[OAUTH-WG] Mix-Up and CnP/ Code injection

Torsten Lodderstedt <torsten@lodderstedt.net> Sat, 23 April 2016 11:47 UTC

Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9AD9912D51C for <oauth@ietfa.amsl.com>; Sat, 23 Apr 2016 04:47:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.622
X-Spam-Level:
X-Spam-Status: No, score=-2.622 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z5lbksiRnFuG for <oauth@ietfa.amsl.com>; Sat, 23 Apr 2016 04:47:07 -0700 (PDT)
Received: from smtprelay02.ispgateway.de (smtprelay02.ispgateway.de [80.67.31.25]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AAA7A12B014 for <oauth@ietf.org>; Sat, 23 Apr 2016 04:47:07 -0700 (PDT)
Received: from [80.140.201.4] (helo=[192.168.71.143]) by smtprelay02.ispgateway.de with esmtpsa (TLSv1.2:DHE-RSA-AES128-SHA:128) (Exim 4.84) (envelope-from <torsten@lodderstedt.net>) id 1atw1g-0003J1-UL for oauth@ietf.org; Sat, 23 Apr 2016 13:47:05 +0200
To: oauth@ietf.org
From: Torsten Lodderstedt <torsten@lodderstedt.net>
Message-ID: <571B60BA.8090301@lodderstedt.net>
Date: Sat, 23 Apr 2016 13:47:06 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQ=
Archived-At: <http://mailarchive.ietf.org/arch/msg/oauth/Z5XgUq3f0s2f9xx5w9tl9MkVOFE>
Subject: [OAUTH-WG] Mix-Up and CnP/ Code injection
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 23 Apr 2016 11:47:09 -0000

Hi all,

discussion about Mix-Up and CnP seems to have stopped after the session 
in BA - at least in the OAuth WG. There is a discussion about 
mitigations in OpenId Connect going on at the OpenId Connect mailing list.

I'm very much interested to find a solution within the OAuth realm as 
I'm not interested to either implement two solutions (for OpenId Connect 
and OAuth) or adopt a OpenId-specific solution to OAuth (use id! tokens 
in the front channel). I therefore would like to see progress and 
propose to continue the discussion regarding mitigations for both threats.

https://tools.ietf.org/html/draft-ietf-oauth-mix-up-mitigation-00 
proposes reasonable mitigations for both attacks. There are alternatives 
as well:
- mix up:
-- AS specific redirect uris
-- Meta data/turi 
(https://tools.ietf.org/html/draft-sakimura-oauth-meta-07#section-5)
- CnP:
-- use of the nonce parameter (as a distinct mitigation beside state for 
counter XSRF)

Anyone having an opinion?

best regards,
Torsten.