Re: [Ace] Fwd: New Version Notification for draft-ietf-ace-oauth-authz-17.txt and draft-ietf-ace-oauth-params-01.txt

2018-12-13 Thread Stefanie Gerdes
Hi Ludwig, On 12/12/2018 10:47 AM, Ludwig Seitz wrote: > The value of checking the iss field is indeed limited, but if present I > feel it MUST be checked. > > The text does say that the RS must check the integrity of the token (see > 5.8.1.1.) > > "Since the cryptographic wrapper of the token

Re: [Ace] Overwriting Tokens

2018-12-12 Thread Stefanie Gerdes
Hi Ludwig, On 12/12/2018 11:05 AM, Ludwig Seitz wrote: > On 12/12/2018 10:33, Stefanie Gerdes wrote: >> Hi again, >> >> I have one additional comment to ace-oauth-17: >> >> Section 5.8.1 recommends that RS stores only one token per key and that >> existing

Re: [Ace] Security of the Communication Between C and RS

2018-12-18 Thread Stefanie Gerdes
Hi Hannes, On 12/15/2018 04:04 PM, Hannes Tschofenig wrote: > Hi Steffi, > > ~snip~ > > >> I also think that the client must be able to assume that RS' RPK that C >> receives from AS is also valid as long as the token, unless C has additional >> information. > > I would think that it is

Re: [Ace] Security of the Communication Between C and RS

2018-12-18 Thread Stefanie Gerdes
Hi Hannes, On 12/18/2018 02:51 PM, Hannes Tschofenig wrote: > ~snip~ > > > Now that I got a response from the OAuth working group (in the sense that I > was thinking about the claims in the access token rather than the parameters > in the response from the AS) I think checking the expires_in

Re: [Ace] Token (In)Security

2018-12-18 Thread Stefanie Gerdes
Hi Hannes, I think the text is much better now. Protecting the integrity of self-contained tokens is not sufficient, however. The RS must not only ascertain that the token is integrity-protected but also validate its authenticity, i.e., that it stems from an authorized AS. Viele Grüße Steffi

Re: [Ace] Fwd: New Version Notification for draft-ietf-ace-oauth-authz-17.txt and draft-ietf-ace-oauth-params-01.txt

2018-12-12 Thread Stefanie Gerdes
Hi Jim, thank you for your quick response. On 12/11/2018 09:38 PM, Jim Schaad wrote: >> >> C may receive keying material for the communication with RS from AS. >> Unfortunately, the AS does not inform C how long the keying material is > valid. C >> therefore may use outdated keying material for

[Ace] Overwriting Tokens

2018-12-12 Thread Stefanie Gerdes
Hi again, I have one additional comment to ace-oauth-17: Section 5.8.1 recommends that RS stores only one token per key and that existing tokens are overwritten by new tokens. I wonder how the RS knows which token is the most recent. I don't think the expiration time helps in this case because

Re: [Ace] Fwd: New Version Notification for draft-ietf-ace-oauth-authz-17.txt and draft-ietf-ace-oauth-params-01.txt

2018-12-11 Thread Stefanie Gerdes
Hi, I looked through the document again. Many issues have been fixed, but I still have some comments: I still think that Section 5.8.1, in particular 5.8.1.1 should point out that RS must check the integrity of the token und validate that it stems from an authorized AS. Checking the iss field

[Ace] Security of the Communication Between C and RS (was: Re: Fwd: New Version Notification for draft-ietf-ace-oauth-authz-17.txt and draft-ietf-ace-oauth-params-01.txt)

2018-12-14 Thread Stefanie Gerdes
Hi Ludwig, >> >> I am currently only referring to the keying material that AS provides to >> C, i.e., the symmetric key shared between C and RS or, if asymmetric >> keys are used, RS's RPK. Since it is clear to you that symmetric keys >> are only valid as long as the token, you should point that

[Ace] Token (In)Security

2018-12-14 Thread Stefanie Gerdes
Hi all, as I understand the current proposal of the ACE framework, an attacker can send an access token to the RS that only contains a scope and is not signed or otherwise protected. Section 5.8.1.1 (titled verifying an access token) does not state that RS must check the authenticity of the

Re: [Ace] Security of the Communication Between C and RS

2018-12-19 Thread Stefanie Gerdes
Hi Hannes, On 12/18/2018 04:26 PM, Hannes Tschofenig wrote: > Hi Steffi, > >> In OAuth, the expires_in field is usually used to inform the client how long >> the access token is valid. If the client uses the access token in a request >> after the token expired, the RS will reject the request,

Re: [Ace] Security of the Communication Between C and RS

2018-12-19 Thread Stefanie Gerdes
Hi Hannes, On 12/19/2018 12:36 PM, Hannes Tschofenig wrote: > Hi Steffi, > > Are you focused on token expiry or the case where a token + symmetric key has > been leaked? I am talking about the expiry of the keying material for RS that AS provides to C. > > Is the threat you are describing

Re: [Ace] draft-ietf-ace-oauth-authz-35 - unauthorized AS address, DoS, and privacy

2020-09-09 Thread Stefanie Gerdes
Hi John, On 09/09/2020 11:36 AM, John Mattsson wrote: >>> As currently specified in draft-ietf-ace-oauth-authz-35, the RS will >>> happily send the AS address to any node that asks. This causes two >>> problems. >>> >>> - If C acts on the unauthorized information, this is an attack vector >>>

