Re: [OAUTH-WG] Call for adoption - Protected Resource Metadata

2023-08-28 Thread Joseph Heenan
I support adoption. Joseph > On 23 Aug 2023, at 20:01, Rifaat Shekh-Yusef wrote: > > All, > > This is an official call for adoption for the Protected Resource Metadata > draft: > https://datatracker.ietf.org/doc/draft-jones-oauth-resource-metadata/ > > Please, reply on the mailing list and

Re: [OAUTH-WG] Call for adoption - Protected Resource Metadata

2023-08-28 Thread Daniel Fett
+1 Am 28.08.23 um 10:33 schrieb Joseph Heenan: I support adoption. Joseph On 23 Aug 2023, at 20:01, Rifaat Shekh-Yusef wrote: All, This is an official call for adoption for the *Protected Resource Metadata* draft: https://datatracker.ietf.org/doc/draft-jones-oauth-resource-metadata/ P

Re: [OAUTH-WG] Call for adoption - Protected Resource Metadata

2023-08-28 Thread Takahiko Kawasaki
I support adoption. In the past, when considering the encryption of JWT access tokens, I learned that the draft regarding the metadata of the resource server had expired, which was disappointing. For an authorization server to encrypt an access token with an asymmetric algorithm, it must obtain a

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-28 Thread Steinar Noem
I think this is a great discussion, and it seems to me that Yannicks last comment is basically what Phillippe is trying to point out.. I just wanted to remind the authors about a couple of things that we briefly discussed during OSW in London. Although it might not be directly relevant for this di

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-28 Thread Philippe De Ryck
Responses inline. > Still, there is some initial incorrect point that makes the rest of the > discussion complicated, and partly wrong. I believe the key to make the discussion less complicated is to acknowledge that there are two separate issues: 1. An attacker can potentially obtain tokens f

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-28 Thread Jim Manico
*applause* Sucks you need to explain yourself several times but this is very helpful for the community. > On Aug 28, 2023, at 7:52 AM, Philippe De Ryck > wrote: > > Responses inline. > >> Still, there is some initial incorrect point that makes the rest of the >> discussion complicated, and

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-28 Thread Jim Manico
I think, by far, Philippe’s perspective on web security and the threat modeling of BFF vs SPA based implicit flows is accurate and astute. His perspective should be the driving force for any standard in this area. I also think it’s dangerous misinformation to claim that BFF has no security bene

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-28 Thread Yannick Majoros
My last comment was rather ironic: user-facing applications are dangerous (security is hard, which I say nothing with), and that is true for any scheme.. BFFs are not any safer, XSS or any successful malicious javascript execution has the same end effect (=game over, complete compromise of authenti

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-28 Thread Yannick Majoros
Again, there is something fundamentally misunderstood here: Philippe's exploit will not work with a correctly implemented service worker. Also not in an iframe. Also not if you unregister it and you start a new iframe. There is no "need to explain yourself several times" and nobody has "already de

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-28 Thread Yannick Majoros
I think we should discuss facts and demonstrations rather than show and call to authority. I really want a constructive discussion on this. I'm perfectly fine with service workers being seen as an unfit solution, if it's backed by facts and proofs. We've not reached that point. Le lun. 28 août 202

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-28 Thread Aaron Parecki
> BFFs are not any safer, XSS or any successful malicious javascript execution has the same end effect As described in the draft as well as in this email thread, this is incorrect. An XSS compromise of the BFF architecture results in the attacker being able to make requests to the BFF with the le

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-28 Thread Tom Jones
Something is deeply flawed about this thread. Consider that the following quote from Steiner talks about information in the client as though the client were actually the client is the resource owner. But the resource owner should view the client as just another attacker. Somewhere the interest of t

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-28 Thread Yannick Majoros
An XSS compromise would allow an attacker to call the resource server from the browser context through the BFF, which would lead to the same catastrophous result as doing it from another context. Cookies are sent automatically, potentially to resources which shouldn't get it. Same threat level as

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-28 Thread Aaron Parecki
> An XSS compromise would allow an attacker to call the resource server from the browser context through the BFF, which would lead to the same catastrophous result as doing it from another context. There is a huge difference between being able to access resources through the user's browser while i

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-28 Thread Dick Hardt
I agree we should continue to explore service workers — but it does not seem that using them is a best current practice — and on that basis and assuming that is correct, I think the SW approach should be dropped from the document. On Mon, Aug 28, 2023 at 8:31 AM Yannick Majoros wrote: > I think

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-28 Thread Dick Hardt
While a breach of a BFF may be as catastrophic as an exfiltration of an access token, the BFF may also be more secure against a breach. For example, a BFF could detect a possible compromise by the API usage pattern becoming unusual to the app, that a RS is not able to detect as the general usage p

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-28 Thread Yannick Majoros
That's outside of the responsibility of a BFF. That's what web application firewalls are doing, with disputable results. They are another tool that can be used, for any of the described flows btw. Le lun. 28 août 2023, 18:14, Dick Hardt a écrit : > While a breach of a BFF may be as catastrophic

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-28 Thread Philippe De Ryck
> Again, there is something fundamentally misunderstood here: Philippe's > exploit will not work with a correctly implemented service worker. Also not > in an iframe. Also not if you unregister it and you start a new iframe. For someone who is more than eager to demand that we prove them wrong

[OAUTH-WG] Fwd: New Version Notification for draft-gilman-wimse-use-cases-00.txt

2023-08-28 Thread Justin Richer
Hi all, Back at IETF116 in Yokohama, Evan Gilman presented information about SPIFFE, a workload security platform. At IETF 117 in SF, we presented a set of questions and possible new work, to lots of positive feedback. Now we’ve set up the Workload Identity in Multi System Environments (WIMSE)

Re: [OAUTH-WG] Fwd: New Version Notification for draft-gilman-wimse-use-cases-00.txt

2023-08-28 Thread Dick Hardt
Link for WIMSE list https://www.ietf.org/mailman/listinfo/wimse On Mon, Aug 28, 2023 at 11:12 AM Justin Richer wrote: > Hi all, > > Back at IETF116 in Yokohama, Evan Gilman presented information about > SPIFFE, a workload security platform. At IETF 117 in SF, we presented a set > of questions an

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-28 Thread Yannick Majoros
Hello Philippe, Thanks for the new details. This new information let me indeed reproduce the exploit, which seems different from the January one, that I wasn't able to successfully reproduce against my current implementation. *> For someone who is more than eager to demand that we prove them wron

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-28 Thread Yannick Majoros
Hey Aaron, *> There is a huge difference between being able to access resources through the user's browser while it's online vs being able to access resources without the browser's involvement.* While there are operational differences, the end result is compromission of the exposed resources for