Re: [OAUTH-WG] Benjamin Kaduk's No Objection on draft-ietf-oauth-jwsreq-32: (with COMMENT)

Mike Jones <Michael.Jones@microsoft.com> Thu, 08 April 2021 04:45 UTC

Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 42CEB3A3923; Wed, 7 Apr 2021 21:45:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.101
X-Spam-Level:
X-Spam-Status: No, score=-2.101 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pFWkfDBbjP05; Wed, 7 Apr 2021 21:45:22 -0700 (PDT)
Received: from NAM06-BL2-obe.outbound.protection.outlook.com (mail-eopbgr650121.outbound.protection.outlook.com [40.107.65.121]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E4F3C3A38E8; Wed, 7 Apr 2021 21:45:21 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=QOCpXIssr6yr0PBlPoYJPFql3+osl4h6uVyIuPFcodglnPqubTbn4uXfEiGIdGPKtob/Ca/eqJL0JIr7AX1Nu8p4Bnh8Vc8kwefjKHc8CWf/kEv5Wi+7VCTQN7hBBP358KwB3BrBoN5xS4oP6s/AKT96Z+BSRnLQOsj8dPhcjrRjFgNA6FjWD/h83dj1OUq5u7NtkLkktpiJyCdEycF578JBKE3uBEHTedXesDp8r68jYxHzy3C2YjcXcq+tSidNzyzfRUvXjfn9diKMxJP0CQSbVtrvMgERG39sS/GsA7Rs8d7nnWw9lBHBcFLpviNV9Rd7rBb9tAPjdzrgq55PsA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=/biIXCMthW3FrJsz45WgnJqgwmqTX6X3p5W6uuNrVcM=; b=hVJceHlrlKYAGe9bi4OI6Gd8XxCj8gdveLlG9548u2TlhheCs8OJy8xY+yiH9psfN6rU7BFJufDgTF4Jw8lWf1/JyvSYjOJ5ViQT5nPZmb4Ol0+9L7p7BPdS1wpoVjOqDt5hmoDvEM45hj0ETdxLSs8O8d+cXrRCZ9WBddbf7A5NwK4PzEEq8Z/uKaJ+//u6PGE+28t/t+ZZjjnwhMce4aoWUPQbqzCjL27bRY1mSP4hMi/3GEp2oLtge4woqlmZhHUqZuqNjzyUqG51P9/j3NJ7sov/h/zpQyS5cEefVX5yKUzFGOkB/g4gwv7bUH9kDFTx3VUk95acaY6kNumqxw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=/biIXCMthW3FrJsz45WgnJqgwmqTX6X3p5W6uuNrVcM=; b=I34zao+UrsDecAz7rujW+B+jYDN4TUNIZqQWISy+R5oxvm5gYgT1gKlPoZAoI+1Z22GtCwxXBBf6/mxVFzkNYOW/oI4XKASAdhc/coIJ4m98ycjgPplqMTMWcvPx7nXRbweJ/pUBkUVdOe8Dllm+d97W3wukSK/LH2AvPK+g34w=
Received: from DM5PR00MB0421.namprd00.prod.outlook.com (2603:10b6:4:a0::33) by DM6PR00MB0751.namprd00.prod.outlook.com (2603:10b6:5:1be::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4056.0; Thu, 8 Apr 2021 04:45:15 +0000
Received: from DM5PR00MB0421.namprd00.prod.outlook.com ([fe80::e553:4e87:8c7e:63d5]) by DM5PR00MB0421.namprd00.prod.outlook.com ([fe80::e553:4e87:8c7e:63d5%7]) with mapi id 15.20.4056.000; Thu, 8 Apr 2021 04:45:15 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: "kaduk@mit.edu" <kaduk@mit.edu>, "iesg@ietf.org" <iesg@ietf.org>
CC: "oauth@ietf.org" <oauth@ietf.org>, "oauth-chairs@ietf.org" <oauth-chairs@ietf.org>, "draft-ietf-oauth-jwsreq@ietf.org" <draft-ietf-oauth-jwsreq@ietf.org>
Thread-Topic: Benjamin Kaduk's No Objection on draft-ietf-oauth-jwsreq-32: (with COMMENT)
Thread-Index: AdcsMfO/NEOxoPc0Q7+XxyHrniar1Q==
Date: Thu, 08 Apr 2021 04:45:15 +0000
Message-ID: <DM5PR00MB04216A0EE09F7F86805B1365F5749@DM5PR00MB0421.namprd00.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=true; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2021-04-08T03:26:52Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=Internal; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=6c7997a7-2d38-4338-9da6-27affa75a2f8; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0
authentication-results: mit.edu; dkim=none (message not signed) header.d=none;mit.edu; dmarc=none action=none header.from=microsoft.com;
x-originating-ip: [172.56.42.184]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: de30a62f-2a08-4b18-4cbf-08d8fa491a57
x-ms-traffictypediagnostic: DM6PR00MB0751:
x-microsoft-antispam-prvs: <DM6PR00MB075186686827EB8AAA8ACAA5F5749@DM6PR00MB0751.namprd00.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM5PR00MB0421.namprd00.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(8936002)(2906002)(86362001)(26005)(5660300002)(55016002)(71200400001)(186003)(52536014)(478600001)(83380400001)(54906003)(8990500004)(110136005)(33656002)(966005)(7696005)(10290500003)(4326008)(66476007)(9686003)(66946007)(6506007)(316002)(82950400001)(38100700001)(8676002)(76116006)(66556008)(82960400001)(64756008)(66446008)(53546011); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM5PR00MB0421.namprd00.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: de30a62f-2a08-4b18-4cbf-08d8fa491a57
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Apr 2021 04:45:15.3431 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: OCVUabnqBc7l0iqrffY+VjEx8L+f6jdd1QxEKvLdlx5UJfhbhlUs88+kga5sDivTFJjCoKZEou+Us7EW5ZEcVA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR00MB0751
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/mgAEWkiLWpKj1_zkkc49aPMB8iU>
Subject: Re: [OAUTH-WG] Benjamin Kaduk's No Objection on draft-ietf-oauth-jwsreq-32: (with COMMENT)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Apr 2021 04:45:30 -0000

