Re: [OAUTH-WG] Confusion on Implicit Grant flow

Adam Lewis <Adam.Lewis@motorolasolutions.com> Tue, 10 February 2015 16:13 UTC

Return-Path: <Adam.Lewis@motorolasolutions.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 69F2D1A1A38 for <oauth@ietfa.amsl.com>; Tue, 10 Feb 2015 08:13:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.566
X-Spam-Level:
X-Spam-Status: No, score=-1.566 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, IP_NOT_FRIENDLY=0.334, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FT3XRZwfANDH for <oauth@ietfa.amsl.com>; Tue, 10 Feb 2015 08:13:13 -0800 (PST)
Received: from mx0a-0019e102.pphosted.com (mx0a-0019e102.pphosted.com [67.231.149.242]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3A7FF1A1A33 for <oauth@ietf.org>; Tue, 10 Feb 2015 08:12:48 -0800 (PST)
Received: from pps.filterd (m0074410.ppops.net [127.0.0.1]) by mx0a-0019e102.pphosted.com (8.14.7/8.14.7) with SMTP id t1AGA9Em026065; Tue, 10 Feb 2015 10:12:48 -0600
Received: from na01-bn1-obe.outbound.protection.outlook.com (mail-bn1blp0181.outbound.protection.outlook.com [207.46.163.181]) by mx0a-0019e102.pphosted.com with ESMTP id 1sfj8p0a1n-1 (version=TLSv1/SSLv3 cipher=AES256-SHA256 bits=256 verify=NOT); Tue, 10 Feb 2015 10:12:47 -0600
Received: from BLUPR04MB691.namprd04.prod.outlook.com (10.141.205.149) by BLUPR04MB690.namprd04.prod.outlook.com (10.141.205.146) with Microsoft SMTP Server (TLS) id 15.1.81.19; Tue, 10 Feb 2015 16:12:44 +0000
Received: from BLUPR04MB691.namprd04.prod.outlook.com ([10.141.205.149]) by BLUPR04MB691.namprd04.prod.outlook.com ([10.141.205.149]) with mapi id 15.01.0081.018; Tue, 10 Feb 2015 16:12:44 +0000
From: Adam Lewis <Adam.Lewis@motorolasolutions.com>
To: John Bradley <ve7jtb@ve7jtb.com>, Prateek Mishra <prateek.mishra@oracle.com>
Thread-Topic: [OAUTH-WG] Confusion on Implicit Grant flow
Thread-Index: AdBCU7lczcAZFshKSMOM30KEynNz8AAAdauAAJOOJYAAAFyKAAABMZ+AAABwzQAAAKRcgAAAWbWAACbHsZA=
Date: Tue, 10 Feb 2015 16:12:44 +0000
Message-ID: <BLUPR04MB6914D0257B18CDBE1A9909395240@BLUPR04MB691.namprd04.prod.outlook.com>
References: <BLUPR04MB6918C7701D0DB90B0FA6B0D95380@BLUPR04MB691.namprd04.prod.outlook.com> <CANSMLKFMUQsBfOo=i0ki8PF_8PjRf7W3t=PiPo7qnftN9gUyWg@mail.gmail.com> <54D91317.9010101@redhat.com> <1E340378-2D34-4AC8-906C-415EF025068E@ve7jtb.com> <54D91D87.8040303@redhat.com> <FD337176-C292-4688-9CFA-A3C7DF40FCA2@ve7jtb.com> <54D924CB.6070504@oracle.com> <3B0DDA4D-F540-4E23-9842-275532F7405F@ve7jtb.com>
In-Reply-To: <3B0DDA4D-F540-4E23-9842-275532F7405F@ve7jtb.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [150.130.34.131]
authentication-results: ve7jtb.com; dkim=none (message not signed) header.d=none;
x-microsoft-antispam: BCL:0;PCL:0;RULEID:;SRVR:BLUPR04MB690;
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:;SRVR:BLUPR04MB690;
x-forefront-prvs: 048396AFA0
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(377454003)(479174004)(24454002)(76576001)(2656002)(587094005)(62966003)(87936001)(18717965001)(66066001)(77156002)(16601075003)(74316001)(93886004)(50986999)(40100003)(54356999)(33656002)(76176999)(77096005)(92566002)(102836002)(15975445007)(19300405004)(2950100001)(2900100001)(19617315012)(99286002)(86362001)(46102003)(19609705001)(19580395003)(19580405001)(16236675004)(19625215002); DIR:OUT; SFP:1102; SCL:1; SRVR:BLUPR04MB690; H:BLUPR04MB691.namprd04.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en;
Content-Type: multipart/alternative; boundary="_000_BLUPR04MB6914D0257B18CDBE1A9909395240BLUPR04MB691namprd_"
MIME-Version: 1.0
X-OriginatorOrg: motorolasolutions.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Feb 2015 16:12:44.5604 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 93f5baf9-414a-4f1b-88bc-33f3013923d7
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLUPR04MB690
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 suspectscore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=7.0.1-1402240000 definitions=main-1502100154
Archived-At: <http://mailarchive.ietf.org/arch/msg/oauth/bBGRuaGCqYqa05mvkYRSThV8jPM>
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Confusion on Implicit Grant flow
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Feb 2015 16:13:20 -0000

