Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011
Phillip Hunt <phil.hunt@oracle.com> Tue, 03 January 2012 23:46 UTC
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3073A11E80AB; Tue, 3 Jan 2012 15:46:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.203
X-Spam-Level:
X-Spam-Status: No, score=-5.203 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aXHyolA8Velq; Tue, 3 Jan 2012 15:46:30 -0800 (PST)
Received: from acsinet15.oracle.com (acsinet15.oracle.com [141.146.126.227]) by ietfa.amsl.com (Postfix) with ESMTP id 2CA9D11E808D; Tue, 3 Jan 2012 15:46:30 -0800 (PST)
Received: from ucsinet22.oracle.com (ucsinet22.oracle.com [156.151.31.94]) by acsinet15.oracle.com (Switch-3.4.4/Switch-3.4.4) with ESMTP id q03NkNJB003719 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 3 Jan 2012 23:46:24 GMT
Received: from acsmt357.oracle.com (acsmt357.oracle.com [141.146.40.157]) by ucsinet22.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id q03NkMjO024136 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 3 Jan 2012 23:46:23 GMT
Received: from abhmt106.oracle.com (abhmt106.oracle.com [141.146.116.58]) by acsmt357.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id q03NkMQY011840; Tue, 3 Jan 2012 17:46:22 -0600
Received: from [192.168.1.67] (/24.85.235.164) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Tue, 03 Jan 2012 15:46:22 -0800
References: <CALaySJKhYQQdmjvWBLS3mwzzrDt35jfDn2xZCuDOk=hpwEUiKQ@mail.gmail.com> <CAC4RtVDyiuqCGO25nZQEVxi0uchTi2gu_peh=+FwmWwZsQ=LEQ@mail.gmail.com> <CAC4RtVCvnz7n9Ei08h7QRruesJ=GeOMOOvBkNAVmcc8_gzg7QQ@mail.gmail.com> <8AB6F5CC-E9A2-4A07-9AA0-83FB7C67A221@oracle.com> <4EEA3951.5010904@mtcc.com> <OF6C9EBE7C.1B053FE3-ON80257968.003C02DF-80257968.003CAA12@ie.ibm.com> <4EEB5BDD.7080401@mtcc.com> <4F038CB9.1040403@mtcc.com>
In-Reply-To: <4F038CB9.1040403@mtcc.com>
Mime-Version: 1.0 (1.0)
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="utf-8"
Message-Id: <F674B8D6-54D6-4B39-A494-9D7EB6E058D6@oracle.com>
X-Mailer: iPhone Mail (9A405)
From: Phillip Hunt <phil.hunt@oracle.com>
Date: Tue, 03 Jan 2012 15:46:18 -0800
To: Michael Thomas <mike@mtcc.com>
X-Source-IP: ucsinet22.oracle.com [156.151.31.94]
X-CT-RefId: str=0001.0A020209.4F039351.004B,ss=1,re=0.000,fgs=0
Cc: Barry Leiba <barryleiba@computer.org>, oauth WG <oauth@ietf.org>, "oauth-bounces@ietf.org" <oauth-bounces@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Jan 2012 23:46:31 -0000
-1. I think you should be suggesting alternative text at this stage. We all have same responsibilities here. Phil On 2012-01-03, at 15:18, Michael Thomas <mike@mtcc.com> wrote: > Barry -- It's now been two weeks and I haven't heard anything to > the objections I raised. It is not my responsibility to come up with > mitigation that works, it's the working group's. If there is no reasonable > mitigation it should just say that. > > Mike > > On 12/16/2011 06:55 AM, Michael Thomas wrote: >> On 12/16/2011 03:02 AM, Mark Mcgloin wrote: >>> Michael, >>> >>> I will review the comments from Phil where he suggests some changes in >>> section 4.1.4 of the threat model >>> >>> I am unclear exactly what you are proposing. If you want to propose a >>> clearly worded revamp of that section in the next couple of days, I am >>> willing to review and accept legitimate changes. Clearly worded means >>> concise, technically accurate and devoid of alarmist phrases and words used >>> out of context, such as existential. Can I suggest you review with a >>> colleague before posting here. >> >> Barry -- I have gone through this section and made comments >> and was blown off seemingly without reading them at all, and >> now I'm being told to come up with text for which I can be blown >> off again: "Can I suggest you review..." >> >> The fact of the matter is that my comments say that the >> threats are understated and mitigations that are proposed do not >> work. It's not my job alone to fix this. It's the working group's. >> In fact if I were to propose text, it would be along the lines of >> "can't be mitigated" because I do not know how to fix them. If >> nobody else can come up with a better mitigation, then that >> *is* what should be there, not some hand waving nonsense that >> doesn't work. >> >> Mike, "instruct users..." feh >> >>> Regards >>> Mark >>> >>> oauth-bounces@ietf.org wrote on 15/12/2011 18:15:45: >>> >>>> From: >>>> >>>> Michael Thomas<mike@mtcc.com> >>>> >>>> To: >>>> >>>> Phil Hunt<phil.hunt@oracle.com> >>>> >>>> Cc: >>>> >>>> Barry Leiba<barryleiba@computer.org>, oauth WG<oauth@ietf.org> >>>> >>>> Date: >>>> >>>> 15/12/2011 18:16 >>>> >>>> Subject: >>>> >>>> Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec >>> 2011 >>>> Sent by: >>>> >>>> oauth-bounces@ietf.org >>>> >>>> On 12/15/2011 09:54 AM, Phil Hunt wrote: >>>>> Note: one change recommended below... >>>>> >>>>> With regards to 4.1.4… >>>>> 4.1.4. Threat: End-user credentials phished using compromised or >>>>> embedded browser >>>>> >>>>> A malicious application could attempt to phish end-user passwords >>> by >>>>> misusing an embedded browser in the end-user authorization process, >>>>> or by presenting its own user-interface instead of allowing trusted >>>>> system browser to render the authorization user interface. By >>> doing >>>>> so, the usual visual trust mechanisms may be bypassed (e.g. TLS >>>>> confirmation, web site mechanisms). By using an embedded or >>> internal >>>>> client application user interface, the client application has >>> access >>>>> to additional information it should not have access to (e.g. uid/ >>>>> password). >>>>> >>>>> >>>>> [mat] I think it's also worth mentioning either here, or in another >>>>> threat that there is a further social engineering