Re: [secdir] Security review of draft-ietf-oauth-dyn-reg-management-12

Ben Laurie <benl@google.com> Wed, 08 April 2015 11:38 UTC

Return-Path: <benl@google.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8F59B1B302A for <secdir@ietfa.amsl.com>; Wed, 8 Apr 2015 04:38:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.389
X-Spam-Level:
X-Spam-Status: No, score=-1.389 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FM_FORGED_GMAIL=0.622, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pJV6GQgFQQkH for <secdir@ietfa.amsl.com>; Wed, 8 Apr 2015 04:38:03 -0700 (PDT)
Received: from mail-vn0-x22d.google.com (mail-vn0-x22d.google.com [IPv6:2607:f8b0:400c:c0f::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EBCEA1B3028 for <secdir@ietf.org>; Wed, 8 Apr 2015 04:38:02 -0700 (PDT)
Received: by vnbf1 with SMTP id f1so14478591vnb.5 for <secdir@ietf.org>; Wed, 08 Apr 2015 04:38:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=9gvkhP15Orzlas+3aESGslYIMimmZN5Fg8bLc0Tc4pU=; b=bvFIGgUfN2X8soEfGiXc8EENQc6fY4msiEGP3xbIhjyPmqaUzuZMF1oYgHbEodr3+n jRPoXKP+vV8JW4n7b1uhpZd14gURZMOSc0zotfN+0eOfgRBJ+xNI4bKt6F3f/6n3JbB7 P22MfDv3n/i+bafb6KTBl7jDnqJ0WZjhk8XCItxwrspxMgm4Ybvu4+PwDHu8MTU8ksEu YQibrjVGrTOh5SXoEgswuuIJmWuym1L675a5ICI7AvCHINF1tGbW+nOCOUdSA9u/K833 iaVlMd2LGomUM3G8IAOcAmSxeTHvit1O40lyBU7tPcbpUxgprm6aWY83RCwvpsjHk2GU EXLQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=9gvkhP15Orzlas+3aESGslYIMimmZN5Fg8bLc0Tc4pU=; b=lfGgQb3niFziTFpw9DLdRExoKcI6yu/jTXXE7JMzyzGs1ylfQni2m9uO3kSEn0IGoL W53B8Sh94MaBfBpjlz3CQeErUxEKfK2a0N0WYrsq9wtaedw+Zc4b9TeDBwhged0rT7Wv KRdqZ9zS62H2ELirFCG7mxSKZ7E2J8ZbMGpI0Nude0cPNaPsdfJ8/EUQQQ6bMXeBcCX/ Lf/iiuJ/je6TIqKVwX1ylNrWfOLlR9hgEeOc1TbCDPl7BvvPvBqA2T7KDZkJOjgSRH5h eZqkztmEGs9H2vT7faDoWT1mP7l5WtYvdR7Jv/F0X4QEzxvlKEF0/vs1mWkj/Xougkna 5W0A==
X-Gm-Message-State: ALoCoQnt7Ol0stSqSx0NeYoiFE045EHlwREnSjwK6FudECrxONcsRR0V4HjcQn50JWzuBCQh9rCU
MIME-Version: 1.0
X-Received: by 10.140.92.51 with SMTP id a48mr28433525qge.30.1428493082101; Wed, 08 Apr 2015 04:38:02 -0700 (PDT)
Received: by 10.229.178.135 with HTTP; Wed, 8 Apr 2015 04:38:01 -0700 (PDT)
In-Reply-To: <A3C6E3E8-59B8-4E41-84D5-F4631A4869EC@mit.edu>
References: <CABrd9STmvLWy_Bz7e+pN_0vANxajtD+fMzVM+trwn6+k50Mifw@mail.gmail.com> <118C77E9-FAD2-48C1-A6E1-4D20D219449F@mit.edu> <CABrd9SRVeW5ieSyZSZ3ykT2taZAfKnC7nhnRAf=+BSUKnT-L5A@mail.gmail.com> <951E5D91-BC5D-48CC-8B9C-D88804FB5B87@mit.edu> <CABrd9SSp3eqH1KB-rHCVtiQ8_m4O_pF4GAB7Pagv24uMPxW=0A@mail.gmail.com> <4DE7AD5F-A14A-4255-A78C-0F6DCBECE735@mit.edu> <CAHbuEH6TvLSauW9WvZxtE6+w6iJeNFgYWN07MBHPJBQA0JCKGQ@mail.gmail.com> <A3C6E3E8-59B8-4E41-84D5-F4631A4869EC@mit.edu>
Date: Wed, 08 Apr 2015 12:38:01 +0100
Message-ID: <CABrd9SQbP6U5Of6ka24VecXv4J4aaLzpGDtxXaAxqrg+YqQqWw@mail.gmail.com>
From: Ben Laurie <benl@google.com>
To: Justin Richer <jricher@mit.edu>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <http://mailarchive.ietf.org/arch/msg/secdir/6sAM9JrN_HNU2UH9KhY1RC7MRcg>
Cc: draft-ietf-oauth-dyn-reg-management.all@tools.ietf.org, Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>, The IESG <iesg@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>
Subject: Re: [secdir] Security review of draft-ietf-oauth-dyn-reg-management-12
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Apr 2015 11:38:06 -0000