Hi John,

What do you mean by the app that is "already loaded and cached in the browser?"  Where did this app come from initially?  Is this what comes from the web-hosted client resource in step D/E of section 4.2?  So the first time D/E *will* flow over the wire, and in all subsequent requests it will be cached?

And with respect to the web hosted client resource, is this a resource deployed by the same domain as the RS to facilitate the deployment of user-agent-based apps to access the APIs exposed by that RS?


adam

From: OAuth [mailto:oauth-bounces@ietf.org] On Behalf Of John Bradley
Sent: Monday, February 09, 2015 3:31 PM
To: Prateek Mishra
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Confusion on Implicit Grant flow

Typically the implicit callback JS is part of the application that is already loaded and cached in the browser.

The implicit flow doesn't depend on on the fragment not being re-appended to the resource location URI in the 302.  It would admittedly be more secure if that didn't happen.
Re-appending the fragment is the correct browser behaviour according to the W3C.

I still think you are farther ahead with that than leaking the code in the referrer.

Implicit if done correctly has the token in one leg.  code on the other hand has the code in 4 legs and the token in one.

It is having the JS make the exchange of code for the AT without a secret that is the problem in my opinion.

If the client is a server that is doing the code -> token exchange then the answer is different, but the question was for a JS only client.

John B.


On Feb 9, 2015, at 6:21 PM, Prateek Mishra <prateek.mishra@oracle.com<mailto:prateek.mishra@oracle.com>> wrote:

The implicit flow depends upon a subtle and little known aspect of browser behavior - that the URI fragment component isn't propagated across redirects.

I havent checked this recently - but I am aware that several folks have found that some browser versions dont comply with this requirement.
http://weblog.bulknews.net/post/85008516879/covert-redirect-vulnerability-with-oauth-2

The additional round-trip issue is also unclear. The implicit flow requires an additional redirect (round-trip) to retrieve JS which retrieves the access token from the fragment URI.

How is that different from a HTTPs callback to exchange the access code for the access token?

- prateek



You are passing code in a query parameter, and without a secret that is more likely to be leaked than sending token in the fragment directly from the authorization endpoint to the browser JS in a fragment.



You have several extra round trips for no security benefit.   In your case the code in the query parameter goes from the browser to the redirect endpoint then must be sent back to the browser, and then to the token endpoint.



So yes using code for that is less secure.



Both rely solely on the registered redirect URI for security, but implicit has fewer hopes and is more friendly to JS.



John B.

On Feb 9, 2015, at 5:50 PM, Bill Burke <bburke@redhat.com><mailto:bburke@redhat.com> wrote:



If you don't have a client secret, why is Javascript-based auth code grant flow more risky?  We also require SSL and valid redirect URI patterns to be registered for the application.  The code can only ever be sent to specific URLs and can only be used once.  CORS origin validation is also an extra step we do to ensure a rogue javascript app isn't making any code-to-token requests.



