[OAUTH-WG] Re: Call for adoption - PIKA
Richard Barnes <rlb@ipv.sx> Thu, 27 June 2024 15:13 UTC
Return-Path: <rlb@ipv.sx>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C1A0EC151069 for <oauth@ietfa.amsl.com>; Thu, 27 Jun 2024 08:13:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.904
X-Spam-Level:
X-Spam-Status: No, score=-1.904 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ipv-sx.20230601.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LVr2sFscFWoy for <oauth@ietfa.amsl.com>; Thu, 27 Jun 2024 08:13:09 -0700 (PDT)
Received: from mail-il1-x12e.google.com (mail-il1-x12e.google.com [IPv6:2607:f8b0:4864:20::12e]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D8C5BC14F704 for <oauth@ietf.org>; Thu, 27 Jun 2024 08:13:04 -0700 (PDT)
Received: by mail-il1-x12e.google.com with SMTP id e9e14a558f8ab-375fb45f465so28730775ab.1 for <oauth@ietf.org>; Thu, 27 Jun 2024 08:13:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipv-sx.20230601.gappssmtp.com; s=20230601; t=1719501183; x=1720105983; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=P8pnW4djdBc7tYpyZ7zGNiecZ15YzbsPeepZzbDOZfI=; b=i5jDQJixXhHPj/rOGxnomTjMc2UqarMKhGqoDkF3qv1XqnLiHvwIxSFar2mFjWOPCP sPr38PauXmB5XPnKFBewdhHE2uFnl4oVzS3J3RiNCccgofGW0X7FFs16wDqWqFn9E79b DoKAbSLNORpbMOeRHsGW+PGqTgQHarESuuPY+follpom7DDwB8J50SLwUqreC4F1devh uuuBANANk9D8apXI+9AEeoYaKSp8TamlYUKY2m9tNmcTi+EFezKdilMWoFY1wB6w/zAg B3g1LqZzhSHYmQqFhKK+vx0XLrqt9bUuTZDoZnDOFykidRIOvURBOqKqIOl3vWWfYzAU GcOQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1719501183; x=1720105983; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=P8pnW4djdBc7tYpyZ7zGNiecZ15YzbsPeepZzbDOZfI=; b=v2knB60ecbowTAjMMW7cbCP9Ui+NbjTPyh4rLcMX88Cz31xESkczsdAtGGTw7XgQpi GfhHrAsbUHWtt8Od3GhHXTcZiaUoCmVgNV1gw7BLhWU0ggmK6xaShrtYxnE7haq4g8iW /xT09agUgviSTMntt246DxWboykaqyAHs9znug61vy3gvmQ9jeN4Q/rbA7iNCbMLgzI0 ZA+j2FO++Za4urp1JtSsGtUECyTV+CQQBZC+hij2T7HzbGYRuNoWTPqf+EGP3WP4Gfm7 4dGQcRn1xvcjurpD9/5npjkoY1y7zR1NlekmfzvYq3ObKBBvrvZXuo6udqmKkKNNM2D2 4kTg==
X-Forwarded-Encrypted: i=1; AJvYcCUI9wm1TKJs3SZFA307LWosJT6ADVs5lIeNQ8CpY0PQHG6qtjSBmGkjKdXq+8M2D5BAr61AoGDFcrtSgVtIvA==
X-Gm-Message-State: AOJu0YwcVMFfGI2ZQAIQAtQwPY4dQwRAqfOoszahQPkgMcJxE5ssyP0+ VR0lH9CmQWxS9HrStFr1vVe1l6w1ndOCHRCCY+IAtw28KpqJ8qRxKCAf4b498N1j530QjJwWWEr We90i2XKcbJb1nXqYElJmSAMdIuJ6zog9MocVgA==
X-Google-Smtp-Source: AGHT+IGYek4nJ6ybkJUB31b3tpXFXH2/sftmRoBjuXVPc4DoOOCX3Z9tD/6cr2pItsZWqmFkenSSTj62kDPzCIWUYM8=
X-Received: by 2002:a05:6e02:1a4b:b0:374:6e52:a596 with SMTP id e9e14a558f8ab-3763b337fa3mr217295625ab.22.1719501183273; Thu, 27 Jun 2024 08:13:03 -0700 (PDT)
MIME-Version: 1.0
References: <CADNypP9GmF4vp1uzLXK0YYZAHUDjK7RHbhEb4MCXkB7N3Oq4+w@mail.gmail.com> <CAL02cgQYom9P+yGMODkHNE125mZnQxRdUTNQbP4ck4y48cgGTA@mail.gmail.com> <SJ0PR02MB7439E4391F43BC7D045859F2B7D52@SJ0PR02MB7439.namprd02.prod.outlook.com>
In-Reply-To: <SJ0PR02MB7439E4391F43BC7D045859F2B7D52@SJ0PR02MB7439.namprd02.prod.outlook.com>
From: Richard Barnes <rlb@ipv.sx>
Date: Thu, 27 Jun 2024 11:12:52 -0400
Message-ID: <CAL02cgQ_4DhKiYzkt5J2ms_sAwevQcnZBL8dBBdFLWLMvbbsUw@mail.gmail.com>
To: Michael Jones <michael_b_jones@hotmail.com>
Content-Type: multipart/alternative; boundary="000000000000389cb2061be0915c"
Message-ID-Hash: U7LMRGFJG4KSVY77SKWP4BKF6EI5I7ZC
X-Message-ID-Hash: U7LMRGFJG4KSVY77SKWP4BKF6EI5I7ZC
X-MailFrom: rlb@ipv.sx
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-oauth.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: oauth <oauth@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [OAUTH-WG] Re: Call for adoption - PIKA
