[OAUTH-WG] Section 10.3 client advice inapplicable?

2012-02-19 Thread Andrew Arnott
From draft 23, section 10.3:

The client SHOULD request access tokens with the minimal scope and
lifetimenecessary. The authorization server SHOULD take the client
identity into
account when choosing how to honor the requested scope and lifetime, and
MAY issue an access token with a less rights than requested.

I can't find the part in the spec where the client can request access
tokens in such a way as to influence the lifetime.  Why is the client then
being advised in the above section to minimize the lifetime of the access
tokens it asks for?

--
Andrew Arnott
I [may] not agree with what you have to say, but I'll defend to the death
your right to say it. - S. G. Tallentyre
___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


Re: [OAUTH-WG] Section 10.3 client advice inapplicable?

2012-02-19 Thread John Bradley
There is nothing explicit in draft 23 about requesting a scope lifetime.   It 
is as they say fuzzy.

You know that some people have used additional scopes like offline_access to 
request longer lifetimes.

It may be reasonable to preconfigure something at the tAuthorization server 
based on client_id,  but there is also the question of how to present the 
options to the user in an understandable way.

Fortunately or unfortunately this has been punted to the specs using OAuth to 
define.

How to deal with this question for openID Connect is on the agenda for our F2F 
in San Francisco on Mar 2.

John B. 
On 2012-02-19, at 12:08 PM, Andrew Arnott wrote:

 From draft 23, section 10.3:
 The client SHOULD request access tokens with the minimal scope and lifetime 
 necessary. The authorization server SHOULD take the client identity into 
 account when choosing how to honor the requested scope and lifetime, and MAY 
 issue an access token with a less rights than requested.
 
 
 I can't find the part in the spec where the client can request access tokens 
 in such a way as to influence the lifetime.  Why is the client then being 
 advised in the above section to minimize the lifetime of the access tokens it 
 asks for?
 
 --
 Andrew Arnott
 I [may] not agree with what you have to say, but I'll defend to the death 
 your right to say it. - S. G. Tallentyre
 ___
 OAuth mailing list
 OAuth@ietf.org
 https://www.ietf.org/mailman/listinfo/oauth



smime.p7s
Description: S/MIME cryptographic signature
___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


[OAUTH-WG] How an AS can validate the state parameter?

2012-02-19 Thread Andrew Arnott
From section 10.14: (draft 23)

 The Authorization server and client MUST validate and sanitize any value
 received, and in particular, the value of the state and redirect_uri
  parameters.


Elsewhere in the spec the AS is instructed to exactly preserve the state
and to consider it an opaque value.  How then, can an AS validate and
sanitize the state parameter?

--
Andrew Arnott
I [may] not agree with what you have to say, but I'll defend to the death
your right to say it. - S. G. Tallentyre
___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


[OAUTH-WG] I-D Action: draft-ietf-oauth-v2-threatmodel-02.txt

2012-02-19 Thread internet-drafts

A New Internet-Draft is available from the on-line Internet-Drafts directories. 
This draft is a work item of the Web Authorization Protocol Working Group of 
the IETF.

Title   : OAuth 2.0 Threat Model and Security Considerations
Author(s)   : Torsten Lodderstedt
  Mark McGloin
  Phil Hunt
Filename: draft-ietf-oauth-v2-threatmodel-02.txt
Pages   : 65
Date: 2012-02-19

   This document gives security considerations based on a comprehensive
   threat model for the OAuth 2.0 Protocol.



A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-oauth-v2-threatmodel-02.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

This Internet-Draft can be retrieved at:
ftp://ftp.ietf.org/internet-drafts/draft-ietf-oauth-v2-threatmodel-02.txt

___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


Re: [OAUTH-WG] [apps-discuss] Apps Area review of draft-ietf-oauth-v2-threatmodel-01

2012-02-19 Thread Torsten Lodderstedt

Hi Tim,

I just submitted the revised version of the OAuth 2.0 security document 
(http://tools.ietf.org/html/draft-ietf-oauth-v2-threatmodel-02). This 
revision should address the issues you raised in your AppsDir review. We 
especially removed all normative language from the document.


