Re: [secdir] secdir review of draft-ietf-oauth-device-flow

William Denniss <wdenniss@google.com> Tue, 15 January 2019 21:43 UTC

Return-Path: <wdenniss@google.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 937B61294FA for <secdir@ietfa.amsl.com>; Tue, 15 Jan 2019 13:43:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.642
X-Spam-Level:
X-Spam-Status: No, score=-17.642 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.142, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id asvVBgtMDAEu for <secdir@ietfa.amsl.com>; Tue, 15 Jan 2019 13:43:02 -0800 (PST)
Received: from mail-io1-xd32.google.com (mail-io1-xd32.google.com [IPv6:2607:f8b0:4864:20::d32]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2FC08129AA0 for <secdir@ietf.org>; Tue, 15 Jan 2019 13:43:02 -0800 (PST)
Received: by mail-io1-xd32.google.com with SMTP id c2so3266418iom.12 for <secdir@ietf.org>; Tue, 15 Jan 2019 13:43:02 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Bbs5kQmNHzG7ta3gZdf0zkxNgGdVe1ay5IFGJ1jdhrw=; b=HFePYzAlR2zVGuKsrzimevfedcs733KkCdHCbQmlSBSb68IrwbUOhaxx82zqwtsYbx S7jgjiMii+REgaWx1Cses8RIMlUbOpdo8HfK7cqE3/q0ff22HkxQSTfGOJRKhq4PeSUv PMl3c1cy4vIZmNutMg29fx3fQxSZLhnA0VpqVEHypH2Zcuyz1nYnwEInmAYHOx2KdWCe 6ZoNkFXmXfA5vPNdY30modm/jjSPcPxqfSoydBlhMY4eB2hZZmq5vpT+9a0r6UonP3HF q2QvRz1Le+jSXsMXQEJIKYfZpO9AY0D+guAUg1l6uBPkPps6rVXDNw0bni32LsourqXO Iy9g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Bbs5kQmNHzG7ta3gZdf0zkxNgGdVe1ay5IFGJ1jdhrw=; b=dEXnIKO8+inZvusrZy5C5fT2rlFLXgrxY51rmvVXRqky+hNK/Z8Bt542h2suZTRnsc 3a15C/2xaEBFfwTWFWJHP+OCeuRo7o6/c/U7DbL0yI39guMFnjpiwqochjAs0n8iovg2 uZqfL/2zPh+RFwkebueetp9lUPu+BY7Ch4d3gp5Fw+y4eb/3/BjgYpqdIgteG188+TSe ZM9rX70QV2Lb0q0CIFNNdgweDBL1yB+DC38n+J5fEKkvDpeJD9NRR2cZVq9hbImZOVz/ 8QlLsdbTmezDSIpJvEpOKtSw25okvE9xLWABxNZJT/tyjI45BnRms48T0K/7IuNjk5B6 tnWA==
X-Gm-Message-State: AJcUukcb8o7r6hIoRYvssU38V9iTTlmYcHw5jJuJ58SDBSVciydfuiM2 hCeMf/qjoTKSP9RNc2tSzruBAXHbIaVTjnfiV2jl7OvzfNB6MQ==
X-Google-Smtp-Source: ALg8bN7sHghmIgIS9B09JSdmD2jbSTlylMKbjdc7H6LJUlzpP/Itfqu/TabQ+wghd3c2eYfHxT7q5WWFEQJsqO5Xo9s=
X-Received: by 2002:a5e:8306:: with SMTP id x6mr2838341iom.229.1547588581034; Tue, 15 Jan 2019 13:43:01 -0800 (PST)
MIME-Version: 1.0
References: <E17D37F9-070C-4E9D-9955-0E50F09DA89B@gmail.com> <CAAP42hAqmOZjC1ANjdG=R8QSY1G7as4qR=utRWE-ZD=Yr_FNNQ@mail.gmail.com> <CAO8oSXmY93HovXRETmhmcdkurRN9ovrtziQQDfVDNva=-fhT9Q@mail.gmail.com>
In-Reply-To: <CAO8oSXmY93HovXRETmhmcdkurRN9ovrtziQQDfVDNva=-fhT9Q@mail.gmail.com>
From: William Denniss <wdenniss@google.com>
Date: Tue, 15 Jan 2019 13:42:49 -0800
Message-ID: <CAAP42hCMf3Zn5qU+K9Ee2KW+uxuPveSdxNEc=cO2z8iByQ3iSQ@mail.gmail.com>
To: Christopher Wood <christopherwood07@gmail.com>
Cc: The IESG <iesg@ietf.org>, draft-ietf-oauth-device-flow.all@ietf.org, secdir@ietf.org
Content-Type: multipart/alternative; boundary="000000000000a21f0f057f860b4f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/jyRdL4aNhwaGr2dI_tfT6n0-zbE>
Subject: Re: [secdir] secdir review of draft-ietf-oauth-device-flow
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Jan 2019 21:43:06 -0000

On Sun, Aug 26, 2018 at 7:30 PM Christopher Wood <
christopherwood07@gmail.com> wrote:

> Hi William,
>
> Please see inline below.
>
> On Wed, Aug 1, 2018 at 5:03 PM William Denniss <wdenniss@google.com>
> wrote:
>
>>
>> On Tue, Jun 12, 2018 at 5:55 PM, Christopher Wood <
>> christopherwood07@gmail.com> wrote:
>>
>>> Hello,
>>>
>>> I have reviewed this document as part of the security directorate's
>>> ongoing effort to review all IETF documents being processed by the
>>> IESG.  These comments were written primarily for the benefit of the
>>> security area directors.  Document editors and WG chairs should treat
>>> these comments just like any other last call comments.
>>>
>>>   The summary of my review is: Ready with nits.
>>>
>>> Overall, the document is in fine shape. I have a few general comments
>>> (not quite nits,
>>> though not quite issues either), listed below:
>>>
>>> - Section 3.5, fifth paragraph: Requiring clients to poll at a
>>> “reasonable” polling interval
>>> without a suggestion of what is reasonable seems strange. Could you
>>> suggest a value that’s
>>> within reason, e.g., every second?
>>>
>>
>> We documented a default of 5s in version 12.
>>
>>
>>> - Section 5.1, first paragraph: It might be useful to point to Section
>>> 6.1 wherein User Code
>>> generation is discussed. Right now minimum entropy “requirements” are
>>> listed without further
>>> details regarding viable mechanisms.
>>>
>>
>> The authors are still considering this feedback, along with Benjamin
>> Kaduk's DISCUSS.
>>
>>
>>> - Section 5.2, second paragraph: The text claims that an end user would
>>> end up “on the
>>> authorization page of the wrong service.” Can you provide more details
>>> here? What stops
>>> the malicious MITM from serving an authorization page that’s
>>> indistinguishable from the
>>> legitimate service page?
>>
>>
>>
>>> - Section 5.3, first paragraph: How specifically does the authorization
>>> service prevent
>>> devices from lying when providing “information about the device”? Or,
>>> alternatively, how
>>> does the authorization service learn this information?
>>>
>>
>> These 2 also pending.
>>
>>
>>> - Section 5.4: Would it be useful to suggest that clients SHOULD use a
>>> secure (encrypted
>>> and authenticated) channel when communicating to the user device?
>>>
>>
>> This section is actually referring to real-world spying, i.e. someone in
>> the same room as you who can see the TV. Perhaps we need to make that more
>> clear?
>>
>
> That might help. It seems to be only a matter of clarity, not correctness.
>

Thank you for the suggestion, a clarification has been added and will be
published in -14.

As currently drafted it now reads:

            While the device is pending authorization, it may be possible
for a
            malicious user to physically spy on the device user interface
            (by viewing the screen on which it's displayed, for example)
and hijack the
            session by completing the authorization faster than the user
that
            initiated it.


>
>>
>>>
>>> The remainder of my comments, listed below, are editorial in nature,
>>> aimed towards improving
>>> readability of the document.
>>>
>>> - Section 1, step (E): This is the first time client polling is
>>> mentioned without
>>> discussion of timeouts or server-generated errors. The draft provides
>>> such details later
>>> on, so it would be helpful to allude or point to them here.
>>>
>>
>> I believe this is covered in detail in the document, this section is
>> intending to just be a high-level overview.
>>
>>
>>> - Section 3.3, second paragraph: Please cite TLS upon use (“… in a
>>> secure TLS-protected
>>> session.”).
>>>
>>
>> Done, thanks!
>>
>>
>>> - Section 3.3, second paragraph: The text suggests that the server
>>> informs the user to
>>> “return to their device.” Perhaps this should be prefaced with a MAY, as
>>> the client will
>>> eventually learn that authorization is complete upon polling.
>>>
>>
>> MAY was added, thanks!
>>
>>
>>> - Section 3.3.1, first paragraph: Should it be required that
>>> “verification_uri_complete”
>>> is constructed in part from the “verification_uri” and “user_code”? I’m
>>> not sure this is
>>> necessary, though the example given is constructed this way. If not
>>> required, this might be
>>> worth noting.
>>>
>>
>> The working group considered this, in fact originally we were not going
>> to have verification_uri_complete and it would just be defined as a
>> composition of those two values. In the end, the work group decided to make
>> it separate. The authorization server can combine them to create the
>> complete verification URI, or may use something else.
>>
>> The text currently states the following which I believe covers this:
>>
>> "A verification URI that includes the "user_code" (or
>> other information with the same function as the "user_code"),
>> designed for non-textual transmission."
>>
>> - Section 3.5, first paragraph: s/token endpoint/authentication server?
>>>
>>
>> This section does actually relate to the token endpoint.
>>
>
> Ah, okay. I misunderstood. Thanks!
>
>
>>
>>> - Section 5.1, third paragraph: This text is mostly redundant with the
>>> preceding paragraphs.
>>> I would remove or merge it with the paragraphs above.
>>>
>>
>> I don't agree that it's redundant. Willing to review text if you have a
>> concrete proposal.
>>
>
> My only recommendation is to remove the paragraph. I think it’s already
> covered by the preceding paragraphs. That said, I don’t think this is
> necessary. It’s merely a suggestion.
>
>
Note that this paragraph was significantly reworked in -13 and has a longer
discussion on entropy now.


>
>>
>> Please let me know if you’ve further questions, comments, or concerns. I
>>> hope this helps.
>>
>>
> It does indeed. Thanks for your changes!
>
> Best,
> Chris
>

Thanks again for your review!

William