[OAUTH-WG] Re: Call for adoption - PIKA

Richard Barnes <rlb@ipv.sx> Mon, 10 June 2024 19:04 UTC

Return-Path: <rlb@ipv.sx>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8C04CC15199C for <oauth@ietfa.amsl.com>; Mon, 10 Jun 2024 12:04:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.903
X-Spam-Level:
X-Spam-Status: No, score=-1.903 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ipv-sx.20230601.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OdXMcROSnf9L for <oauth@ietfa.amsl.com>; Mon, 10 Jun 2024 12:04:18 -0700 (PDT)
Received: from mail-il1-x136.google.com (mail-il1-x136.google.com [IPv6:2607:f8b0:4864:20::136]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9F0BCC151993 for <oauth@ietf.org>; Mon, 10 Jun 2024 12:04:18 -0700 (PDT)
Received: by mail-il1-x136.google.com with SMTP id e9e14a558f8ab-3737b47c0acso20007185ab.3 for <oauth@ietf.org>; Mon, 10 Jun 2024 12:04:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipv-sx.20230601.gappssmtp.com; s=20230601; t=1718046257; x=1718651057; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=7HKZjI2ANoN3Y8cAf0FPD2nuiPaYumzI0p1KIE7qRG8=; b=AymI1rqO8HeXAT6dYDpJWqvd6at9O2aUZNxeT9/7GZQjP3pH0uZOMeLafaYHkAmIcg edFyngC1xMkUpqiKGk7K13Vnd+wJRR1it0cIvWuBzVOeFkh8Czr9Cf2kbJrRIwN2I/1D dBzF2ZBzfaFoya+OF3iTeSF49qkHbrHHs/ZRrKMcx00/SUY6whU+QRc4EWi49+TcMOAK k7P5pZE410FWC5D/JKhvCMzJoVkjqHrbp4i3ht2BBg7fTGLDCeinw5XmvPSf9A8SlO28 bEIFQNEYAIrd68H/jsaGriCe7Frsr3mkPsjNrIGAfL91awUkOlNzp6ZvUmFEszwXLlGs 5beA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1718046257; x=1718651057; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=7HKZjI2ANoN3Y8cAf0FPD2nuiPaYumzI0p1KIE7qRG8=; b=mcCAgLrIclAw9pxPdeMHA6dYX6BfkoIWqOtd9HWUT/fo6DKxMn9hOITbOsi786H6rv C4MZL4iJtpfOeEPNtlY+f/STuCS0aUg0n1BHzExxqzR+HcTgNQMR4SyWujHmnmsSdEaV Irp5QYwWFJzwK2WWRxN/3ir27AXSOFPPfzxjF8vWGcOmF0zykIESibymRGMRMd59XQuG lAGuM7OEP1yIGP6P+wEu/yjB58hto9K/6LOQcTBisOQNlMhTvFX2Q66JbIuIEpH6imD0 LgUihyVmiQZB+9730810InXOhPiTvkukLTuYmYEHtFK2t4It2s35U/2wGVoHjB+hRp9P l70Q==
X-Forwarded-Encrypted: i=1; AJvYcCX2x+2YEDxAhJ+pTYTUh04VjedDpGqi11SQ/Zon0ekawUkqmaX15PKKpca1te2YlqkvBMBeXQRHrIEkW824Rg==
X-Gm-Message-State: AOJu0YwRK2ur/ftEKRkpIFpVkCKRilX8aEoXmvt+YMFHvQZFWMzJuQb+ srgAofMs70fIH8kROG7/ShTogpCQYNFXqW0+5eJrA2GrdeEj/yMe1a5yOi1Dit4aLnHvcv/BUGr BYLMIAVmILdq5Vn86x7/2O/AcKR2IipuaRNltnjJSqZDeH/TJVHlw3Q==
X-Google-Smtp-Source: AGHT+IGIev7CjI8jKKg6z/KNTfDZY0ZhZ69bwFf5a1uDFD+9f2YKd4d+NLJL4wvq23hwogJOqueSIK28jOlMIiZa+4c=
X-Received: by 2002:a05:6e02:1448:b0:374:ad1d:941a with SMTP id e9e14a558f8ab-37580312f34mr143978655ab.10.1718046257629; Mon, 10 Jun 2024 12:04:17 -0700 (PDT)
MIME-Version: 1.0
References: <CADNypP9GmF4vp1uzLXK0YYZAHUDjK7RHbhEb4MCXkB7N3Oq4+w@mail.gmail.com> <SJ0PR02MB743941C99DEAA144AC6298D5B7C62@SJ0PR02MB7439.namprd02.prod.outlook.com>
In-Reply-To: <SJ0PR02MB743941C99DEAA144AC6298D5B7C62@SJ0PR02MB7439.namprd02.prod.outlook.com>
From: Richard Barnes <rlb@ipv.sx>
Date: Mon, 10 Jun 2024 15:04:06 -0400
Message-ID: <CAL02cgRm8P+LcpXZC+yCj6cmpTauPwave=kne9QRxaT0eZyksQ@mail.gmail.com>
To: Michael Jones <michael_b_jones@hotmail.com>
Content-Type: multipart/alternative; boundary="000000000000e4e7e0061a8dd087"
Message-ID-Hash: T2ASR3O6P3JXDR7MOWGYPA4DNDMG6UI6
X-Message-ID-Hash: T2ASR3O6P3JXDR7MOWGYPA4DNDMG6UI6
X-MailFrom: rlb@ipv.sx
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-oauth.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: oauth <oauth@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [OAUTH-WG] Re: Call for adoption - PIKA
List-Id: OAUTH WG <oauth.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/aO4PFMUW3wlFTmdG9tATZw1d0EE>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Owner: <mailto:oauth-owner@ietf.org>
List-Post: <mailto:oauth@ietf.org>
List-Subscribe: <mailto:oauth-join@ietf.org>
List-Unsubscribe: <mailto:oauth-leave@ietf.org>