We took the liberty to leave the back references in Section 5. We 
consider this back references to section 4 a valuable information for 
implementors since they justify the particular countermeasure. All to 
often security considerations are given without the corresponding 
rationales. And without a justification, the unconvinced implementor 
may tend to ignore or underestimate the respective controls.


regards,
Torsten.

Am 23.01.2012 22:47, schrieb S Moonesamy:
The following is the AppsDir review performed by Tim Bray.  It would 
be appreciated if a reply is sent to Tim Bray with a copy to the 
apps-discuss mailing list.


I have been selected as the Applications Area Directorate reviewer for
this draft (for background on appsdir, please see
http://trac.tools.ietf.org/area/app/trac/wiki/ApplicationsAreaDirectorate). 



Please resolve these comments along with any other Last Call comments
you may receive. Please wait for direction from your document shepherd
or AD before posting a new version of the draft.

Document: draft-ietf-oauth-v2-threatmodel-01
Title:  OAuth 2.0 Threat Model and Security Considerations
Reviewer: Tim Bray
Review Date:  Jan 23, 2012

Summary: This needs some more editorial work, but is basically sound.
It's not clear, though, whether it wants to be an Informational RFC or
not; the use of RFC2119 language needs special attention.  I think a
few of the minor issues are worthy of a little bit more work in
another draft.

Major Issues:

The use of 2119 MUST/SHOULD/etc doesn't seem fully thought through.  I
normally wouldn't expect a threat model to include normative text.
The basic idea would be to say Here is an enumeration of the threats,
and here are the tools available to OAUTH2 implementors to meet them.
 I was impressed by the enumeration, which seemed very complete and
well thought through. But the usage of 2119, which makes statements
normative, seems inconsistent.  I can think of 2 ways to address this:

1. Remove all the 2119 words, so this document isn't normative, and
publish it as an Informational RFC
2. Go through and clean up the 2119 language so it's used
consistently; then this becomes a normative document.

This is going to affect the references to this document from other
I-Ds in the OAuth suite, which are currently in last call.

Here are all the section-numbered notes enumerating my issues around
2119, as I encountered them:

Section 2.3, I'm a little confused about the use of RFC2119 MAY in a
threat analysis.  When you say The following data elements MAY be
stored or accessible..., Is this saying that The OAuth2 RFC says
that the following data elements MAY be... or is it saying something
else. I don't think there's anything seriously wrong here, but a bit
more explanation might be in order.  I note a comparative absence of
2119-ese in section 5 describing countermeasures, where one would
expect to find it.
Also in 4.3.1, first bullet point, there's Authorization servers 
MUST...

Also in: 4.4.1.1, 4.4.1.6, 4.4.1.12, 4.6.*, 5.1.4.1.5, 5.1.5.11
Related: SHALL?! in 4.6.3
Adding to the concern, there is use of lower-case must; note 2nd 
3rd bullet points in 4.4.3, which use MUST and must respectively.

Minor Issues:

4.1.2 first attack: It says An attack may obtain the refresh tokens
issued to a web server client. This needs to be clearer... a Web
server client can be a browser or a native app.  Do you mean, the
refresh tokens issued by the web server to multiple clients?

4.1.2 last attack.  In the case where a device is cloned, wouldn't
Utilize device lock to prevent unauthorized device access still be a
countermeasure?  In many devices, such cloning would carry along the
user's device-lock settings.

4.4.1.4 2nd bullet.  The explanation of why this wouldn't work for
native clients wasn't comprehensible to me.  I'm suspicious of any
such claims because I can emulate most things a browser can do in a
mobile client.  Perhaps this would be obvious to someone who is an
OAuth2 implementor.

4.4.1.9 I think where it says iFrame it might mean WebView, i.e. a
Web Browser control embedded in the native app.  If that's not what it
means, I don't understand what it's saying.  If this is true, then the
second bullet point is probably wrong.

4.6.6 1st bullet.  I'm not convinced that the Cache-Control header
will *ensure* that a client protects information properly.  Should say
something like minimize the risk that authenticated content is not
protected

5.* The enumeration, for some but not all of the countermeasures in
this section, of the threats against which this is a countermeasure,
reduces readability and, unless it's generated automatically from the
underlying source, is redundant