List-Id: OAUTH WG <oauth.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/z1ls0V8IDM_O_GFZn_m6-wPypgg>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Owner: <mailto:oauth-owner@ietf.org>
List-Post: <mailto:oauth@ietf.org>
List-Subscribe: <mailto:oauth-join@ietf.org>
List-Unsubscribe: <mailto:oauth-leave@ietf.org>
OpenID Discovery already allows this attack. Its security relies on HTTPS, which only authenticates the domain name. So the owner of a domain can present a valid discovery document with arbitrary information in it for any issuer path on the domain. Do you have the same concern with that mechanism? On Tue, Jun 25, 2024 at 5:53 PM Michael Jones <michael_b_jones@hotmail.com> wrote: > The other critique I voiced of the approach is that the application-level > X.509 certificate can be used to secure the HOST part of the issuer, but > not the entire issuer, since in general, the issuer will contain a PATH. > Yes, the service hosting the issuers controls all the paths, as Richard > replied earlier, but it’s not the service who is the attacker that this > enables. The attackers that not securing the PATH enables are the tenants > themselves. > > > > An attacker could host a tenant at the service and get an X.509 > certificate securing the HOST part of its issuer. However, because a > legitimate tenant at another path shares the same HOST, the attacker can > copy its X.509 certificate chain and utilize a substitution attack to make > unauthorized statements about the victim tenant – statements that were not > made by the hosting service. > > > > This attack was not addressed, and I believe is intrinsic to the decision > not to protect the entire issuer value. > > > > I believe that adopting this draft would result in this attack occurring > in practice. > > > > Thank you, > > -- Mike > > > > *From:* Richard Barnes <rlb@ipv.sx> > *Sent:* Tuesday, June 25, 2024 1:56 PM > *To:* Rifaat Shekh-Yusef <rifaat.s.ietf@gmail.com> > *Cc:* oauth <oauth@ietf.org> > *Subject:* [OAUTH-WG] Re: Call for adoption - PIKA > > > > Hi all, > > > > Replying to the top of the thread again to recap the arguments so far. > (Hoping the chairs will give us a moment more to discuss before calling > cloture.) > > > > It seems like Sharon, Rohan, Watson, and I are all on the same page w.r.t. > the X.509-based mechanisms in the current draft. In particular, we're all > developers of relying party software, and it seems like we're all OK with > doing X.509 (contra Mike's point about application-level X.509). > > > > If I understand Mike and Giuseppe correctly, they want to be less > prescriptive about how the PIKA signer establishes their authority for an > "iss" value, so that an OP could use some other mechanism (e.g., OpenID > Federation). It sounds like Mike at least is OK with the draft aside from > this point. > > > > I would be open to adding some optionality in the authority mechanism > here, but I'm wary of losing the concrete interop that we get with the > draft as it is. So we would need at least a strong recommendation for > X.509, even if something else can be used if the parties agree to it. I > would be more comfortable doing something along the lines of what Rohan > suggests, namely defining a concrete, X.509-based thing here, and extending > it to support other mechanisms via follow-on specs as needed. If there > were a single additional mechanism that people wanted, as opposed