishing between the two. The situation here can be analogous, any key in the discovery doc should be considered valid by the RS, and in fact there’s no requirement about selecting specific keys in the validation section. That doesn’t mean this is useless, an AS might elect to use different keys for its own purposes (eg separation of concerns for forensics, different strengths, different lifecycles, and so on).

 

 


CONFIDENTIALITY NOTICE: This email may contain confidential and privileged material for the sole use of the intended recipient(s). Any review, use, distribution or disclosure by others is strictly prohibited..  If you have received this communication in error, please notify the sender immediately by e-mail and delete the message and any file attachments from your computer. Thank you.