Re: [Webpush] Application server authentication new years edition

Martin Thomson <martin.thomson@gmail.com> Thu, 07 January 2016 21:57 UTC

Return-Path: <martin.thomson@gmail.com>
X-Original-To: webpush@ietfa.amsl.com
Delivered-To: webpush@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D62001A01A3 for <webpush@ietfa.amsl.com>; Thu, 7 Jan 2016 13:57:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zSBVA6uRxCld for <webpush@ietfa.amsl.com>; Thu, 7 Jan 2016 13:57:08 -0800 (PST)
Received: from mail-io0-x22f.google.com (mail-io0-x22f.google.com [IPv6:2607:f8b0:4001:c06::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 24D061A01A2 for <webpush@ietf.org>; Thu, 7 Jan 2016 13:57:08 -0800 (PST)
Received: by mail-io0-x22f.google.com with SMTP id g73so69713796ioe.3 for <webpush@ietf.org>; Thu, 07 Jan 2016 13:57:08 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=/4ULt0dQcubTG2WuHUnc2yasyOnQbg6NxEW0XwpSv8Q=; b=q8HPWJtjoySGpWXH5T4FnXo0q3bkHRfDkfSe0tgT2h0b3i2Bmj1YiwKlc9sU468mYF +2bdCwZNuUYf9U0xWac8aMYAl2t8N/sOTeLJX1j5nP0gzdCmrrcKgdpjOgpAW6WeO91V x0nhyDpXVdIKsKJ11hbjQsoxqRjukT8yvpFjOnxZEk4KwXqpr3HMMT5LHUi+cXynvFit R8xB8MpXh4hhN7XRUEMxvXn3mQ600GAXNlQSg8aeXi3hqWbrVBF9h5eOngELwYih9lqB 3fkwszItBiA4+lzIhzgQnwaUDF20v5OA1qWW2rcCK6ziASTgqIpH1FoGDLlVnENqlSLj 9bDw==
MIME-Version: 1.0
X-Received: by 10.107.131.40 with SMTP id f40mr90651008iod.190.1452203827429; Thu, 07 Jan 2016 13:57:07 -0800 (PST)
Received: by 10.36.149.130 with HTTP; Thu, 7 Jan 2016 13:57:07 -0800 (PST)
In-Reply-To: <CAP8-Fqnage13JQiz8Qkvrho-e8DWcw8p_NLd_xux+uQALwD7og@mail.gmail.com>
References: <CABkgnnXBHXfY6Gz-FKGVUUoOwyJo9zaw1rWceSqVp94FypDbJA@mail.gmail.com> <CAP8-Fq=PhUcj5aaE6dvF2_+-HmVrGDyk41QBzkVxiNMxUakoag@mail.gmail.com> <CABkgnnUYkuu9pjuqLDhiWLNWzkr9ZfYRNny4ZvSKRTWie2bQyA@mail.gmail.com> <CAP8-FqnSqtMb5bT14tkycYXOOP+Xmoa9SMjuP5KkeN_ri+_NVQ@mail.gmail.com> <CABkgnnU0CP-fGpEfqLo01ZVdjT3dNVeb3MSufO1P8T2W63dNVw@mail.gmail.com> <CAP8-FqkF9X+_CjSyXB10621L0=b756REjXsbRfsL8rT6nuh9pw@mail.gmail.com> <CABkgnnW7oRTZRKDQcxf9=0f-mxKfctQQTrR5zY6q4qJtL_cPjw@mail.gmail.com> <CAP8-Fqnage13JQiz8Qkvrho-e8DWcw8p_NLd_xux+uQALwD7og@mail.gmail.com>
Date: Fri, 08 Jan 2016 08:57:07 +1100
Message-ID: <CABkgnnVwCSmu8zJ3vZa=5wgQ9K49GHMJsov6L8MWBsZJ41-sQg@mail.gmail.com>
From: Martin Thomson <martin.thomson@gmail.com>
To: Costin Manolache <costin@gmail.com>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <http://mailarchive.ietf.org/arch/msg/webpush/KI9dlGpg1aqoF9buHAhZf6clf0c>
Cc: Ben Bangert <bbangert@mozilla.com>, Costin Manolache <costin@google.com>, "webpush@ietf.org" <webpush@ietf.org>
Subject: Re: [Webpush] Application server authentication new years edition
X-BeenThere: webpush@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Discussion of potential IETF work on a web push protocol <webpush.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/webpush>, <mailto:webpush-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/webpush/>
List-Post: <mailto:webpush@ietf.org>
List-Help: <mailto:webpush-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/webpush>, <mailto:webpush-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Jan 2016 21:57:10 -0000

On 8 January 2016 at 05:59, Costin Manolache <costin@gmail.com> wrote:
> 1. Key identifiers ('kid') - for normal JWT, the key is known from the
> issuer or
> 'sub'. Since in our case we'll have self-generated keys, and we want to
> avoid
> having each key registered with all providers - all that a push service will
> know
> when seeing a JWT token the first time will be the content of the token.
> So we need a way to find the public key needed to verify the content - and
> the only one I know is to use something like the SHA of the public key.
> On subscribe - the provider can store the public key, with the kid as lookup
> key, than
> on send it can verify. For example kid == (SHA1 or SHA256 truncated to
> 64bits) would work.

The push service is going to need the public key, so that means
including a JWK in the message, I think.  Knowing a hash of the public
key isn't enough.

I think that we can avoid using key identifiers.  We could include one
and use that to reference another header field, but it is easier to
say that there is exactly one JWT and exactly one JWK and that one
depends on the other.

> 2. 'aud' field - not sure what would be the right value, maybe the domain of
> the push provider ?

I specified URL at the suggestion of Chris, but I had the same thought
you did.  Maybe we can trim it to origin.  That reduces portability
considerably and also shortens the token somewhat.

> 3. Going back to the 'voluntary'/optional part: I'm not sure if encryption
> is going to be required or
> optional in the final version ?

The protocol won't absolutely require it, though it will strongly
recommend it.  (I'd prefer to require it, but there you have it.)  The
W3C API will require encryption.  Does that make sense?

> 4. I think we can have the sender key optional in the subscribe operation,
> in particular for cases
> like low end IOT - not including it would give permission to anyone with the
> URL and pubkey
> of the device to send messages. There is another case where it helps -
> pairing, in cases of D2D -
> but with restrictions ( either time, or binding the subscription to the
> sender at first use ).
> In other words: I'm not opposed to having 'optional' on the subscribe (and
> on contact info).

I agree.  Making the JWT mandatory on the subscription would introduce
some operational problems for the cases where one endpoint has to be
used by several different application servers too.

> 5. This may be a bit controversial :-), if we require the developers to use
> a JOSE library to
> generate JWT tokens, signed with a ES256 - wouldn't make sense to also allow
> them to use
> the same library to encrypt the payload for the e2e ? There is already a
> content type defined, so easy to
> differentiate.

I don't know of any way to do that without also massively inflating
the size of the payload.  There is a mapping to JWE already in the
encryption draft for those who would prefer to reuse their library.
The tricky part is key derivation, but I think that's largely
unavoidable in this case.