misuse/attack where >>> an >>>>> app offers/demands to keep your credentials so that you don't have to >>> go >>>>> through the authorization rigmarole. Users are already conditioned to >>>>> give their credentials up to do things -- just this morning I >>>> noticed facebook >>>>> asking for my email password which they promise with sugar on top to >>> not >>>>> store. It might be worth mentioning that things like CAPTCHA could be >>>>> deployed to defend against that sort of attack/misuse. >>>>> >>>>> [Phil] I don't think we need to really add much here. We could >>>> write whole essays on this topic and likely will. >>>>> I think the point is simply to educate the client developer that >>>> there is no need for a client application to ever have access to a >>>> raw uid/password (or any other user credential). >>>>> [/Phi] >>>>> >>>> Remember: I came here not understanding whether this threat was real or >>> not. >>>> A threat document that can't be bothered to elaborate on one of the >>> biggest >>>> existential threats to the protocol is worthless. The way it is worded >>>> now does >>>> not make it crystal clear that, yes, this means UIWebView's in iPhone >>>> apps, etc too. >>>> It should because it needs to scream: THIS THREAT APPLIES TO YOU, AUTH >>>> SERVER. >>>> >>>> >>>>> [snip] >>>>> >>>>> Countermeasures: >>>>> >>>>> o Client developers and end-user can be educated to trust an >>>>> external System-Browser only. >>>>> >>>>> >>>>> [mat] I assume that this is in here just for the amusement factor >>> because >>>>> it is not a credible countermeasure. >>>>> >>>>> [Phil] I agree, Firefox recently demonstrated how poorly users >>>> recognize the security signals in the browser by dropping the "lock" >>>> icon without announcement. When I found out, I had already been >>>> using it for some time and hadn't noticed. This counter measure >>>> should be changed to: >>>>> o The OAuth flow is designed so that client applications never >>>> need to know user passwords. Where possible Client applications >>>> SHOULD avoid directly asking for user credentials during an >>>> authorization flow. >>>>> [/Phil] >>>>> >>>> The basic problem here is that the client app is not trusted. So if it's >>>> a bad >>>> actor this admonition will be ignored. If it's a good actor, there >>>> wasn't a threat >>>> in first place. So the mitigation completely misses the mark. >>>> >>>>> o Client applications could be validated prior publication in a >>>>> application market. >>>>> >>>>> [mat] How would this be done in practice? >>>>> [Phil] I think this needs to change to: >>>>> >>>>> o Client applications could be validated for acceptable practices >>>> by the Resource Site provider prior to issuing production Client >>> Credentials. >>>> When, exactly, can we expect to see this in the field? Neither Twitter >>>> or Facebook >>>> do this. And even if they were so inclined, the draft provides exactly >>>> zero guidance >>>> as to what exactly that "validated" might mean in practice. The way I >>>> read this is: >>>> "we don't know how to mitigate this". >>>>> [/Phil] >>>>> o Client developers should not collect authentication information >>>>> directly from users and should instead use redirects to and back >>>>> from a trusted external system-browser. >>>>> >>>>> >>>>> [mat] How would the resource/authentication server enforce such a >>> thing? >>>>> [Phil] This is a best practice for the client developer. [Phil] >>>>> >>>>> >>>> I don't even know what that means in the context of embedded apps. >>>> Has anybody even tried this? At the very least, an example flow might >>>> be useful for the uninitiated client developer. >>>> >>>> Mike >>>> _______________________________________________ >>>> OAuth mailing list >>>> OAuth@ietf.org >>>> https://www.ietf.org/mailman/listinfo/oauth >>> > >> >> _______________________________________________ >> OAuth mailing list >> OAuth@ietf.org >> https://www.ietf.org/mailman/listinfo/oauth > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth
- [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmode… Barry Leiba
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Barry Leiba
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Barry Leiba
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Mark Mcgloin
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… André DeMarre
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Phil Hunt
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Mark Mcgloin
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Phillip Hunt
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Mark Mcgloin
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Peter Saint-Andre
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Mark Mcgloin
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Barry Leiba
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Torsten Lodderstedt
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… William Mills
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… William Mills
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Eran Hammer-Lahav
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… William Mills
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Mark Mcgloin
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Mark Mcgloin
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Justin Richer
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… William Mills
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… William Mills
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… George Fletcher
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Mark Mcgloin
- Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threat… Michael Thomas