Hi Mike,

The intent here is to follow exactly the same security model as current
HTTPS-based OP key discovery mechanisms, e.g., OpenID Connect Discovery.
With those mechanisms:

1. The only way the issuer is authenticated is via a certificate presented
in HTTPS.
2. The only aspect of the URL that is authenticated is the domain name.  In
multi-tenant environments, whoever owns the domain name can speak for any
tenants.

Changing the first property would make this document non-interoperable,
since it is no longer clear how the relying party is supposed to verify the
PIKA signature.  Changing the second property would require inventing some
new PKI-ish thing that can authenticate more of a URL.

Do you have some specific additional mechanism that you think needs to be
accommodated here?  If not, I would propose we follow the YAGNI principle,
be specific, and if we need to extend later, we can do a follow-on spec.
Otherwise it's just abstraction for abstraction's sake.

Cheers,
--Richard

On Mon, Jun 10, 2024 at 12:14 PM Michael Jones <michael_b_jones@hotmail.com>
wrote:

> While I’m generally supportive of the goals of this draft, I have issues
> with the mechanisms proposed.  Therefore, I believe that more working group
> discussion is needed before adoption.
>
>
>
> If I were to do something along these lines, I would not use “x5c”.  Other
> than for TLS certificates, the OAuth and JOSE specs generally steer clear
> of dependence upon X.509 certificates.  Especially for a spec focused on
> JWK Sets, it’s odd to require an X.509 certificate to secure them.
> Instead, I’d do so by validating the signature made by the issuer.
>
>
>
> Also, the spec says:
>
>    *  The JOSE Header of the PIKA MUST contain an x5c field.  The
>
>       contents of this field MUST represent a certificate chain that
>
>       authenticates the domain name in the iss field.  The domain name
>
>       MUST appear as a dNSName entry in the subjectAltName extension of
>
>       the end-entity certificate.
>
>
>
> This talks about the domain name of the issuer, but not the path within
> the issuer.  In multi-tenant systems, issuers typically include path
> components.  When the issuer is https://example.com/tenant/123, what
> would the DNSName entry be?  The spec doesn’t say.
>
>
>
> Conclusion: Not ready for adoption
>
>
>
>                                                                 -- Mike
>
>
>
> *From:* Rifaat Shekh-Yusef <rifaat.s.ietf@gmail.com>
> *Sent:* Monday, June 10, 2024 4:47 AM
> *To:* oauth <oauth@ietf.org>
> *Subject:* [OAUTH-WG] Call for adoption - PIKA
>
>
>
> All,
>
> This is an official call for adoption for the *Proof of Issuer Key
> Authority (PIKA)* draft:
>
> https://datatracker.ietf.org/doc/draft-barnes-oauth-pika/
>
>
> Please, reply *on the mailing list* and let us know if you are in favor
> or against adopting this draft as WG document, by *June 24th*.
>
> Regards,
>  Rifaat & Hannes
>
>
> _______________________________________________
> OAuth mailing list -- oauth@ietf.org
> To unsubscribe send an email to oauth-leave@ietf.org
>