Re: [OAUTH-WG] Review of draft-ietf-oauth-pop-architecture

2015-07-21 Thread Phil Hunt
Derek,

Just looking at the issue you mentioned earlier. I think you also wanted to add 
in that a resource server A might be legitimately trying to re-use the token 
with an unintended “audience”, resource server B.  Correct?

If so, here is a possible amendment to the case in 3.1:

Original Text:
Imagine a scenario where a resource server that receives a valid
access token re-uses it with other resource server.  The reason for
re-use may be malicious or may well be legitimate.  In a legitimate
use case consider chaining of computations whereby a resource server
needs to consult other third party resource servers to complete the
requested operation.  In both cases it may be assumed that the scope
of the access token is sufficiently large that it allows such a re-
use.  For example, imagine a case where a company operates email
services as well as picture sharing services and that company had
decided to issue access tokens with a scope that allows access to
both services.
 
With this use case the desire is to prevent such access token re-use.
This also implies that the legitimate use cases require additional
enhancements for request chaining.

Proposed text:
Imagine a scenario where a resource server that receives a valid
   access token re-uses it with another resource server.  The reason for
   re-use may be malicious or may well be legitimate. For example, in a 
legitimate
   use case consider chaining of computations whereby a resource server
   needs to consult another third party resource servers to complete the
   requested operation. In this case, the third-party is not the intended 
audience (target) of 
   the access token issued to the client. In both cases it may be assumed that 
the scope
   of the access token is sufficiently large that it allows such a re-
   use.  For example, imagine a case where a company operates email
   services as well as picture sharing services and that company had
   decided to issue access tokens with a scope that allows access to
   both services.

   With this use case the desire is to prevent such access token re-use and to 
ensure that only the intended client
   and resource servers may wield the token.
   This also implies that the legitimate use cases require additional
   enhancements for request chaining.

Phil

@independentid
www.independentid.com
phil.h...@oracle.com

 On Jul 10, 2015, at 10:48 PM, Derek Atkins de...@ihtfp.com wrote:
 
 Hi,
 
 In performing my shephard review of draft-ietf-oauth-pop-architecture I
 found one issue that was bugging me: you talk about target naming too
 late in the draft.  I.e., as I was reading through section 3.1 about
 token reuse I think it doesn't have enough detail about how you would
 prevent server A asking the client for a token for a resource of server
 B, and then server A acting as the client for server B?  I.e., how do
 you prevent server A acting as a MITM between the client and server B?
 (This is sort of the same question that resulted in TLS channel
 bindings).
 
 I know this target (scope) protection exists, and it's even discussed a
 bit later in the document but it's not even mentioned as a possible
 threat in 3.1, which seems like a glaring ommission.
 
 I'll create a more formal shephard review but I'd suggest some
 additional text to at least mention this threat in 3.1; you can provide
 a pointer to the protections then, too.
 
 -derek
 -- 
   Derek Atkins 617-623-3745
   de...@ihtfp.com www.ihtfp.com
   Computer and Internet Security Consultant
 
 ___
 OAuth mailing list
 OAuth@ietf.org
 https://www.ietf.org/mailman/listinfo/oauth

___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


Re: [OAUTH-WG] Review of draft-ietf-oauth-pop-architecture

2015-07-10 Thread Phil Hunt
Thanks Derek,

I will take a look at this.

Phil

@independentid
www.independentid.com
phil.h...@oracle.com

 On Jul 10, 2015, at 1:48 PM, Derek Atkins de...@ihtfp.com wrote:
 
 Hi,
 
 In performing my shephard review of draft-ietf-oauth-pop-architecture I
 found one issue that was bugging me: you talk about target naming too
 late in the draft.  I.e., as I was reading through section 3.1 about
 token reuse I think it doesn't have enough detail about how you would
 prevent server A asking the client for a token for a resource of server
 B, and then server A acting as the client for server B?  I.e., how do
 you prevent server A acting as a MITM between the client and server B?
 (This is sort of the same question that resulted in TLS channel
 bindings).
 
 I know this target (scope) protection exists, and it's even discussed a
 bit later in the document but it's not even mentioned as a possible
 threat in 3.1, which seems like a glaring ommission.
 
 I'll create a more formal shephard review but I'd suggest some
 additional text to at least mention this threat in 3.1; you can provide
 a pointer to the protections then, too.
 
 -derek
 -- 
   Derek Atkins 617-623-3745
   de...@ihtfp.com www.ihtfp.com
   Computer and Internet Security Consultant
 
 ___
 OAuth mailing list
 OAuth@ietf.org
 https://www.ietf.org/mailman/listinfo/oauth

___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth