Re: [OAUTH-WG] BCP: Client collaborative attacks

2020-10-28 Thread Manger, James
>> When using secure elements with specific properties, it is possible to >> counter the Alice & Bob Collusion attack. You don’t just need the Secure Element’s properties (key-pair generated on SE; non-exportable private key; high-entropy key-id generated on SE; conformance cert; special APDUs)

Re: [OAUTH-WG] BCP: Client collaborative attacks

2020-10-27 Thread Denis
Hi Daniel, OK. The good news is that the BCP document will now address this issue. Let us wait to see which text you will propose. Yesterday, I wrote: "Since OAuth 2.0 does not mandate the use of cryptographic devices, this kind of attack cannot be countered in the general case". James Man

Re: [OAUTH-WG] BCP: Client collaborative attacks

2020-10-27 Thread Daniel Fett
Thanks Neil, this very much sums up my thoughts on this topic. Since this has been mentioned in yesterday's call, I'll be happy to clarify in the attacker model that web attackers can collaborate to reach a common goal. I think we can also mention that sender-constraining does not prevent collabor

Re: [OAUTH-WG] BCP: Client collaborative attacks

2020-10-27 Thread Seán Kelleher
@James > While this text from Seán may be true, it is bad advice. It implies we > should make access tokens as dangerous as possible (conveying all a > person’s authority) just to discourage sharing. > Is this implied because storing IDs with access logs means that ATs necessarily carry user ID

Re: [OAUTH-WG] BCP: Client collaborative attacks

2020-10-26 Thread Neil Madden
It sounds like we’re trying to redefine cooperation/delegation as an “attack”. People delegate and you can’t generally prevent it without incarceration. Anything Bob could do with Alice’s access token he could also do by asking Alice to do it on his behalf. In other words, any credential/token s

Re: [OAUTH-WG] BCP: Client collaborative attacks

2020-10-26 Thread Manger, James
It is worth mentioning “client collaborative attacks” or “authorization sharing attacks” because OAuth can make them easier (by packaging authority into an access token), compared to the alternative of user’s signing-in to an RS directly. But it is tricky to describe; none of the suggestions are

Re: [OAUTH-WG] BCP: Client collaborative attacks

2020-10-26 Thread Aaron Parecki
Thank you Seán, this is an excellent analysis and makes this attack much easier to understand. I completely agree with your rewritten text, both that it better describes the situation as well as the conclusion that it ends up being a bit too general for the BCP. --- Aaron Parecki https://aaronpare

Re: [OAUTH-WG] BCP: Client collaborative attacks

2020-10-26 Thread Seán Kelleher
I hadn't come across this idea before, it's an interesting angle and for me it's a nice new example to help highlight the difference between authZ and authN. It reminds me of sharing access cards to get into computer labs in college. Some thoughts: - It took me a while to figure out the agent,

[OAUTH-WG] BCP: Client collaborative attacks

2020-10-26 Thread Denis
Hi Daniel, Following the conversation we had today, hereafter is a proposal for addressing client collaborative attacks. I propose to add a new section 4.16. 4.16 Client collaborative attacks Two clients may agree to collaborate. In such a situation, one client transmits to another client a