[secdir] SECDIR review of draft-ietf-oauth-jwsreq-09.txt

Steve KENT <steve.kent@raytheon.com> Mon, 16 January 2017 20:14 UTC

Return-Path: <secdir-bounces@mit.edu>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E1FA9129A00 for <secdir@ietfa.amsl.com>; Mon, 16 Jan 2017 12:14:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.398
X-Spam-Level:
X-Spam-Status: No, score=-7.398 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-3.199, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fyfhUW9oJBMs for <secdir@ietfa.amsl.com>; Mon, 16 Jan 2017 12:14:55 -0800 (PST)
Received: from PCH.mit.edu (pch.mit.edu [18.7.21.50]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6D2B5129671 for <secdir@ietf.org>; Mon, 16 Jan 2017 12:14:55 -0800 (PST)
Received: from pch.mit.edu (localhost.localdomain [127.0.0.1]) by PCH.mit.edu (8.13.8/8.12.8) with ESMTP id v0GKEsAO020392 for <secdir@ietf.org>; Mon, 16 Jan 2017 15:14:54 -0500
Received: from mailhub-dmz-3.mit.edu (mailhub-dmz-3.mit.edu [18.9.21.42]) by PCH.mit.edu (8.13.8/8.12.8) with ESMTP id v0GKEo6T020384 for <secdir@mailman.mit.edu>; Mon, 16 Jan 2017 15:14:50 -0500
Received: from dmz-mailsec-scanner-1.mit.edu (dmz-mailsec-scanner-1.mit.edu [18.9.25.12]) by mailhub-dmz-3.mit.edu (8.13.8/8.9.2) with ESMTP id v0GKA5FD007617 for <secdir@mit.edu>; Mon, 16 Jan 2017 15:14:50 -0500
X-AuditID: 1209190c-267ff700000044ab-b7-587d29b7250a
Received: from dfw-mailout10.raytheon.com (dfw-mailout10.raytheon.com [199.46.199.220]) (using TLS with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) by (Symantec Messaging Gateway) with SMTP id A3.0F.17579.8B92D785; Mon, 16 Jan 2017 15:14:49 -0500 (EST)
Received: from tx-mailout10.rtnmail.ray.com (tx-mailout10.rtnmail.ray.com [138.126.127.234]) by dfw-mailout10.ext.ray.com (8.15.0.59/8.15.0.59) with ESMTPS id v0GKEUAY023871 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Mon, 16 Jan 2017 20:14:31 GMT
Received: from 008-smtp-out.ray.com ([23.103.8.214]) by tx-mailout10.rtnmail.ray.com (8.15.0.59/8.15.0.59) with ESMTPS id v0GKEPXM026869 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=NOT); Mon, 16 Jan 2017 20:14:31 GMT
Received: from CY1PR0601MB023.008f.mgd2.msft.net (23.103.8.215) by CY1PR0601MB022.008f.mgd2.msft.net (23.103.8.214) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.1.817.12; Mon, 16 Jan 2017 20:14:23 +0000
Received: from CY1PR0601MB023.008f.mgd2.msft.net ([23.103.8.215]) by CY1PR0601MB023.008f.mgd2.msft.net ([23.103.8.215]) with mapi id 15.01.0817.009; Mon, 16 Jan 2017 20:14:23 +0000
From: Steve KENT <steve.kent@raytheon.com>
To: "secdir@mit.edu" <secdir@mit.edu>
Thread-Topic: SECDIR review of draft-ietf-oauth-jwsreq-09.txt
Thread-Index: AQHScDTQRIxTn2UcrUufc7jChpMgqA==
Date: Mon, 16 Jan 2017 20:14:23 +0000
Message-ID: <67adb90acb8c4a23beaeb5d0b39800bf@CY1PR0601MB023.008f.mgd2.msft.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [23.103.8.196]
MIME-Version: 1.0
X-CC: ve7jtb@ve7jtb.com, n-sakimura@nri.co.jp, hannes.tschofenig@gmx.net, derek@ihtfp.com, secdir@mit.edu
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2017-01-16_15:, , signatures=0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2017-01-16_15:, , signatures=0
X-Original-Sender: steve.kent@raytheon.com
X-Original-Recipients: secdir@mit.edu, derek@ihtfp.com, hannes.tschofenig@gmx.net, n-sakimura@nri.co.jp, ve7jtb@ve7jtb.com
X-Attachments:
X-DMZ-Spam-Details: rule=notspam policy=default score=0 spamscore=0 suspectscore=0 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1612050000 definitions=main-1701160283
X-DMZ-Spam-Reason: mlx
Authentication-Results: symauth.service.identifier
X-Brightmail-Tracker: H4sIAAAAAAAAA2VSa0hTYRj23fW4duo4tb2ahg6i1FwrogtYFAWJWtiFWEbUsR3dcJuyM8uZ khkY7U9SWDYy7WYaKqQVhkWglmX3EqWrhpo1A7OsTKI6xy9t0Z+P532f533e5/v4KKmmTxFK cTlOzmFnrTqFStamb3sZezUq32joqZ25pOhtk2IFxBfeuylNhhRVnImzWnZxjnnLd6jM7uIy SVZrEeS83t8iK4CvvBsoCpmFeOtSkhtUlIapkODYiYdyUngkeNfjUbjBXyj6AQeqVhFiDHC0 5ruMFI2ABw6OKkWVgonGoX4viDiImYW19YMgiqRMF2D92cZxq0BmCX4ueyMhomV47EW1gmA9 9nSfBzGTTBj+cShIbNNMMt64/0IuYmCm47f2mvFRKaPF533l4xgZBs9eeyglOBjf9/6UExyB 505UKIk+E8u7HymJZwDeOd4nI5oMbDnshgl83Nsk+R9HY8koiYlMHjZ0dijI001Dd28aaQ8D VhboSXs6Xv6lI4kXYNMDr7wYZnp8Qnt8Anl8ApG+AYcelEsJjsHKU4N/8Dy8OHIffPsVoLwA 4SZbbqyNtVh5bmcsv5O12zlH7Hy9zeLUc6bsehC+iMY/RN0I9z4kNANDgU5Nl77KM2rk7C7e ZWuGEEqiC6aXzco3aqamZppcZpY3b3dkWzm+GZCS6oLohgiBo02sK5dzZE5QMyiZTkvnVrmM GiaddXIZHJfFOSZYCaVshjCK0iFdMEeYDnBw6VxOmsXq9NX4i4dKXKMW1uSKQprPYm28JZ2I 2iEyVEsPiwQjEuZs+6TBxOd/AuGhgTT4+flp1EIC4eL/8l7QCpcOpI2ii9pid066e4XFEmFx 19w94mIn+5cKLYDTHV1b98WUbrmC152KkQWqy2uqx6xDkeyXusG6nqbK2YXqk0m24hHD6YbV hteJeS1ru5duLO+/vbtm290Ncc6nCZ8j1xsWdz4O25vQSysH4JlK7eqbEVzo1d7RDEwZ/hYf tTm8tURf+W7Rx9Hbm5KPnknM8XatS0k60rnyU2o3NabUyXgzOz9a6uDZ3wCDOcX3AwAA
X-BeenThere: secdir@mit.edu
X-Mailman-Version: 2.1.6
Precedence: list
Content-Type: multipart/mixed; boundary="===============8092053268032793993=="
Sender: secdir-bounces@mit.edu
Errors-To: secdir-bounces@mit.edu
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/jw3JwAIbGvM70gr-cr-eJ974XOw>
Cc: "n-sakimura@nri.co.jp" <n-sakimura@nri.co.jp>
Subject: [secdir] SECDIR review of draft-ietf-oauth-jwsreq-09.txt
X-BeenThere: secdir@ietf.org
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 Jan 2017 20:14:58 -0000

