FWIW, this was raised before in 2011.

http://www.ietf.org/mail-archive/web/oauth/current/msg06073.html
http://www.ietf.org/mail-archive/web/oauth/current/msg06079.html

Phil

@independentid
www.independentid.com
phil.h...@oracle.com







On 2013-09-02, at 3:44 PM, John Bradley <ve7...@ve7jtb.com> wrote:

> AS that don't maintain state would need to encode everything into code.   I 
> have seen a couple of implementations  do that.  The encoding tends to be 
> custom for size reasons.
> Many AS maintain server state for code as it also has grants, redirect_uri, 
> client_id, subject etc that need to be tracked.
> 
> The point being that the value of "tcsh" not be made available to someone who 
> intercepts code on the return.
> 
> This method is being used without hashing, and just sending "tcs" however 
> that clearly has no resistance if the authorization request can somehow be 
> intercepted by an attacker as well.
> 
> In order to stick to well understood crypto I argued that "tcsh" be a hmac of 
> the client_id using tcs as the key.    I also think calling it a client 
> secret is misleading as it is a proof for the code requester not the client.
> 
> This is intended as a early draft to document the security problem on iOS and 
> one possible mitigation that people are using.
> 
> While interoperable OAuth clients like Connect may be a edge case to some, it 
> is desirable to have a solution to this that can work with multiple AS rather 
> than the client requiring custom code to talk to every AS.
> 
> John B.
> 
> 
> On 2013-09-02, at 2:14 PM, Prateek Mishra <prateek.mis...@oracle.com> wrote:
> 
>> Nat - is there cryptanalysis of the proposed model available anyplace?
>> 
>> Extending protocols by throwing in a smidgen of hashing and a tablespoon of 
>> encryption is often a bad idea. One of the strengths of RFC 6749 is that it 
>> avoids stuff like that.
>> 
>> What do you mean when you say - 
>> 
>> [quote]
>> The server MUST NOT include the "tcsh" value in the form that any entity but 
>> itself can extract it.
>> [\quote]
>> 
>> Is this even theoretically achievable without a stateful server that 
>> maintains a table of [code x tcsh] pairs? 
>> 
>> If not, how should the server embed tcsh in "code" and what constructions 
>> are recommended?
>> 
>> - prateek
>> 
>>> As some of you know, passing the authorization code securely to a native 
>>> app on iOS platform is next to impossible. Malicious application may 
>>> register the same custom scheme as the victim application and hope to 
>>> obtain the code, whose success rate is rather high. 
>>> 
>>> We have discussed about it during the OpenID Conenct Meeting at IETF 87 on 
>>> Sunday, and over a lengthy thread on the OpenID AB/Connect work group list. 
>>> I have captured the discussion in the form of I-D. It is pretty short and 
>>> hopefully easy to read. 
>>> 
>>> IMHO, although it came up as an issue in OpenID Connect, this is a quite 
>>> useful extension to OAuth 2.0 in general. 
>>> 
>>> Best, 
>>> 
>>> Nat Sakimura
>>> 
>>> ---------- Forwarded message ----------
>>> From: <internet-dra...@ietf.org>
>>> Date: 2013/7/30
>>> Subject: New Version Notification for draft-sakimura-oauth-tcse-00.txt
>>> To: Nat Sakimura <sakim...@gmail.com>, John Bradley 
>>> <jbrad...@pingidentity.com>, Naveen Agarwal <n...@google.com>
>>> 
>>> 
>>> 
>>> A new version of I-D, draft-sakimura-oauth-tcse-00.txt
>>> has been successfully submitted by Nat Sakimura and posted to the
>>> IETF repository.
>>> 
>>> Filename:        draft-sakimura-oauth-tcse
>>> Revision:        00
>>> Title:           OAuth Transient Client Secret Extension for Public Clients
>>> Creation date:   2013-07-29
>>> Group:           Individual Submission
>>> Number of pages: 7
>>> URL:             
>>> http://www.ietf.org/internet-drafts/draft-sakimura-oauth-tcse-00.txt
>>> Status:          http://datatracker.ietf.org/doc/draft-sakimura-oauth-tcse
>>> Htmlized:        http://tools.ietf.org/html/draft-sakimura-oauth-tcse-00
>>> 
>>> 
>>> Abstract:
>>>    The OAuth 2.0 public client utilizing code flow is susceptible to the
>>>    code interception attack.  This specification describe a mechanism
>>>    that acts as a control against this threat.
>>> 
>>> 
>>> 
>>> 
>>> 
>>> Please note that it may take a couple of minutes from the time of submission
>>> until the htmlized version and diff are available at tools.ietf.org.
>>> 
>>> The IETF Secretariat
>>> 
>>> 
>>> 
>>> 
>>> -- 
>>> Nat Sakimura (=nat)
>>> Chairman, OpenID Foundation
>>> http://nat.sakimura.org/
>>> @_nat_en
>>> 
>>> 
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to