Re: [OAUTH-WG] New Version Notification for draft-fett-oauth-dpop-03.txt

2019-11-26 Thread Richard Backman, Annabelle
Torsten, I'm not tracking how cookies are relevant to the discussion. I'm guessing that's because we're not on the same page regarding use cases, so allow me to clearly state mine: The use case I am concerned with is requests between services where end-to-end TLS cannot be guaranteed. For exam

Re: [OAUTH-WG] [EXT] Re: WGLC review of draft-ietf-oauth-security-topics-13

2019-11-26 Thread Peck, Michael A
Hi Pedram, I understand why a client would need to allow use of multiple authorization servers if the client needs to access various resource servers each of which may trust different ASs (e.g. the client supports accessing resources at multiple cloud storage services). However, how common is

Re: [OAUTH-WG] WGLC review of draft-ietf-oauth-security-topics-13

2019-11-26 Thread Benjamin Kaduk
Hi Pedram, Thanks for confirming that the scenario is as I was trying to understand it. I don't think it's universal that all clients will give transitive access from the user to the accessed resource, though it's certainly common; the lack of exposition on that point is what I had been stumbling

Re: [OAUTH-WG] Question regarding RFC 8628

2019-11-26 Thread Torsten Lodderstedt
No problem. You are always welcome. > Am 26.11.2019 um 14:07 schrieb Robache Hervé : > > Thanks Torsten, I didn't notice this point in CIBA. > > Sorry about asking a so silly question. > > Hervé > > -Message d'origine- > De : Torsten Lodderstedt [mailto:tors...@lodderstedt.net] > Envo

Re: [OAUTH-WG] WGLC review of draft-ietf-oauth-security-topics-13

2019-11-26 Thread Pedram Hosseyni
Hi Ben, The attacker uses the (honest) client shown in Figure 4 as a regular user. For example, the client might provide access to a cloud storage via its website, i.e., by using the clients' website, a user can access her files stored at the resource server. I'll try to clarify the attack w

Re: [OAUTH-WG] WGLC review of draft-ietf-oauth-security-topics-13

2019-11-26 Thread Benjamin Kaduk
Hi Pedram, On Thu, Nov 21, 2019 at 02:50:52PM +0100, Pedram Hosseyni wrote: > > Also, for this or the next version of this document, the Cuckoo's Token > attack (see Section IV-A of http://arxiv.org/abs/1901.11520/ ), should > be addressed. We also discussed this issue extensively at the last O

Re: [OAUTH-WG] OAuth 2.0 Security Best Current Practice | Issue in Mix-Up Countermeasure

2019-11-26 Thread Daniel Fett
Hi Karsten, Very interesting observation! My gut feeling is that this is the real problem here: Am 26.11.19 um 14:24 schrieb Karsten Meyer zu Selhausen: > Depending on its implementation the client might simply extract all data > contained in the Client Information Response and use it for > auth

[OAUTH-WG] OAuth 2.0 Security Best Current Practice | Issue in Mix-Up Countermeasure

2019-11-26 Thread Karsten Meyer zu Selhausen
Hi, we identified a possible issue regarding the Mix-Up attack countermeasures described in the Security Best Current Practices. Section 4.4.2 of the latest version of the BCP lists "AS-specific redirect URIs" as a countermeasure for Mix-Up attacks. This countermeasure can be bypassed if Dynamic

Re: [OAUTH-WG] Question regarding RFC 8628

2019-11-26 Thread Robache Hervé
Thanks Torsten, I didn't notice this point in CIBA. Sorry about asking a so silly question. Hervé -Message d'origine- De : Torsten Lodderstedt [mailto:tors...@lodderstedt.net] Envoyé : mardi 26 novembre 2019 11:33 À : Robache Hervé Cc : Joseph Heenan; oauth@ietf.org Objet : Re: [OAUTH-WG

Re: [OAUTH-WG] WGLC review of OAuth 2.0 Security Best Current Practice by Mike Jones

2019-11-26 Thread Torsten Lodderstedt
Moving the discussions to an appendix sounds good. > On 26. Nov 2019, at 08:17, Daniel Fett wrote: > > Am 25.11.19 um 23:02 schrieb Torsten Lodderstedt: >> Parts of the text in section 4 capture discussions of potential solutions >> and reasons why we decided in favor of a certain solution. I t

Re: [OAUTH-WG] Question regarding RFC 8628

2019-11-26 Thread Torsten Lodderstedt
Hi Hervé, the flow you outline is equivalent to CIBA (https://openid.net/specs/openid-client-initiated-backchannel-authentication-core-1_0-ID1.html). RFC8628/device grant type and CIBA differ as follows: - RFC8628 provides the client with an URL for the authorisation process - CIBA requires t

Re: [OAUTH-WG] New Version Notification for draft-fett-oauth-dpop-03.txt

2019-11-26 Thread Neil Madden
> On 26 Nov 2019, at 00:10, Richard Backman, Annabelle > wrote: >  > > A client can receive a macaroon and use it like a pure bearer token if they > > want. > In which case it’s not sender constrained, and no different than any other > symmetrically encrypted or HMAC’d bearer token. Yes, that