Thanks for your review, Ben.  We've published https://tools.ietf.org/html/draft-ietf-oauth-jwsreq-33 to address your and other IESG comments.

Responses are inline below, prefixed by "Mike>".

-----Original Message-----
From: OAuth <oauth-bounces@ietf.org> On Behalf Of Benjamin Kaduk via Datatracker
Sent: Tuesday, April 6, 2021 11:39 AM
To: The IESG <iesg@ietf.org>
Cc: oauth@ietf.org; oauth-chairs@ietf.org; draft-ietf-oauth-jwsreq@ietf.org
Subject: Benjamin Kaduk's No Objection on draft-ietf-oauth-jwsreq-32: (with COMMENT)

Benjamin Kaduk has entered the following ballot position for
draft-ietf-oauth-jwsreq-32: No Objection

When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-oauth-jwsreq/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Thank you for the new security considerations text in Sections 10.7 and
10.8 since I last reviewed; it does a great job capturing my comments (and the current deployed reality).

Thanks also to Watson Ladd for the latest secdir review and the authors for their responses to it.

Mike> Glad to hear it!

Section 6.2

   The Authorization Server MUST validate the signature of the JSON Web
   Signature [RFC7515] signed Request Object.  The signature MUST be
   validated using a key associated with the client and the algorithm
   specified in the "alg" Header Parameter.  [...]

The last version I reviewed had some language tying the algorithm used for verification back to a registration (and I commented that perhaps a registration might not always exist).  This language seems to set the recipient up to blindly use the "alg" header parameter, even if it's "none", and we should probably have some hedging language here (I see we do have language elsewhere that bans "none" specifically)...

                                             If a "kid" Header Parameter
   is present, the key identified MUST be the key used, and MUST be a
   key associated with the client.  Algorithm verification MUST be
   performed, as specified in Sections 3.1 and 3.2 of [RFC8725].

... and maybe that would just take the form of swapping the order of these two sentences, now that I keep reading.

Mike> Order swapped, per your suggestion.

Section 10.2

Do any of the procedures listed for steps (c) and/or (d) need to be performed in step (e) as well?  (In particular, the requirements on the returned URI seem like they would still apply, and possibly the need for client authentication.

Mike> Having re-read (c), (d), and (e), I don't think so.  The returned URI in (e) can be an opaque identifier that is not a URL, so the URL checking logic wouldn't apply.

Section 10.3

Nat's response at
https://mailarchive.ietf.org/arch/msg/oauth/hB_ON_BR0fDf3NSDFcFo5MwbZ2Y/ to my previous review suggested that there might be value in future work that specifies the linkage across these endpoints to try to address the cross-phase attacks discussed in [FETT].  However, the paragraph that I had commented on (that mentions "an extension specification") has since been removed, and I failed to track down why just from a quick mailarchive search.  There may well have been a good reason for removing it (and the reference to [FETT]), so please help refresh my memory if that's the case.

Mike> It was removed as suggested by Watson Ladd in the discussion that resulted from his SecDir review.

Section 10.4

   The introduction of "request_uri" introduces several attack
   possibilities.  Consult the security considerations in Section 7 of
   RFC3986 [RFC3986] for more information regarding risks associated
   with URIs.

My previous comments had mentioned that because of time skew the dereferenced request URI might actually have the contents of a different request than the one intended, and Nat's response at https://mailarchive.ietf.org/arch/msg/oauth/hB_ON_BR0fDf3NSDFcFo5MwbZ2Y/
pointed out that OIDC actually does use a nonce that would prevent such an occurrence.  Hopefully Nat did get a chance to think about whether there was anything else that we should mention in this document, on this topic.  ("There isn't anything else to mention here" is a fine answer; I just wanted to close the loop on that thread, since I didn't find one in the mail archive.)

Mike> OpenID Connect requests using some response_type values include a nonce and those using others don't.  Thinking about it some more, I don't think there's any particular risks about using these URLs that are sufficiently different than those of other URLs that they're worth mentioning here.

Section 11.1

nit: s/TFP/trusted third-party service/ (multiple instances), since we stopped using "Trust Framework Provider" in the main body.

Mike> Thanks for the catch - corrected!

Sction 14.1

Not your fault, but BCP 195 now includes both RFC 7525 and RFC 8996 -- thank you for referencing it as BCP 195!  I expect the RFC Editor will catch the new reference if you don't want to figure out how to notate it properly.

Mike> Thanks for the heads-up.  I'll plan to ask the RFC Editor what the right way to do this is.

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

				Thanks again!
				-- Mike