On 02/01/18 19:01, Neil Madden wrote:
> How does authentication address the problem?
Authentication increases the effective entropy. An attacker fist has to
be break the client secret, then successfully guess the token.

Vladimir

>
> Neil
>
>> On 2 Jan 2018, at 15:06, John Bradley <ve7...@ve7jtb.com> wrote:
>>
>> In reality people developers may not always be putting that much entropy 
>> into a token.   It is only a SHOULD and hard to enforce.  I may have come up 
>> with the min entropy number.
>>
>> There may also be side channel attacks if you allow introspection of 
>> encrypted or signed tokens.
>>
>> There is also a potential privacy issue if you return a bunch of PII in the 
>> token response.  If the token leaked it perhaps can’t be used if it isa POP 
>> token but you may still leak PII via introspection.
>>
>> In general I am not a big fan of introspection.  We didn’t include it in 
>> Connect.  However the pattern is used in a number of commercial products to 
>> have the RS introspect tokens at the AS.
>> It was decided by the WG that having a standard would reduce the number of 
>> things people need to support when you have things like a DataPower talking 
>> to Ping Fed or something like that.
>>
>> Given that this is mostly used by RS I think the decision was made to err on 
>> the side of caution, as authentication is not a huge burden.
>> I recall it being discussed and some people didn’t want to do authentication.
>>
>> It is not cut and perhaps in some cases it might not be required, however 
>> that would introduce a option that people may get wrong in implementations.
>>
>> Happy New Year
>> John B.
>>
>>> On Jan 2, 2018, at 9:42 AM, Neil Madden <neil.mad...@forgerock.com> wrote:
>>>
>>> Greetings, and Happy New Year!
>>>
>>> I was just re-reading the OAuth 2.0 token introspection RFC 7662, and I am 
>>> a bit confused by the rationale for requiring client (RS) authentication 
>>> when making calls to this endpoint. The stated rationale in Section 2.1 
>>> (https://tools.ietf.org/html/rfc7662#page-5) is:
>>>
>>> “To prevent token scanning attacks, the endpoint MUST also require
>>>  some form of authorization to access this endpoint, such as client
>>>  authentication as described in OAuth 2.0 [RFC6749] or a separate
>>>  OAuth 2.0 access token such as the bearer token described in OAuth
>>>  2.0 Bearer Token Usage [RFC6750].”
>>>
>>> This rationale is elaborated in the Security Considerations:
>>>
>>> "If left unprotected and un-throttled, the introspection endpoint
>>>  could present a means for an attacker to poll a series of possible
>>>  token values, fishing for a valid token.  To prevent this, the
>>>  authorization server MUST require authentication of protected
>>>  resources that need to access the introspection endpoint and SHOULD
>>>  require protected resources to be specifically authorized to call the
>>>  introspection endpoint.”
>>>
>>> However, RFC 6749 already requires that access tokens be unguessable with a 
>>> probability of successful guesses being at most 2^(-128) 
>>> [https://tools.ietf.org/html/rfc6749#section-10.10]. Assuming that this 
>>> means something like: if an attacker makes 2^n guesses then they have a 
>>> maximum chance of guessing a particular access token of at most 2^(n-128), 
>>> then I think the token scanning attacks are already taken care of aren’t 
>>> they? It is not feasible for an attacker to make that many queries. Even if 
>>> you consider that the attacker only needs to guess one out of the set of 
>>> all valid access tokens, then I still don’t think this attack is feasible 
>>> in any realistic time-frame, especially if you follow the “SHOULD" 
>>> recommendation to require at most 2^(-160) probability.
>>>
>>> Is there some other threat model being considered here? Timing 
>>> side-channels maybe?
>>>
>>> Also, I cannot find a justification in the RFC for how this threat is 
>>> mitigated by requiring authentication. Is the assumption that this is a 
>>> closed ecosystem where malicious parties cannot get valid credentials?
>>>
>>> Kind regards,
>>>
>>> Neil
>>>
>>> --
>>> Neil Madden
>>> Security Director, ForgeRock Engineering.
>>> Email: neil.mad...@forgerock.com     PGP: 90F8 43DF 4EDD AC5D
>>> Bugs/Reports: secur...@forgerock.com PGP: 6D19 AD77 1F43 ADAD
>>>
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to