Re: [OAUTH-WG] Wrapping access token and codes

Sergey Beryozkin <sberyozkin@gmail.com> Fri, 07 November 2014 11:12 UTC

Return-Path: <sberyozkin@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8B7D71A1ACD for <oauth@ietfa.amsl.com>; Fri, 7 Nov 2014 03:12:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TSP8bleC3vi9 for <oauth@ietfa.amsl.com>; Fri, 7 Nov 2014 03:12:49 -0800 (PST)
Received: from mail-wg0-x22a.google.com (mail-wg0-x22a.google.com [IPv6:2a00:1450:400c:c00::22a]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5B9601A0278 for <oauth@ietf.org>; Fri, 7 Nov 2014 03:12:49 -0800 (PST)
Received: by mail-wg0-f42.google.com with SMTP id k14so3399866wgh.1 for <oauth@ietf.org>; Fri, 07 Nov 2014 03:12:46 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:user-agent:mime-version:to:subject:references :in-reply-to:content-type:content-transfer-encoding; bh=5g/3C/ccPvKgak/9yP0p55vh1+Atuv4bJ8wpmDO6CC0=; b=IT74Ux6YNxt1ITF39lDYs8fZqFFtgwliHvJcG8Mc0Dks7aNMLyinnMzh3DvGqpNENz pmAUfHJv3m8luXorjmd3L+nvBpZcpVNHdz7EeqqpdgTlDJfI2jadJ+l/XLArlD/6hoa6 gNPoWUUZT0bGUGKtdkXR9ODOYOMRYn/9m+R1pEx+yaSsVVMYTjzchSybQ6LE8AHcwRxK VRy0HSlpUv0JnYiL5e0gv1ZlD6JoA9VWzykbkvbAXKygW2WKsr1JKclYc3Bi7prVN3oJ xu4MNstWGolzSXSK17jV7RCjP+eQR1iB/YPdntYYG1dZNFZMtt+cP0lQ2JiYN8Vtd53G DoeA==
X-Received: by 10.180.88.102 with SMTP id bf6mr3872319wib.43.1415358766435; Fri, 07 Nov 2014 03:12:46 -0800 (PST)
Received: from [10.36.226.2] ([80.169.137.63]) by mx.google.com with ESMTPSA id bf6sm11389823wjb.13.2014.11.07.03.12.44 for <multiple recipients> (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 07 Nov 2014 03:12:45 -0800 (PST)
Message-ID: <545CA92C.3020900@gmail.com>
Date: Fri, 07 Nov 2014 11:12:44 +0000
From: Sergey Beryozkin <sberyozkin@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.2.0
MIME-Version: 1.0
To: Bill Mills <wmills_92105@yahoo.com>, "oauth@ietf.org" <oauth@ietf.org>
References: <545B6582.2030505@gmail.com> <486890415.168363.1415299911950.JavaMail.yahoo@jws10615.mail.bf1.yahoo.com>
In-Reply-To: <486890415.168363.1415299911950.JavaMail.yahoo@jws10615.mail.bf1.yahoo.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/oauth/iuWN2Bk0GE7pJ55v_vlXtorxRfc
Subject: Re: [OAUTH-WG] Wrapping access token and codes
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Nov 2014 11:12:51 -0000

Hi
On 06/11/14 18:51, Bill Mills wrote:
> So you're wanting end to end security not relying on TLS?
>
I was not really thinking about HTTPS vs HTTP in this case. I'm kind of 
in the process of appreciating what JWE/JWS can do and I can't help 
trying to consider it applying at the every possible opportunity :-)
>
> Have you seen the new draft on protecting codes from interception?
>   Currently called SPOP but needs a different name.
>
Do you mean this one:
http://tools.ietf.org/html/draft-ietf-oauth-spop-02
?

Yes I did - it's a different mechanism though, I guess it is of most 
help to the pubic clients, though we do not distinguish in our code, a 
confidential client can use the SPOP mechanism too.

I think the wrapping idea is probably what
http://tools.ietf.org/html/draft-bradley-oauth-pop-key-distribution-01#ref-10

talks about with respect to distributing a key using a JWE option.
That actually looks interesting; I haven't analyzed it much yet but 
apparently it is tied to the access token being necessarily in a JWT 
format, may be I did not get it right yet.

I guess it just can be interesting even in the TLS case. I believe 
people do not mind doing the extra protection even in the TLS cases.

Or take the implicit grant; if the wrapped access token reaches a client 
which is aware of WebCrypto API then it is probably making this grant 
much more secure...

Sergey

> On Thursday, November 6, 2014 4:12 AM, Sergey Beryozkin
> <sberyozkin@gmail.com> wrote:
>
>
> Hi
>
> Does it make sense to consider supporting an access token or code
> wrapping as part of the standard OAuth2 responses ?
>
> For example, if a client has registered its public key with AS then say
> the access token response would contain the regular
>
> {"access_token":"1234345"}
>
> except that "1234345" would actually be a JWE RSA-OAEP wrapped opaque
> token with a client's public key being used. Or a direct key encrypted
> token if the client and the server only share the client secret
> allocated to the client during the registration.
>
> The net result is that only the registered confidential client would be
> able to extract the actual opaque access token. The response would
> actually be
>
> {"access_token":"1234345", wrapped:true}.
>
> I definitely plan to use this approach as a simple mechanism for making
> a safer distribution of mac keys as part of access token responses; but
> IMHO it can be handy for minimizing the possibility of the
> access/refresh tokens or codes being intercepted...
>
> Sergey
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth
>
>