Phil Hunt, Hannes Tschofenig

Slides:



Advertisements
Similar presentations
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
Advertisements

Prabath Siriwardena | Johann Nallathamby.
IETF OAuth Proof-of-Possession
1 IETF OAuth Proof-of-Possession Hannes Tschofenig.
Using XACML Policies to Express OAuth Scope Hal Lockhart Oracle June 27, 2013.
Small(er) Footprint for TLS Implementations Hannes Tschofenig Smart Object Security workshop, March 2012, Paris.
Hannes Tschofenig (IETF#79, SAAG, Beijing). Acknowledgements I would like to thank to Pasi Eronen. I am re- using some of his slides in this presentation.
Internet Engineering Task Force Provisioning of Symmetric Keys Working Group Hannes Tschofenig.
ACE – Design Considerations Corinna Schmitt IETF ACE WG meeting July 23,
Key Management in Cryptography
July 16, 2003AAA WG, IETF 571 AAA WG Meeting IETF 57 Vienna, Austria Wednesday, July 16,
OAuth/UMA for ACE 24 th March 2015 draft-maler-ace-oauth-uma-00.txt Eve Maler, Erik Wahlström, Samuel Erdtman, Hannes Tschofenig.
OAuth 2.0 Security IETF OAuth WG Conference Call, 14th December 2012.
Diameter End-to-End Security: Keyed Message Digests, Digital Signatures, and Encryption draft-korhonen-dime-e2e-security-00 Jouni Korhonen, Hannes Tschofenig.
OAuth Security Hannes Tschofenig Derek Atkins. State-of-the-Art Design Team work late 2012/early 2013 Results documented in Appendix 3 (Requirements)
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
CSCI 6962: Server-side Design and Programming
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Workgroup Discussion on RESTful Application Programming Interface (API) Security Transport & Security Standards Workgroup January 12, 2014.
EAP WG EAP Key Management Framework Draft-ietf-eap-keying-03.txt Bernard Aboba Microsoft.
(Preliminary) Gap Analysis Hannes Tschofenig. Goal of this Presentation The IETF has developed a number of security technologies that are applicable to.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
IETF #91 OAuth Meeting Derek Atkins Hannes Tschofenig.
Csci5233 computer security & integrity 1 Cryptography: an overview.
ICOS BOF EAP Applicability Bernard Aboba IETF 62, Minneapolis, MN.
SAML for SIP Hannes Tschofenig, Jon Peterson, James Polk, Douglas Sicker, Marcus Tegnander.
Web Authorization Protocol (oauth) IETF 90, Toronto Chairs: Hannes Tschofenig, Derek Atkins Responsible AD: Kathleen Moriarty Mailing List:
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
Requirements and Selection Process for RADIUS Crypto-Agility December 5, 2007 David B. Nelson IETF 70 Vancouver, BC.
OAuth WG Blaine Cook, Hannes Tschofenig. Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft.
Security Hannes Tschofenig. Goal for this Meeting Use the next 2 hours to determine what the security consideration section of the OAuth draft(s) should.
EAP WG EAP Key Management Framework Draft-ietf-eap-keying-05.txt Bernard Aboba Microsoft IETF 62, Minneapolis, MN.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
IETF Provisioning of Symmetric Keys (keyprov) WG Update WG Chairs: Phillip Hallam-Baker Hannes Tschofenig Presentation by Mingliang Pei 05/05/2008.
Web Authorization Protocol WG Hannes Tschofenig, Derek Atkins.
Dr. Michael B. Jones Identity Standards Architect at Microsoft
Cryptography: an overview
Cryptography: an overview
Open issues with PANA Protocol
RADEXT WG RADIUS Attributes for WLAN Draft-aboba-radext-wlan-00.txt
PANA Discussion and Open Issues (draft-ietf-pana-pana-01.txt)
OAuth WG Conference Call, 11th Jan. 2013
Cryptography and Network Security
J.W. Atwood PIM WG 2010/03/23 The KARP Working Group J.W. Atwood PIM WG 2010/03/23
Computer Communication & Networks
Carrying Location Objects in RADIUS
e-Health Platform End 2 End encryption
Chairs: Derek Atkins and Hannes Tschofenig
ERP extension for EAP Early-authentication Protocol (EEP)
IETF-70 EAP Method Update (EMU)
draft-ietf-geopriv-lbyr-requirements-02 status update
Secure 3-Party Protocol
The Tunneled Extensible Authentication Method (TEAM)
Cryptography and Network Security
OpenID Enhanced Authentication Profile (EAP) Working Group
draft-ipdvb-sec-01.txt ULE Security Requirements
Securing the CASP Protocol
Cryptography: an overview
OAuth Design Team Call 11th February 2013.
Proposal for Extensible Security
Overview of Improvements to Key Holder Protocols
Overview of Improvements to Key Holder Protocols
OpenID Enhanced Authentication Profile (EAP) Working Group
OpenID Enhanced Authentication Profile (EAP) Working Group
Cryptography and Network Security
Authentication and Authorization for Constrained Environments (ACE)
Web Authorization Protocol (OAuth)
OpenID Enhanced Authentication Profile (EAP) Working Group
Presentation transcript:

Phil Hunt, Hannes Tschofenig OAuth Security Phil Hunt, Hannes Tschofenig

Status The charter has a security related item. In the meanwhile we had produced a more comprehensive threats and security requirements document: http://tools.ietf.org/html/draft-tschofenig-oauth-security-00

Security and Privacy Threats List of threats is based on NIST Special Publication 800-63. Token manufacture/modification Token disclosure Token redirect Token reuse Details in Section 3 of http://tools.ietf.org/html/draft-tschofenig-oauth-security-00

Threat Mitigation An important part of the threat mitigation is the protection of the token. This work was done in JOSE, in a separate working group, but originated in the OAuth WG. There are different directions regarding the mitigation of threats. Three broad classes exist: Confidentiality Protection Sender Constraint Key Confirmation RFC 6749 offers a solution to these threats using approach (1). Now, we tackle approach (3).

Security Requirements There are two components that need to be considered: Client<->Authorization Server: Requesting and obtaining keying material and meta-data. Client<->Resource Server: Confirming knowledge of the key

Privacy & Security Requirements, cont. RFC 4962 provides guidance for three party authentication and key exchange protocols. Provides a good starting point. Requirements: Cryptographic Algorithm Independent Strong, fresh session keys Limit Key Scope Replay Detection Mechanism Authenticate All Parties Authorization Keying Material Confidentiality and Integrity

Privacy & Security Requirements, cont. Confirm Cryptographic Algorithm Selection Uniquely Named Keys Prevent the Domino Effect Bind Key to its Context Authorization Restriction Client Identity Confidentiality Resource Owner Identity Confidentiality Collusion AS-to-RS Relationship Anonymity Details are provided in Section 5 of draft-tschofenig-oauth-security-00.txt

Suggested Design Approach Maximum re-use of available OAuth & JSON WG specifications. Develop two alternative solutions based on symmetric as well as asymmetric cryptography. Hard to decide without being able to judge the details. Avoid options as much as possible. Tighten the usage of OAuth 2.0 features. Mandatory client authentication. Mandatory state attribute. Produce running code in parallel to the specification development. Chairs are considering conference calls for faster progress.

Strawman Client asks AS for a Token. Additional information, such as Intended recipient Scope Algorithm indication Authorization Server returns two elements: For Client consumption: Keying material, lifetime, key id, granted scope, and other authorization information relevant for the client. For RS consumption: Access Token (with keying material included). Request and response encoded in JSON and is protected.

Strawman, cont. Client needs to demonstrate possession of a secret to the RS. Creates JSON object including key-id, algorithm information, replay protection information. Access Token also provided RS processes request and may derive keying material for subsequent Client<->RS interaction. TLS channel binding support provided, and can be added.