I generated this review of this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG.  These comments were written with the intent of improving security requirements and considerations in IETF drafts.  Comments not addressed in last call may be included in AD reviews during the IESG review.  Document editors and WG chairs should treat these comments just like any other last call comments.



This document proposes a mechanism to enable secure communication of OAuth 2.0 Authorization Requests using a JSON Web Token (JWT). This mechanism represents an improvement over the current way that OAuth Authorization Requests are transmitted, i.e., encoded as an (unprotected) URI.



The document notes that the current Authorization Request mechanism fails to provide integrity, authentic, or confidentiality. JSON is already used for OAuth responses, so using JWT to protect requests seems like an appropriate choice. (XML signatures and encryption were rejected as too complex.)



Section 4 defines the Request Object format and provides examples.

The text here is a bit confusing. It seems to state that only integrity and authenticity are mandated by this specification; confidentiality is an optional feature. However, when discussing the use of encryption that does not provide authentication, the text says that a signature “should” (not SHOULD””) be applied. The text then says that “In this case, it [the token] MUST be signed then encrypted …” This combination of sentences is confusing and OUGHT J to be revised.



Section 6 describes how to validate a received JWT request token. Section 6.1 appears to not mandate use of a signature for an encrypted token, suggesting that authentication and integrity need not be provided if the requestor encrypts the token (and does not employ an authenticated encryption algorithm).





Section 10 describes Security Considerations in addition to the ones already describes in RFC 6119 (OAuth 2.0). The wording of Section 10.1 is odd: “ …it MUST either be JWS signed with then considered appropriate algorithm or encrypted using [RFC7516].” Why is there no cite of 7515 for JWS algorithms here, to parallel the cite of JWE?



Section 10.2 indicates that a client and server might agree, a priori, to use the non-protected parameters transmitted in a request. It does not indicate how this might have been done (hopefully, in a secure fashion).



Section 10.3 finally mandates authentication of the request source, something that was ambiguous in earlier sections of this document. There are some ambiguous statement here, e.g. “Since Request Object URI can be replayed, the lifetime of the Request Object URI MUST be short and preferably one-time use.  The entropy of the Request Object URI MUST be sufficiently large.” The lack of guidance of what constitutes a “short” lifetime or a “sufficiently large” amount of entropy (in a short URI) is worrisome.  In (d) there is a typo: “The same requirements as (b) above applies.” -> “The same requirements as (b) above apply”.



Section 10.4 includes several typos:



“Although this specification does not require them, researchs such as …” -> “Although this specification does not require them, research such as …” This is the beginning of a run-on sentence.



“The endpoints that comes into question …” -> The endpoints that come into question …”



The wording in several places is awkward, e.g., missing articles.



This section ends with the statement “An extension specification should be created.” Presumably the intent here is to suggest that an extension is needed to remedy the vulnerability resulting from the lack of explicit endpoint identifiers. This should be more clearly stated.



Section 11 discusses Privacy Considerations an unusual element of an RFC. (The authors state that ISO/IEC 29100 is freely accessible. That seems to be true only if one follows the URL in the Informative References. A search for this ISO document tends to yield copies available for a non-trivial fee, i.e., ~ $150 USD.) Since there is standards language in this section (SHOULD and MUST) I think 29100 needs to be a Normative (not Informational) reference.



The text here raises some good privacy concerns and suggests some means by which these concerns might be addressed. However, the wording here needs to be significantly improved. There are extraneous articles and missing articles that make the text harder to read. The ambiguous comment about entropy that appeared in 10.3 appears here as well.

_______________________________________________
secdir mailing list
secdir@mit.edu
https://mailman.mit.edu/mailman/listinfo/secdir