PKCE256 becomes mandatory in that case. PKCE plain is prone to same attack as that of state or none.
Â
Also PKCE256 should generate new code challenge for every Authorization request.
Â
-Vivek Biswas
Consulting ***@Security
Oracle.
Â
From: ***@ve7jtb.com [mailto:***@ve7jtb.com]
Sent: Wednesday, July 27, 2016 5:53 AM
To: nov matake; ***@lodderstedt.net
Cc: ***@ietf.org WG
Subject: Re: [OAUTH-WG] URGENT: WPAD attack exposes URL contents evenoverHTTPS
Â
With the mix up attack we assumed that the attacker is able to modify the request.  In that case checking nonce in the code flow is not sufficient as the attacker can modify nonce.
Â
In this attack the attacker as I understand it can only view request and response, so checking nonce in code will prevent the paste of the code.  Unfortunately (Torsten) checking nonce in the code flow is optional.
Â
What IÂ donât know is if there is a variation of the attack where the client uses the attackers proxy and the attacker can modify the request.
Â
One other mitigation is to use the Connect post response mode. That would stop the code leak as long as the client is not going through the proxy.
Â
Post response mode to stop referrer leaking etc is looking like a good idea in general.
Â
PKCE S256 still seems like the best idea. However if a browser is using a malicious proxy that could also probably be circumvented.
Basically in that situation the attacker has access to cookies etc so OAuth may not be the largest problem.
Â
John B.
Â
Â
Sent from HYPERLINK "https://go.microsoft.com/fwlink/?LinkId=550986"Mail for Windows 10
Â
From: HYPERLINK "mailto:***@gmail.com"nov matake
Sent: July 27, 2016 3:19 AM
To: HYPERLINK "mailto:***@lodderstedt.net"***@lodderstedt.net
Cc: HYPERLINK "mailto:***@google.com"William Denniss; HYPERLINK "mailto:***@ve7jtb.com"John Bradley; HYPERLINK "mailto:***@ietf.org"***@ietf.org WG
Subject: Re: [OAUTH-WG] URGENT: WPAD attack exposes URL contents evenoverHTTPS
Â
In Connect, if RP verifies nonce value in ID Token issued from Token Endpoint, code cut & paste attack can be mitigated in "code" flow, not in "code id_token", can't it?
Â
In pure OAuth2 senario, I also think PKCE would be the simplest solution.
Â
2016-07-27 15:45 GMT+09:00 HYPERLINK "mailto:***@lodderstedt.net"***@lodderstedt.net <HYPERLINK "mailto:***@lodderstedt.net"***@lodderstedt.net>:
+1
I also think PKCE is currently the simplest way to protect OAuth clients from injection.
Sent by HYPERLINK "http://www.mail-wise.com/installation/2"MailWise â See your emails as clean, short chats.
-------- Originalnachricht --------
Betreff: Re: [OAUTH-WG] URGENT: WPAD attack exposes URL contents even overHTTPS
Von: William Denniss <HYPERLINK "mailto:***@google.com"***@google.com>
An: John Bradley <HYPERLINK "mailto:***@ve7jtb.com"***@ve7jtb.com>
Cc: Oauth Wrap Wg <HYPERLINK "mailto:***@ietf.org"***@ietf.org>
Â
PKCE S256 was indeed designed to protect against eavesdropping of both the authorization request & response. It was originally created for native apps where URL leakage was deemed more likely (since it goes over inter-process communication channels), perhaps the practice should be expanded to all clients.
Â
On Tue, Jul 26, 2016 at 6:11 PM, <HYPERLINK "mailto:***@ve7jtb.com"***@ve7jtb.com> wrote:
PS  Using PKCE S256 would prevent this attack on web server clients, as long as the client uses a different PKCE vale for each request.   Even if the attacker can observe both the request and response, they would not have the code_verifyer and if replaying the code to the client the client will use the wrong verifier value to exchange the code and will get an error.
Â
That is probably the simplest mitigation against this for the code flow on web servers and native apps.
Â
I will think about it overnight.
Â
John B.
Â
Sent from HYPERLINK "https://go.microsoft.com/fwlink/?LinkId=550986"Mail for Windows 10
Â
From: HYPERLINK "mailto:***@ve7jtb.com"***@ve7jtb.com
Sent: July 26, 2016 9:04 PM
To: HYPERLINK "mailto:***@gmail.com"Dick Hardt; HYPERLINK "mailto:***@ietf.org"Oauth Wrap Wg
Subject: RE: [OAUTH-WG] URGENT: WPAD attack exposes URL contents even overHTTPS
Â
I need to think about it a bit, however off the top of my head based on the attack described the code flow should still be safe if the code is truly single use.  (Some implementations fudge that)
Â
If the attacker can stop the browser from delivering the code to the client then the client would be susceptible to the cut and paste attack for injecting the code back into the client.Â
Â
The OpenID Connect âcode id_tokenâ flow is not vulnerable to this if the client is properly validating the id_token.
Â
I suspect that this would work against the implicit flow if the JS is sending the code back to its web server via a GET.Â
That I think we recommend against doing, or should.
Â
The Token binding proposals would stop a leaked code from being used, but not from being stolen in this attack.
Â
The attack against a confidential client would be the cut and paste one that we have identified. Currently the only mitigation we have is âcode id_tokenâ so the blog post at.
http://openid.net/2016/07/16/preventing-mix-up-attacks-with-openid-connect/
Â
I the most relevant current advice.
The thing to add is that the code leaked in this way should not be repayable at the client
Â
I donât think that native apps are vulnerable to this if they are using custom scheme redirects.Â
Â
I donât know what the risk is if they are using loopback or claimed URI. It may be that a browser might leak them in the same way.
That would need to be tested.
Â
John B.
Â
Â
Sent from HYPERLINK "https://go.microsoft.com/fwlink/?LinkId=550986"Mail for Windows 10
Â
From: HYPERLINK "mailto:***@gmail.com"Dick Hardt
Sent: July 26, 2016 8:15 PM
To: HYPERLINK "mailto:***@ietf.org"Oauth Wrap Wg
Subject: [OAUTH-WG] URGENT: WPAD attack exposes URL contents even over HTTPS
Â
http://arstechnica.com/security/2016/07/new-attack-that-cripples-https-crypto-works-on-macs-windows-and-linux/
Â
Access tokens included as a URL query parameter when accessing a resource are susceptible to this attack.
Â
Authorization codes are also visible. From what I know, we have not depended on the confidentiality of the authorization code.Â
Â
What are the best current practices that we can point people towards to ensure they are not susceptible to this attack?
Â
-- DickÂ
Subscribe to the HYPERLINK "http://hardtware.com/"HARDTWARE mail list to learn about projects I am working on!
Â
Â
_______________________________________________
OAuth mailing list
HYPERLINK "mailto:***@ietf.org"***@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
Â
_______________________________________________
OAuth mailing list
HYPERLINK "mailto:***@ietf.org"***@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
Â
--
nov matake
Â