Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011

Mark Mcgloin <mark.mcgloin@ie.ibm.com> Fri, 16 December 2011 11:02 UTC

Return-Path: <mark.mcgloin@ie.ibm.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1FC3821F8B30 for <oauth@ietfa.amsl.com>; Fri, 16 Dec 2011 03:02:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.573
X-Spam-Level:
X-Spam-Status: No, score=-2.573 tagged_above=-999 required=5 tests=[AWL=-0.015, BAYES_00=-2.599, MIME_BASE64_BLANKS=0.041]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pp2SNa00tbL6 for <oauth@ietfa.amsl.com>; Fri, 16 Dec 2011 03:02:45 -0800 (PST)
Received: from e06smtp12.uk.ibm.com (e06smtp12.uk.ibm.com [195.75.94.108]) by ietfa.amsl.com (Postfix) with ESMTP id C8BD121F8B2F for <oauth@ietf.org>; Fri, 16 Dec 2011 03:02:44 -0800 (PST)
Received: from /spool/local by e06smtp12.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for <oauth@ietf.org> from <mark.mcgloin@ie.ibm.com>; Fri, 16 Dec 2011 11:02:40 -0000
Received: from d06nrmr1407.portsmouth.uk.ibm.com ([9.149.38.185]) by e06smtp12.uk.ibm.com ([192.168.101.142]) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Fri, 16 Dec 2011 11:02:38 -0000
Received: from d06av09.portsmouth.uk.ibm.com (d06av09.portsmouth.uk.ibm.com [9.149.37.250]) by d06nrmr1407.portsmouth.uk.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id pBGB2btT1966240; Fri, 16 Dec 2011 11:02:37 GMT
Received: from d06av09.portsmouth.uk.ibm.com (loopback [127.0.0.1]) by d06av09.portsmouth.uk.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id pBGB2Z7V000678; Fri, 16 Dec 2011 04:02:36 -0700
Received: from d06ml091.portsmouth.uk.ibm.com (d06ml091.portsmouth.uk.ibm.com [9.149.104.170]) by d06av09.portsmouth.uk.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id pBGB2ZK9000654; Fri, 16 Dec 2011 04:02:35 -0700
In-Reply-To: <4EEA3951.5010904@mtcc.com>
References: <CALaySJKhYQQdmjvWBLS3mwzzrDt35jfDn2xZCuDOk=hpwEUiKQ@mail.gmail.com> <CAC4RtVDyiuqCGO25nZQEVxi0uchTi2gu_peh=+FwmWwZsQ=LEQ@mail.gmail.com> <CAC4RtVCvnz7n9Ei08h7QRruesJ=GeOMOOvBkNAVmcc8_gzg7QQ@mail.gmail.com> <8AB6F5CC-E9A2-4A07-9AA0-83FB7C67A221@oracle.com> <4EEA3951.5010904@mtcc.com>
X-KeepSent: 6C9EBE7C:1B053FE3-80257968:003C02DF; type=4; name=$KeepSent
To: Michael Thomas <mike@mtcc.com>
X-Mailer: Lotus Notes Release 8.5.1FP5 SHF29 November 12, 2010
Message-ID: <OF6C9EBE7C.1B053FE3-ON80257968.003C02DF-80257968.003CAA12@ie.ibm.com>
From: Mark Mcgloin <mark.mcgloin@ie.ibm.com>
Date: Fri, 16 Dec 2011 11:02:31 +0000
X-MIMETrack: Serialize by Router on D06ML091/06/M/IBM(Release 8.5.2FP1 ZX852FP1HF12|September 28, 2011) at 16/12/2011 11:02:30
MIME-Version: 1.0
Content-type: text/plain; charset="UTF-8"
Content-transfer-encoding: base64
x-cbid: 11121611-8372-0000-0000-0000011F3A6C
Cc: Barry Leiba <barryleiba@computer.org>, oauth WG <oauth@ietf.org>, oauth-bounces@ietf.org
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 16 Dec 2011 11:02:46 -0000

Michael,

I will review the comments from Phil where he suggests some changes in
section 4.1.4 of the threat model

I am unclear exactly what you are proposing. If you want to propose a
clearly worded revamp of that section in the next couple of days, I am
willing to review and accept legitimate changes. Clearly worded means
concise, technically accurate and devoid of alarmist phrases and words used
out of context, such as existential. Can I suggest you review with a
colleague before posting here.