to a > generic "[insert authority mechanism here]", that would also be more > palatable to me. > > > > Additional feedback would be useful on a couple of points: > > > > 1. From RPs: Is the X.509 requirement onerous to you? Or is there enough > library support out there that it's not a big deal? > > 2. From OPs: Is signing using a key bound to an X.509 certificate workable > for you? Or do you need some other authority framework? > > 3. From everyone: Is the general mechanism here useful, assuming we can > align on some set of authority frameworks? > > > > Thanks, > > --Richard > > > > > > On Mon, Jun 10, 2024 at 7:47 AM Rifaat Shekh-Yusef < > rifaat.s.ietf@gmail.com> wrote: > > All, > > This is an official call for adoption for the *Proof of Issuer Key > Authority (PIKA)* draft: > > https://datatracker.ietf.org/doc/draft-barnes-oauth-pika/ > > > Please, reply *on the mailing list* and let us know if you are in favor > or against adopting this draft as WG document, by *June 24th*. > > Regards, > Rifaat & Hannes > > > > _______________________________________________ > OAuth mailing list -- oauth@ietf.org > To unsubscribe send an email to oauth-leave@ietf.org > >
- [OAUTH-WG] Call for adoption - PIKA Rifaat Shekh-Yusef
- [OAUTH-WG] Re: Call for adoption - PIKA Richard Barnes
- [OAUTH-WG] Re: Call for adoption - PIKA Richard Barnes
- [OAUTH-WG] Re: Call for adoption - PIKA Michael Jones
- [OAUTH-WG] Re: Call for adoption - PIKA Tom Jones
- [OAUTH-WG] Re: Call for adoption - PIKA Giuseppe De Marco
- [OAUTH-WG] Re: Call for adoption - PIKA Giuseppe De Marco
- [OAUTH-WG] Re: Call for adoption - PIKA Michael Jones
- [OAUTH-WG] Re: Call for adoption - PIKA Rohan Mahy
- [OAUTH-WG] Re: Call for adoption - PIKA Rohan Mahy
- [OAUTH-WG] Re: Call for adoption - PIKA Rohan Mahy
- [OAUTH-WG] Re: Call for adoption - PIKA Giuseppe De Marco
- [OAUTH-WG] Re: Call for adoption - PIKA Michael Jones
- [OAUTH-WG] Re: Call for adoption - PIKA Watson Ladd
- [OAUTH-WG] Re: Call for adoption - PIKA Kristina Yasuda
- [OAUTH-WG] Re: Call for adoption - PIKA Giuseppe De Marco
- [OAUTH-WG] Re: Call for adoption - PIKA Giuseppe De Marco
- [OAUTH-WG] Re: Call for adoption - PIKA Richard Barnes
- [OAUTH-WG] Re: Call for adoption - PIKA Richard Barnes
- [OAUTH-WG] Re: Call for adoption - PIKA Giuseppe De Marco
- [OAUTH-WG] Re: Call for adoption - PIKA Michael Jones
- [OAUTH-WG] Re: Call for adoption - PIKA Richard Barnes
- [OAUTH-WG] Re: Call for adoption - PIKA Rohan Mahy
- [OAUTH-WG] Re: Call for adoption - PIKA Richard Barnes
- [OAUTH-WG] Re: Call for adoption - PIKA Michael Jones
- [OAUTH-WG] Re: Call for adoption - PIKA Watson Ladd
- [OAUTH-WG] Re: Call for adoption - PIKA Giuseppe De Marco
- [OAUTH-WG] Re: Call for adoption - PIKA Rohan Mahy
- [OAUTH-WG] Re: Call for adoption - PIKA Giuseppe De Marco
- [OAUTH-WG] Re: Call for adoption - PIKA Rohan Mahy
- [OAUTH-WG] Re: Call for adoption - PIKA Tom Jones
- [OAUTH-WG] Re: Call for adoption - PIKA Giuseppe De Marco
- [OAUTH-WG] Re: Call for adoption - PIKA Watson Ladd
- [OAUTH-WG] Re: Call for adoption - PIKA Richard Barnes
- [OAUTH-WG] Re: Call for adoption - PIKA Joseph Salowey
- [OAUTH-WG] Re: Call for adoption - PIKA Ethan Heilman
- [OAUTH-WG] Re: Call for adoption - PIKA Giuseppe De Marco
- [OAUTH-WG] Re: Call for adoption - PIKA Pieter Kasselman
- [OAUTH-WG] Re: Call for adoption - PIKA James Carnegie
- [OAUTH-WG] Re: Call for adoption - PIKA Tom Jones
- [OAUTH-WG] Re: Call for adoption - PIKA John Bradley