Re: [Ace] draft-ietf-ace-oauth-authz-35 - unauthorized AS address, DoS, and privacy

2020-09-10 Thread Stefanie Gerdes
Hi Ludwig, comments inline. On 09/10/2020 08:49 AM, Seitz Ludwig wrote: > Seeing that the mechanism was introduced to bootstrap a client that doesn't > know which AS to talk to for a specific RS and given the issues raised by > John, what other options do we have that are more secure? The

Re: [Ace] draft-ietf-ace-oauth-authz-35 - unauthorized AS address, DoS, and privacy

2020-09-10 Thread Stefanie Gerdes
Hi Jim, comments inline. On 09/10/2020 12:11 AM, Jim Schaad wrote: > A compromised RS may use the hints for attempting to trick a client into > contacting an AS that is not supposed to be in charge of that RS. > Therefore, C must not communicate with an AS if it cannot determine that this >

Re: [Ace] AS discovery in draft-ietf-ace-oauth-authz-35

2020-09-08 Thread Stefanie Gerdes
n error message would be > if the error message contained something like sign(AS, RS), but this is > something that is not discussed in the draft. > > Cheers, > John > > ___ > Ace mailing list > Ace@ietf.org > https

Re: [Ace] AS discovery in draft-ietf-ace-oauth-authz-35

2020-09-07 Thread Stefanie Gerdes
Hi John, On 09/07/2020 12:45 PM, John Mattsson wrote: > > The mechanism is not presented as an error message when the client in good > faith tries to access a resource. It is presented as something C do > intentionally to dicsover the AS. In the description in the draft, C is > clearly aware

Re: [Ace] draft-ietf-ace-oauth-authz-35 - unauthorized AS address, DoS, and privacy

2020-09-10 Thread Stefanie Gerdes
Hi all, On 09/10/2020 02:10 PM, Stefanie Gerdes wrote: > We also should decouple the AS request creation hints from the > explanation of the AS discovery mechanism. The hints have the additional > purpose that they may contain the resource server's cnonce that the > resource server c

Re: [Ace] 4.01 Get A Token From There, discovery-/form-driven applications and tokens opaque to the client

2020-07-13 Thread Stefanie Gerdes
Hi Christian, On 07/13/2020 05:12 PM, Christian Amsüss wrote: > > * A malicious attacker intercepts the discovery process, and tells C > that there is an RD at > `;rt=core.rd` > (which is a perfectly legitimate service we're running there for > commercial purposes; its interface is that

Re: [Ace] Lars Eggert's No Objection on draft-ietf-ace-dtls-authorize-16: (with COMMENT)

2021-05-11 Thread Stefanie Gerdes
Hi Lars, Thank you for your detailed comments, and sorry for the late reply. We addressed the issues as suggested. Sorry for the late reply. Thank you for your time, Steffi On 3/24/21 6:56 PM, Lars Eggert via Datatracker wrote: > Lars Eggert has entered the following ballot position for >

Re: [Ace] Roman Danyliw's Discuss on draft-ietf-ace-dtls-authorize-16: (with DISCUSS and COMMENT)

2021-05-11 Thread Stefanie Gerdes
Hi Roman, Thank you for your detailed comments. We addressed most of your comments in the latest version. Please find my comments inline. On 3/23/21 4:32 AM, Roman Danyliw via Datatracker wrote: > > -- > DISCUSS: >

Re: [Ace] Francesca Palombini's Yes on draft-ietf-ace-dtls-authorize-16: (with COMMENT)

2021-05-11 Thread Stefanie Gerdes
Hi Francesca, Thank you for your detailed comments, and sorry for the late reply. We addressed most of your comments in the latest version. Please find my comments inline. On 3/24/21 4:49 PM, Francesca Palombini via Datatracker wrote: > >

Re: [Ace] Murray Kucherawy's No Objection on draft-ietf-ace-dtls-authorize-16: (with COMMENT)

2021-05-11 Thread Stefanie Gerdes
Hi Murray, Thank you for your comments, and sorry for the late reply. We addressed most of the issues in the latest version, but I have one comment (see below). On 3/25/21 5:28 AM, Murray Kucherawy via Datatracker wrote: > Murray Kucherawy has entered the following ballot position for >

Re: [Ace] [Russ Mundy] Re: secdir review of draft-ietf-ace-dtls-authorize-14

2021-02-11 Thread Stefanie Gerdes
On 02/11/2021 04:26 AM, Daniel Migault wrote: > > OLD: section 6.2 > "Profiles MUST specify how communication security according >to the requirements in Section 5 is provided." > NEW: > section 6.2 is focused on security but the security requirements are > provided in section 5. We may

Re: [Ace] secdir review of draft-ietf-ace-dtls-authorize-14

2021-02-16 Thread Stefanie Gerdes
Hi, I propose that we use the following text for the ACE framework (as originally proposed by Göran): Section 6.2: OLD "Profiles MUST specify how communication security according to the requirements in Section 5 is provided." NEW "The requirements for communication security of profiles are

Re: [Ace] secdir review of draft-ietf-ace-dtls-authorize-14

2021-02-17 Thread Stefanie Gerdes
Hi Daniel, On 02/16/2021 04:53 PM, Daniel Migault wrote: > Section 5: > OLD > "Profiles MUST specify a communication security protocol that provides >the features required above." > NEW > "Profiles MUST specify at least one communication security protocol that > provides the features