Regards
Mark

oauth-bounces@ietf.org wrote on 15/12/2011 18:15:45:

> From:
>
> Michael Thomas <mike@mtcc.com>
>
> To:
>
> Phil Hunt <phil.hunt@oracle.com>
>
> Cc:
>
> Barry Leiba <barryleiba@computer.org>, oauth WG <oauth@ietf.org>
>
> Date:
>
> 15/12/2011 18:16
>
> Subject:
>
> Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec
2011
>
> Sent by:
>
> oauth-bounces@ietf.org
>
> On 12/15/2011 09:54 AM, Phil Hunt wrote:
> > Note: one change recommended below...
> >
> > With regards to 4.1.4…
> > 4.1.4.  Threat: End-user credentials phished using compromised or
> >          embedded browser
> >
> >     A malicious application could attempt to phish end-user passwords
by
> >     misusing an embedded browser in the end-user authorization process,
> >     or by presenting its own user-interface instead of allowing trusted
> >     system browser to render the authorization user interface.  By
doing
> >     so, the usual visual trust mechanisms may be bypassed (e.g.  TLS
> >     confirmation, web site mechanisms).  By using an embedded or
internal
> >     client application user interface, the client application has
access
> >     to additional information it should not have access to (e.g. uid/
> >     password).
> >
> >
> > [mat] I think it's also worth mentioning either here, or in another
> > threat that there is a further social engineering misuse/attack where
an
> > app offers/demands to keep your credentials so that you don't have to
go
> > through the authorization rigmarole. Users are already conditioned to
> > give their credentials up to do things -- just this morning I
> noticed facebook
> > asking for my email password which they promise with sugar on top to
not
> > store. It might be worth mentioning that things like CAPTCHA could be
> > deployed to defend against that sort of attack/misuse.
> >
> > [Phil] I don't think we need to really add much here. We could
> write whole essays on this topic and likely will.
> >
> > I think the point is simply to educate the client developer that
> there is no need for a client application to ever have access to a
> raw uid/password (or any other user credential).
> >
> > [/Phi]
> >
>
> Remember: I came here not understanding whether this threat was real or
not.
> A threat document that can't be bothered to elaborate on one of the
biggest
> existential  threats to the protocol is worthless. The way it is worded
> now does
> not make it crystal clear that, yes, this means UIWebView's in iPhone
> apps, etc too.
> It should because it needs to scream: THIS THREAT APPLIES TO YOU, AUTH
> SERVER.
>
>
> > [snip]
> >
> >     Countermeasures:
> >
> >     o  Client developers and end-user can be educated to trust an
> >        external System-Browser only.
> >
> >
> > [mat] I assume that this is in here just for the amusement factor
because
> > it is not a credible countermeasure.
> >
> > [Phil] I agree, Firefox recently demonstrated how poorly users
> recognize the security signals in the browser by dropping the "lock"
> icon without announcement. When I found out, I had already been
> using it for some time and hadn't noticed.  This counter measure
> should be changed to:
> >
> > o The OAuth flow is designed so that client applications never
> need to know user passwords. Where possible Client applications
> SHOULD avoid directly asking for user credentials during an
> authorization flow.
> > [/Phil]
> >
>
> The basic problem here is that the client app is not trusted. So if it's
> a bad
> actor this admonition will be ignored. If it's a good actor, there
> wasn't a threat
> in first place. So the mitigation completely misses the mark.
>
> >     o  Client applications could be validated prior publication in a
> >        application market.
> >
> > [mat] How would this be done in practice?
> > [Phil] I think this needs to change to:
> >
> > o Client applications could be validated for acceptable practices
> by the Resource Site provider prior to issuing production Client
Credentials.
> >
>
> When, exactly, can we expect to see this in the field? Neither Twitter
> or Facebook
> do this. And even if they were so inclined, the draft provides exactly
> zero guidance
> as to what exactly that "validated" might mean in practice. The way I
> read this is:
> "we don't know how to mitigate this".
> > [/Phil]
> >     o  Client developers should not collect authentication information
> >        directly from users and should instead use redirects to and back
> >        from a trusted external system-browser.
> >
> >
> > [mat] How would the resource/authentication server enforce such a
thing?
> >
> > [Phil] This is a best practice for the client developer. [Phil]
> >
> >
>
> I don't even know what that means in the context of embedded apps.
> Has anybody even tried this? At the very least, an example flow might
> be useful for the uninitiated client developer.
>
> Mike
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>