Re: [GNAP] Defense protection

Adrian Gropper <agropper@healthurl.com> Fri, 28 May 2021 20:09 UTC

Return-Path: <agropper@gmail.com>
X-Original-To: txauth@ietfa.amsl.com
Delivered-To: txauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1B96B3A3429 for <txauth@ietfa.amsl.com>; Fri, 28 May 2021 13:09:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.401
X-Spam-Level:
X-Spam-Status: No, score=-1.401 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FORGED_FROMDOMAIN=0.248, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.249, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c6048eaC5IFP for <txauth@ietfa.amsl.com>; Fri, 28 May 2021 13:09:41 -0700 (PDT)
Received: from mail-vs1-f43.google.com (mail-vs1-f43.google.com [209.85.217.43]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 573963A3428 for <txauth@ietf.org>; Fri, 28 May 2021 13:09:41 -0700 (PDT)
Received: by mail-vs1-f43.google.com with SMTP id x2so2777937vss.3 for <txauth@ietf.org>; Fri, 28 May 2021 13:09:41 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=uNtlSM6/qpwYppkLNrCXhKIko3W2Qu9TpBg8E3WoODY=; b=NEuKQ09fnTMa/TpDgMWeYFUQtGzm89hj+iZGsyzq9sq7PJQNnGlpLmfkUioM52W2Z9 umN5s+Ni7HkxKb9L7VM2dV1oT3DmkqCSJRG8D63u0GtgJACPtzb2so1uFiGRGAPzMY9a gNMEPQaRL6+KKgZgUKK/Dc8zJUkArCdB4yjt56bAPqT7EKSip553Y5W7l1nudAV19K/i rx1/O2FJ1hQhsFed/aNC95IaMRqho8bAksBHc2uuDy4D/PcsKzXUShJHtfkVM+sZVFap qtJMVk5DLQcV538lnr62b3s5JRIDDXiF25TtZUuQhzcSW3qRtitlFXnKtixjlk/uoKkP RDmQ==
X-Gm-Message-State: AOAM530TH3CvxLoHSpWg2LyVCmzeLSF6uY5P8+TD2HqgIafU2IrjOkga DRqtpXjPN+dIWV9Ho4Rs6wIkS2fv8Qc8V6P0UnY=
X-Google-Smtp-Source: ABdhPJxqSrM6PtPmneNLTS7WX66ThFjaDVmoc2SRubzu+tSOpbDwbuu8O02x9dZvxv7D4TlLXLE/TzSgCPouBtaiIFY=
X-Received: by 2002:a67:cd0d:: with SMTP id u13mr9320944vsl.1.1622232580070; Fri, 28 May 2021 13:09:40 -0700 (PDT)
MIME-Version: 1.0
References: <CAHbuEH49sZjKvE0JVsa39WuFG83FbBcQQAyXH-V8TNGt-b-wtw@mail.gmail.com> <CANYRo8iiR-ukwWKQzVz2w4_P3wYdokpDecPSL=edfNLnKrEfng@mail.gmail.com> <CAHbuEH7MNvPwK5Yr=Uy=fE5i5-xe5=XyzbTZPZcb6hHA7=TueA@mail.gmail.com>
In-Reply-To: <CAHbuEH7MNvPwK5Yr=Uy=fE5i5-xe5=XyzbTZPZcb6hHA7=TueA@mail.gmail.com>
From: Adrian Gropper <agropper@healthurl.com>
Date: Fri, 28 May 2021 16:09:28 -0400
Message-ID: <CANYRo8i1YkDtno=SY=GrMQoNKPNXAohjKNOYz6+EZJU1wyG7wg@mail.gmail.com>
To: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
Cc: Alan Karp <alanhkarp@gmail.com>, GNAP Mailing List <txauth@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000ada47505c369740c"
Archived-At: <https://mailarchive.ietf.org/arch/msg/txauth/oSfUfF4nwYAggiKhPlvegbGtqRg>
Subject: Re: [GNAP] Defense protection
X-BeenThere: txauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: GNAP <txauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/txauth>, <mailto:txauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/txauth/>
List-Post: <mailto:txauth@ietf.org>
List-Help: <mailto:txauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/txauth>, <mailto:txauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 May 2021 20:09:46 -0000

Thanks to Alan Karp, I have come to believe that delegation is essential
and GNAP needs to speak of capabilities as first-class tokens and encourage
their use.  This will become the main driver for adoption of GNAP over SAML
or OAuth.

- Adrian



On Fri, May 28, 2021 at 3:51 PM Kathleen Moriarty <
kathleen.moriarty.ietf@gmail.com> wrote:

> Hi Adrian,
>
> Thanks for your interest!
>
> This is a helpful link that describes how the attackers were able to
> bypass MFA by stealing the signing key for SAML assertions:
>
> https://www.darkreading.com/attacks-breaches/solarwinds-campaign-focuses-attention-on-golden-saml-attack-vector/d/d-id/1339794
>
> https://owasp.org/www-chapter-singapore/assets/presos/Deconstructing_the_Solarwinds_Supply_Chain_Attack_and_Deterring_it_Honing_in_on_the_Golden_SAML_Attack_Technique.pdf
>
> I did read one that was a bit better, but can't find the link at the
> moment.
>
> And one on shared OAuth credentials/token issuance:
>
> https://www.csoonline.com/article/3607348/how-to-defend-against-oauth-enabled-cloud-based-attacks.html
>
> It would be good to think about attack vectors and if not prevention,
> minimally detection.
>
> Best regards,
> Kathleen
>
> On Fri, May 28, 2021 at 3:41 PM Adrian Gropper <agropper@healthurl.com>
> wrote:
>
>> Hi Kathleen,
>>
>> I am not aware of the attacks on SAML and OAuth and would appreciate a
>> link or two.
>>
>> I hope we can provide guidance on how GNAP can facilitate Zero Trust
>> Architecture and believe that includes guidance on how to audit various
>> things as systems use GNAP protocols to separate concerns among independent
>> actors.
>>
>> Count me in for a brainstorming sessio,
>>
>> - Adrian
>>
>>
>> On Fri, May 28, 2021 at 3:29 PM Kathleen Moriarty <
>> kathleen.moriarty.ietf@gmail.com> wrote:
>>
>>> Hello!
>>>
>>> In light of recent attacks against SAML and OAuth, I'd like to see what
>>> defense mechanisms and detection could be built into the spec.  One example
>>> would be from the recent SAML attack.  If there was a detection of
>>> instances of authorization without authentication, the SAML attack used in
>>> SolarWinds might have been detected sooner.
>>>
>>> If you think along the lines of fraud detection, where you detect
>>> unusual events, there may be some specific to GNAP that could enable early
>>> detection of abuse, misuse, or exploits.
>>>
>>> Are there some planned?  Would people like to brainstorm on this?
>>> Thanks!
>>>
>>>
>>> --
>>>
>>> Best regards,
>>> Kathleen
>>> --
>>> TXAuth mailing list
>>> TXAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/txauth
>>>
>>
>
> --
>
> Best regards,
> Kathleen
> --
> TXAuth mailing list
> TXAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/txauth
>