I'm just trying to figure out if we missed anything...



On 2/9/2015 3:16 PM, John Bradley wrote:

If you don't have a client secret, or are storing the the client secret in the Javascrypt, then you are probably more at risk using code than implicit.



Implicit is risky because running a OAuth client in the browser is risky.  Using code in that case makes it no better, and arguably worse.



Perhaps I don't understand the environment.



John B.



On Feb 9, 2015, at 5:05 PM, Bill Burke <bburke@redhat.com><mailto:bburke@redhat.com> wrote:



Due to the security risks of implicit Grant flow, our Javascript adapter only supports  Auth Code Grant flow.  Our IDP has an extra step of allowing you to specify a valid CORS origin for an application.  Anybody see any problems with this kind of approach?  Implicit Grant Flow just seemed really risky to even support as a protocol.





On 2/6/2015 4:40 PM, Josh Mandel wrote:

Hi Adam,



I'm not 100% sure what you're envisioning as an alternative to the

implicit flow, but if I'm reading between the lines of your question

correctly, there are two key parts to the answer, because the implicit

flow is designed to accomplish two key goals (vs. the authorization code

grant):



1. Shave off one round-trip HTTP request (the step of exchanging a code

for a token)

2. Avoid unnecessarily leading the token to the client's back-end web server



Goal 1 is straightforward. For goal 2: OAuth2's implicit flow takes

advantage of the fact that a URL's "#hash" is not sent to the server

with an HTTP request. By embedding the token in a "#hash", it won't

inadvertently appear in server logs, for example. So with the implicit

flow, I can (for example) statically host a browser-based app at Amazon

S3 without having access tokens leak to Amazon. (Of course, if your

threat model includes a compromised server, then bets are off on this

point.)



Hope this helps,



  -Josh







On Fri, Feb 6, 2015 at 1:27 PM, Adam Lewis

<Adam.Lewis@motorolasolutions.com<mailto:Adam.Lewis@motorolasolutions.com>

<mailto:Adam.Lewis@motorolasolutions.com><mailto:Adam.Lewis@motorolasolutions.com>> wrote:



   Hi,____



   __ __



   Having spent most of my time with native apps and web apps, I now am

   looking at use cases where I need to implement a user-agent-based

   app.  The Implicit flow seems to be optimized for this.____



   __ __



   To test my understanding, this flow is for a JavaScript client (or

   similar) executing within a web browser.____



   __ __



   At step (a) the client directs the UA to the authorization server,

   but the authorization server redirects the UA to a web-hosted client

   resource.  Why?  It says so that the web-hosted client resources can

   push javascript (or other) back into the UA so it can extract the

   access token in the fragment; but some sort of javascript is already

   running in the browser, since it initiated the authorization request

   in the first place.  So why this extra step?  Why not treat the

   javascript client running in the UA like a native app and handle the

   redirect uri?____



   __ __



   I know this was well thought out when the spec was written, so

   trying to figure out what I'm missing?____



   __ __



   __ __



   __ __



   Tx!

   adam____





   _______________________________________________

   OAuth mailing list

   OAuth@ietf.org<mailto:OAuth@ietf.org> <mailto:OAuth@ietf.org><mailto:OAuth@ietf.org>

   https://www.ietf.org/mailman/listinfo/oauth









_______________________________________________

OAuth mailing list

OAuth@ietf.org<mailto:OAuth@ietf.org>

https://www.ietf.org/mailman/listinfo/oauth



--

Bill Burke

JBoss, a division of Red Hat

http://bill.burkecentral.com<http://bill.burkecentral.com/>



_______________________________________________

OAuth mailing list

OAuth@ietf.org<mailto:OAuth@ietf.org>

https://www.ietf.org/mailman/listinfo/oauth

--

Bill Burke

JBoss, a division of Red Hat

http://bill.burkecentral.com<http://bill.burkecentral.com/>




_______________________________________________

OAuth mailing list

OAuth@ietf.org<mailto:OAuth@ietf.org>

https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth