Re: [sipcore] I-D Action: draft-ietf-sipcore-sip-token-authnz-02.txt

Christer Holmberg <christer.holmberg@ericsson.com> Thu, 11 July 2019 17:21 UTC

Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1BB38120106 for <sipcore@ietfa.amsl.com>; Thu, 11 Jul 2019 10:21:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level:
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Lb8BOa2dGyWo for <sipcore@ietfa.amsl.com>; Thu, 11 Jul 2019 10:21:49 -0700 (PDT)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com (mail-eopbgr00070.outbound.protection.outlook.com [40.107.0.70]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B93481200D8 for <sipcore@ietf.org>; Thu, 11 Jul 2019 10:21:48 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=iU60rt5Hs9cdK9TEPxG8h0R+fETgWmjHjEK4hcr/rVmDDzwS18O8sWJ+fN7N5cgU9IC8tinFewDQCTfgnxEfAuaZgFBCtzqQetQNUrBbPZKokfLATp4ZrKxSmNt2yFfVDwSBvhAOXPBq7dJQizLJAtGlYhWuM5Mqffqdmh2/cZaA+mhpVlETxFzsrohw0B7zsdbj8rY5WkSS5S4fuFO4Fu2EAEmM1veqzh1Hf44yC0TmBj8zHdJZTL1s3zNxnwyS8zZRmTIXfbPq0zhoy6m06lCcnoA+3pIIYhoO9Vqx2krFrYMjubfT0fwcTfWXBUjTT/swFqrjb9615m3ZkiCzbg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=PZbcUGjT0j/Pe9r8AFEwua9eRgrfJS4W/ffFvetgumo=; b=XE6ROE1PEXIf89BlZZNWdFCg1Ev/7etixs3ebwnLIlZ8AQdfhDRB38a0Hqjp6kFlXHIPY7bWP73wVTcF4wIvkN3BqAREmDzVnSYElzZTReoHl7CBzsgQeD7bMDv5LwER/L0sCvnZZk8zKYMGmLTS1ZQ3pfuYOtX/PuceXwAIuW/QUPxEP+vZ/7/JcP0bS91TSc/BdQLKKUk/QHVwGzWpjyyVN86kYEIBottkWAtzVbRIHnRbUZuXO39DlD2nskw6JV/12RF0JXmAH3fvMKNIvxcXZJzvTd10qzY627gL4Dnc+hf3khXt9akrlRUORXIFMRAG1mu47sLCxdkgnu9Cnw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1;spf=pass smtp.mailfrom=ericsson.com;dmarc=pass action=none header.from=ericsson.com;dkim=pass header.d=ericsson.com;arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=PZbcUGjT0j/Pe9r8AFEwua9eRgrfJS4W/ffFvetgumo=; b=rKp1RAUwmnCdCdvA851VcadNtbbmqxBSxVVsq6GaIccs0e+eQ7ANGcChLyuwRYzltsicZ5B1PdbfZfFlymwrBrTj18HmR0Td9G/ZY4+8BFB7g4n7X2vX26bz6JoqMaPWxyTk1eFT2RFZM7xYHaNCngIgMZREsqgX092V4n/iTx0=
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com (10.170.245.23) by HE1PR07MB3483.eurprd07.prod.outlook.com (10.170.247.154) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2073.10; Thu, 11 Jul 2019 17:21:44 +0000
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::5050:a3a9:be80:cf43]) by HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::5050:a3a9:be80:cf43%5]) with mapi id 15.20.2073.008; Thu, 11 Jul 2019 17:21:44 +0000
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: "Olle E. Johansson" <oej@edvina.net>, Paul Kyzivat <pkyzivat@alum.mit.edu>
CC: "sipcore@ietf.org" <sipcore@ietf.org>
Thread-Topic: [sipcore] I-D Action: draft-ietf-sipcore-sip-token-authnz-02.txt
Thread-Index: AQHVNLWxruT/m/C2REGBvr04oIfCDqa/Al8AgAHwRACAACa0QIAAOvWAgACKbgCAAH00gIAARqSA///Z+ACAADMUgP//1TCAgABAXACAATj+gIAAOeSAgABE8QCAALlBgIAAP24AgAA4AgCAADVqAA==
Date: Thu, 11 Jul 2019 17:21:44 +0000
Message-ID: <C87ED703-09CE-452F-AF03-ECD05BAF6334@ericsson.com>
References: <156249821133.14592.1211919336596009446@ietfa.amsl.com> <CAGL6epLsP_UfZMAcFLsORrR05Enu-vp=jnkgUFuKSttQm8swAw@mail.gmail.com> <c8d5c42e-ab21-80e8-3189-c8592dd02d3a@alum.mit.edu> <HE1PR07MB3161C55955B2FCED2C0F6A9993F60@HE1PR07MB3161.eurprd07.prod.outlook.com> <68ed93ae-57df-6bc7-774b-47959417abda@alum.mit.edu> <HE1PR07MB3161D46B4A44FC7E789ADDB893F10@HE1PR07MB3161.eurprd07.prod.outlook.com> <4a9787e5-b5e2-bc08-0fa0-fae6bd44148d@alum.mit.edu> <527F4C39-F065-4335-A939-6D443F1801E7@ericsson.com> <5bb63c0c-130d-7f69-10b0-1ed1b274cc58@alum.mit.edu> <87AD4BB8-CE77-4FD7-BB72-6643DF513058@ericsson.com> <168b1354-b35b-edee-e5f9-d4ddbecfae40@alum.mit.edu> <607A513F-8616-4777-8B5E-59390E845709@ericsson.com> <b6ca4c79-5a17-10da-3882-20bc8b0e9b98@alum.mit.edu> <89A28FAE-A25A-4AFF-9A94-91E09FDD6C3B@ericsson.com> <2aa8cb91-aac6-b66e-e54a-b9f6c650ce02@alum.mit.edu> <D7218ABE-F204-407B-ADE1-39DAB98C2A98@ericsson.com> <cd23be26-c383-8b72-cdf1-4436a6bc175f@alum.mit.edu> <3B02CDE8-77C3-4DD8-940B-8B41993FFD1D@edvina.net>
In-Reply-To: <3B02CDE8-77C3-4DD8-940B-8B41993FFD1D@edvina.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.1a.0.190609
authentication-results: spf=none (sender IP is ) smtp.mailfrom=christer.holmberg@ericsson.com;
x-originating-ip: [89.166.49.243]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: f9471282-19aa-4dc1-d6b7-08d706243f55
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:HE1PR07MB3483;
x-ms-traffictypediagnostic: HE1PR07MB3483:
x-microsoft-antispam-prvs: <HE1PR07MB34833E482F486CB9304B5DCD93F30@HE1PR07MB3483.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0095BCF226
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(346002)(396003)(376002)(366004)(136003)(39860400002)(189003)(199004)(305945005)(6506007)(14454004)(66066001)(68736007)(6512007)(26005)(446003)(316002)(186003)(11346002)(102836004)(486006)(71200400001)(44832011)(110136005)(36756003)(71190400001)(476003)(2171002)(53936002)(86362001)(81166006)(7736002)(229853002)(81156014)(6116002)(66946007)(256004)(76116006)(99286004)(4326008)(6246003)(6486002)(64756008)(3846002)(66476007)(33656002)(6436002)(66556008)(14444005)(478600001)(58126008)(2906002)(66446008)(8676002)(25786009)(5660300002)(8936002)(2616005)(76176011); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR07MB3483; H:HE1PR07MB3161.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: MPFTUz0ql/BUhdFBIvUuklGwP793DugCcSnSWEpuUe3aOZ50M3qBEAFXoDh64JdTlBEThcUkhO1Q7ZCfql2E9OAK0jG2uLU6y8VS2xRiWdTMz99pNYdvPBUTZZ1yfVe2j+4qylQuvEErFcthxIFVM7RYwA3ZTBtaT6quHPAB9xJDs/AaYDaDLDXFn8zb+P8rFRUrBA/ELikQXVWHL6OWCwKDoksP2hpORfy2jM0qwgcouUOfHu8l0jaV+NxpR/nzUDrKUAqZB4JdlHVjVcEeChFBrvZIssyx5Cglf0TB95WunqU5Wc6dyMEdg+qLK0HxhBz836MG61iRRfuepFrcc2OPo1nPU1ypyH8SFpQhPee+bDK8FI58lV4UEQDEy9yB0pBmoiXD59VGOVP8iml3rNrP5MZBR4SXDSZfWL2QgX0=
Content-Type: text/plain; charset="utf-8"
Content-ID: <341F04657715004DB7550F71789A9B83@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f9471282-19aa-4dc1-d6b7-08d706243f55
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Jul 2019 17:21:44.6554 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: christer.holmberg@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB3483
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/jqKaSFZQfb-A4RajFKvIIeOdPFY>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-sip-token-authnz-02.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Jul 2019 17:21:52 -0000

