Hi Daniel,
Rather than answering between the lines, I place a global answer in
front of your message.
Depending upon the content of the JWT, two different collaborative
attacks need to be considered,
one of them being an impersonation attack which can indeed be performed
using Teamviewer.
The other one, i.e. when the JWT does not contain a set of attributes
that is sufficient to identify an individual,
is not and cannot be performed using Teamviewer because it does not deal
with impersonation.
Let us consider a scenario to illustrate this second case.
Alice is Client A while Bob is Client B.
Alice and Bob have both opened an account on a web server allowing to
make reservations on tennis courts managed by the town of Utopia.
Bob is a resident from Utopia, but Alice is not. Residents from Utopia
are allowed to perform tennis courts reservations two weeks in advance
while other people can only perform them 48 hours in advance.
An Attribute Server (AS) managed by the town of Utopia is able to
provide a JWT stating that the holder is indeed a resident of Utopia
(there are about 50.000 residents). The holder can use such a JWT for
different web sites: library, swimming pool, tennis, ... The web servers
trusting the AS from the town of Utopia ask to present such a JWT once a
year which may allow to get some advantages during one year.
Bob has already presented such a JWT at the beginning of the year, thus
he can enjoy making tennis courts reservations two weeks in advance.
Alice is annoyed since most of the time 48 hours ahead, most tennis
courts are already reserved. So she asks Bob whether he would accept
to request a new JWT token stating that the holder is indeed a resident
of Utopia. Let us assume that Bob accepts.
When Alice connects to the server, she also ask Bob to connect to the AS
and to provide her with the JWT and to stay online to perform
all the cryptographic computations she will need to present this JWT to
the tennis courts web server. For doing this, they both use
a specific piece of software developed for this purpose.
When this is done, during one year, Alice will enjoy to make tennis
reservations two weeks in advance. At this end of these 12 months,
she will ask Bob to collaborate again.
In this scenario, unless the AS and the RS collaborate, nobody will know
that Alice and Bob collaborated.
You wrote:
We discussed these kinds of collusion attacks at great length previously
on this list. My views on them have not changed.
You are not saying in this email what your views are. However, I browsed
through the last exchanged emails.
On November 8, 2019, under the thread "WGLC for "OAuth 2.0 Security Best
Current Practice", you wrote:
I have the feeling that this attack aims at breaking a security property
that OAuth does not claim to fulfill (and that nobody expects OAuth to
fulfill):
(...)
And there are good reasons why this is not captured by the
security property (Hans' screenshot, for example).
As far as I know, this property is neither achieved by classical
first-party session-based authentication/authorization nor by any other
web-based mechanism, or is it?
I responded to this email:
*
Re: [OAUTH-WG] WGLC for "OAuth 2.0 Security Best Current Practice"
*Denis <denis.i...@free.fr> Tue, 12 November 2019 09:19 UTC
https://mailarchive.ietf.org/arch/msg/oauth/Gc8T8mRkF5vJT7fV3uSc66B_9Fs/
However, you never responded to it. Up to now, I don't know what "Hans'
screenshot" was and I don't know the "good reasons
why this is not captured by the security property".
On November 13, I sent an email to the list and to Brian:
*
Re: [OAUTH-WG] Fwd: New Version Notification for
draft-fett-oauth-dpop-03.txt
*Denis <denis.i...@free.fr> Wed, 13 November 2019 09:17 UTC
https://mailarchive.ietf.org/arch/msg/oauth/WC8jCC-U3bAhlBHEVRLAdSOuY98/
At the end, I wrote:
DPoP is not able to counter collusion attacks between clients and
this should be clearly advertised in the abstract, in the main
objectives (section 2)
and in the security considerations (section 9).
You have not participated to this thread. However, DPoP is still silent
about this kind of attack.
RFC 3552 (Security Considerations Guidelines) states in its Introduction :
"All RFCs are required by RFC 2223 to contain a Security
Considerations section.The purpose of this is both
to encourage document authors to consider security in their
designs and to _inform the reader of relevant security issues_".
draft-fett-oauth-dpop does not comply with RFC 3552 but it should.
Denis
P.S. It is possible to counter the Alice and Bob collusion attack (ABC
attack) when specific secure elements are being used.
Hi Denis,
We discussed these kinds of collusion attacks at great length
previously on this list. My views on them have not changed.
Am 04.05.20 um 20:06 schrieb Denis:
As soon as a software solution would be available to perform this
collaborative attack, everybody would be able to use it.
Teamviewer is sufficient and widely available.
-Daniel
Denis
Hi all,
as mentioned in the WG interim meeting, there are several ideas
floating around of what DPoP actually does.
In an attempt to clarify this, if have unfolded the use cases that I
see and written them down in the form of attacks that DPoP defends
against:
https://danielfett.github.io/notes/oauth/DPoP%20Attacker%20Model.html
Can you come up with other attacks? Are the attacks shown relevant?
Cheers,
Daniel
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth