Re: [OAUTH-WG] JWT Response for OAuth Token Introspection and nonce

Rifaat Shekh-Yusef <rifaat.s.ietf@gmail.com> Thu, 18 March 2021 12:28 UTC

Return-Path: <rifaat.s.ietf@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 715F83A2A6D; Thu, 18 Mar 2021 05:28:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id l3DM0GmACseE; Thu, 18 Mar 2021 05:28:56 -0700 (PDT)
Received: from mail-lj1-x230.google.com (mail-lj1-x230.google.com [IPv6:2a00:1450:4864:20::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8AD8B3A2A6A; Thu, 18 Mar 2021 05:28:56 -0700 (PDT)
Received: by mail-lj1-x230.google.com with SMTP id y1so7206886ljm.10; Thu, 18 Mar 2021 05:28:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=ydUz3p8CfxX3uDctCLqMmZ9c4x5bdzJ/ScaXhV0TdvU=; b=mkYOzgT/gc4H0IdHKPJL6vtQC/LCtpZbj9QsXjfor9d40x0b2kvkz5Z5vxwVZiydUL TSP7ex8QeGMV+9pljMxzR4FpAK/cEsAEEFDFFeN2PJPscV0obXe8gZXLmZe4u0A44RFF Ev0mhaHI1fXB1dgg/CY9cUeXqzKslRTdB9/isCA8tk8W9oIxt9V9rtlyUR2SDr2EfYzJ w1nryc461riUanvrc34+ixhmmVTzMovOkYUqVtkzk9A6JdGnf57rLPZkvVOykoD4FshB MYyNMf+ZyHDzpZM+JIlU8gy/yEv6o4CdykWez4xxmAAzwQsFsRu+JDEP53OMLZuNhDsb 63Xw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=ydUz3p8CfxX3uDctCLqMmZ9c4x5bdzJ/ScaXhV0TdvU=; b=eUtwGxwhohuiDw4GwhLMZL+u/4mpEJKZ+QsVxdFb+jco6zybh4KtL4zYYnaPJ2sUdw vWVLDvD+n643zyPK3oJuxzwrfy3JK6eI3c4hV7BO6vpvvKQg0oZWaulL8FIbKmNkzbil LPbnIyb/VKuLZM3FahM+N+tIJ46Jteg3F6n1eaeoIpRUq9gcg9q8vUJhYgiw3ixGZWaO x2epN2ZhlioRYPoSlEvGXdPhJ+tfwvR4KRku/zB1t6gZH2xvCIHN6dq+ixuufXzgbyoT YZ6/XJQIHqKVQ47F6Gy6wFrj0uIHzZw0f2Ufx4b0t4IQQdIFjYrWG8DbZj2F6h6S0Lrl 6sfw==
X-Gm-Message-State: AOAM53301qClLpfEzaORtIL08yztZTJxp+gK6g0Juw2T/ZYSyW41S3sX K8QxDxj5wVa4nipVYS3wR56c8bu+eQqa2w0MjlkUS8Qv
X-Google-Smtp-Source: ABdhPJxnMk5NROOQ/dj8QGkWgU0IexV1MoLm6d6iVf4HoGKzG4gc09HqyoLfy/CGpCcaZ/lDqWuTAIe6sA2h1waTeNU=
X-Received: by 2002:a2e:bc13:: with SMTP id b19mr5312170ljf.381.1616070530769; Thu, 18 Mar 2021 05:28:50 -0700 (PDT)
MIME-Version: 1.0
References: <CALkShcttq5WKzJ4Zp8396hd+Dnoa6x74s0ekBGGNddWhoNqJ=g@mail.gmail.com> <D4516625-A215-4864-A893-16975A1E901D@forgerock.com> <CADNypP9FTQ1-vtzuQbHakOUKwQd0gHZhOpWakUG2EWqECDxnow@mail.gmail.com> <0860DA51-9C0C-49CF-8CE4-F90415CC6D0D@forgerock.com>
In-Reply-To: <0860DA51-9C0C-49CF-8CE4-F90415CC6D0D@forgerock.com>
From: Rifaat Shekh-Yusef <rifaat.s.ietf@gmail.com>
Date: Thu, 18 Mar 2021 08:28:39 -0400
Message-ID: <CADNypP-+qQb+mKCQxX8qyZuU_H=fZTLW5wLooj7XaDKaQPZOKA@mail.gmail.com>
To: Neil Madden <neil.madden@forgerock.com>
Cc: Andrii Deinega <andrii.deinega@gmail.com>, oauth <oauth@ietf.org>, draft-ietf-oauth-jwt-introspection-response@ietf.org
Content-Type: multipart/alternative; boundary="000000000000eb259205bdcebdc7"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/s8mf17uRVypxO1lpyAl1h576Tuo>
Subject: Re: [OAUTH-WG] JWT Response for OAuth Token Introspection and nonce
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Mar 2021 12:28:59 -0000

On Thu, Mar 18, 2021 at 8:07 AM Neil Madden <neil.madden@forgerock.com>
wrote:

>
>
> On 18 Mar 2021, at 11:33, Rifaat Shekh-Yusef <rifaat.s.ietf@gmail.com>
> wrote:
>
> On Thu, Mar 18, 2021 at 3:45 AM Neil Madden <neil.madden@forgerock.com>
> wrote:
>
>>
>>
>> On 18 Mar 2021, at 05:33, Andrii Deinega <andrii.deinega@gmail.com>
>> wrote:
>>
>> 
>> The Cache-Control header, even with its strongest directive "no-store",
>> is pretty naive protection... Below is an excerpt from RFC 7234 (Hypertext
>> Transfer Protocol: Caching).
>>
>> This directive is NOT a reliable or sufficient mechanism for ensuring
>>> privacy.  In particular, malicious or compromised caches might not
>>> recognize or obey this directive, and communications networks might be
>>> vulnerable to eavesdropping.
>>
>>
>> This quote is about privacy. Your concerns so far have been about replay
>> protection. TLS protects both.
>>
>>
>> Regarding TLS, I've mentioned that we don't always have the luxury to see
>> what is going on with the infrastructure. A bright example would be an AS
>> implemented as a serverless application and hosted by one of the cloud
>> providers.
>>
>>
>> Right, but (as I’ve said before) the same reasoning applies to a JWT too.
>> The infrastructure could just as easily “terminate JWS” as it currently
>> terminates TLS. As I keep saying, it’s much better to spend your time
>> ensuring end-to-end TLS than end-to-end JWT.
>>
>
> That's not always possible. In some enterprises, they will have an
> inspection middlebox that breaks the end-to-end TLS, e.g., ZScaler.
>
>
> And if you use encrypted JWTs to work around that you’ll soon have
> inspection middleboxes that break end-to-end JWT. This isn’t a game we can
> win by adding more layers of the same solution.
>

I do not know the right solution in this case. All I was trying to say is
that you cannot always assume that you are guaranteed end-to-end TLS.

Regards,
 Rifaat


>
> — Neil
>
> ForgeRock values your Privacy <https://www.forgerock.com/your-privacy>