On 6 April 2015 at 21:14, Justin Richer <jricher@mit.edu> wrote:
> Ben et. al.,
>
> I took the proposal to the WG and have changed the draft text based on their
> feedback. The results are published here:
>
>   http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-management-13

Looks good.

>
>  — Justin
>
> On Apr 3, 2015, at 12:14 PM, Kathleen Moriarty
> <kathleen.moriarty.ietf@gmail.com> wrote:
>
>
>
> On Fri, Apr 3, 2015 at 3:02 PM, Justin Richer <jricher@mit.edu> wrote:
>>
>> On Apr 3, 2015, at 1:26 PM, Ben Laurie <benl@google.com> wrote:
>> >
>> > On 3 April 2015 at 18:22, Justin Richer <jricher@mit.edu> wrote:
>> >>>
>> >>>>> Issue: " Since the client configuration endpoint is an OAuth 2.0
>> >>>>> protected
>> >>>>> resource, it SHOULD have some rate limiting on failures to prevent
>> >>>>> the registration access token from being disclosed though repeated
>> >>>>> access attempts."
>> >>>>>
>> >>>>> I am not sure what this is getting at. Limits on key re-use? Some
>> >>>>> kind
>> >>>>> of BEAST defence? Something else?
>> >>>>>
>> >>>>> Without some quantification of the threat, it seems hard to act on
>> >>>>> this requirement.
>> >>>>
>> >>>> The rate limiting is going to take a number of different forms
>> >>>> depending on the platform and deployment characteristics of the
>> >>>> authorization server, so we don’t recommend any particular approach. This is
>> >>>> also something that’s going to be changing quickly over the years, and
>> >>>> instead of prescribing a specific solution we thought it better to describe
>> >>>> the problem here and say that it must be mitigated.
>> >>>
>> >>> Solution to what? This is precisely my issue - you haven't described
>> >>> the problem, you've described a solution to some problem I'm finding
>> >>> hard to guess.
>> >>>
>> >>> In other words: how could the registration access token be disclosed
>> >>> through repeated access attempts?
>> >>
>> >> An attacker could keep poking at a client configuration endpoint with
>> >> random self-generated tokens until it finds one that works. There’s no
>> >> oracle attack or other portion that lets the attacker know they’re getting
>> >> closer to a good token, just a basic repeated hammering of a protected
>> >> resource This problem is mitigated by having a sufficiently random token (as
>> >> recommended in RFC6750 and RFC6819) as well as rate-limiting the connections
>> >> to the endpoint (also suggested by RFC6819). This is fairly common advice
>> >> for any endpoint protected by a secret (in this case, an OAuth token). Is
>> >> there a better way to state this so that it’s more clear to developers what
>> >> they should look out for?
>> >
>> > How about making it a non-problem by requiring sufficiently strong
>> > tokens that there is no possibility of brute force?
>> >
>> > Mildly astonished that this attack is even considered feasible.
>>
>> I’m fine with that resolution, or with just deferring to the appropriate
>> sections of 6750 and 6819 here, if the AD’s are amenable to that change.
>
>
> If the WG is good with the change and there is no reason to make this a
> non-problem, that would be ideal.
>
> Thanks,
> Kathleen
>>
>>
>>  — Justin
>
>
>
>
> --
>
> Best regards,
> Kathleen
>
>