Hi,

    >>>>> All I am saying is that one should not send a token to someone that it has NOT been issued for.
    >>>>        Then you are saying that a token should *never* be included in a request
    >>>>    to a target for which you have not received a challenge some time in the
    >>>>    past.
    >>>>        That is a bit extreme, but I guess you can specify that if you think it
    >>>>    is the right thing to do.
    >>> That is my understanding of the generic OAuth security considerations: you don't give a token to someone it was not intended for.
    >>> Of course, if you know (based on whatever configuration/policy) that it's ok to give the token to the target I guess you could do it.
    >>>     
    >>>>    But note that this logic won't always work for Proxy-Authenticate. You
    >>>>    *might* know that a particular proxy will be visited (if it is mentioned
    >>>>    on a Route header), but it is pretty common for the request to visit
    >>>>    proxies unknown (at least in advance) to the UAC.
    >>>   It is important to remember that, since the token needs to be protected, a proxy needs to have the associated protection credentials to be able to access the token.
    >> 
    >> I'm lost here. How is the token protected? Is it because it is passed by reference, and other credentials are needed to dereference it? Or is it passed by value but encrypted?
    >> 
    >> If it is protected, then why is there any concern over who it is given to?
    >
    >Normally most tokens are just digitially signed, but clear text. It can be encrypted, but then the auth server need to know which key pair to encrypt it with, which in turn means
    >that the client needs to tell the auth server that which leads to a requirement to have parseable access tokens.

    I think the oauth2 token can be delivered non-encrypted to the SIP UA over HTTPS. The SIP UA can then encrypt the oauth2 token before sending it over SIP.

Regards,

Christer