Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

RSR user_access_policy_uri: security considerations? #185

Closed
xmlgrrl opened this issue Aug 30, 2015 · 3 comments
Closed

RSR user_access_policy_uri: security considerations? #185

xmlgrrl opened this issue Aug 30, 2015 · 3 comments
Labels
rsrc-reg Related to resource registration (or the original UMA1 resource reg spec) V1.0.1

Comments

@xmlgrrl
Copy link

xmlgrrl commented Aug 30, 2015

We have already noted that the AS should take precautions with URIs supplied by the RS intended for policy-setting interfaces. We actually have one provision in RSR where the URIs go the other way: the user_access_policy_uri property that's optionally on every response to a resource registration request. Shouldn't we mention the same cautions to the RS as to the AS, possibly stressing more forcefully in this case that the host and scheme should really match the known AS?

https://docs.kantarainitiative.org/uma/rec-oauth-resource-reg.html#rfc.section.2.3

@xmlgrrl xmlgrrl added rsrc-reg Related to resource registration (or the original UMA1 resource reg spec) V1.0.1 labels Aug 30, 2015
@xmlgrrl
Copy link
Author

xmlgrrl commented Aug 31, 2015

While we're at it, we may want to take up #86, which considers what risk is entailed by the AS receiving legitimate information from the RS but then maliciously conveying it wrong/changing it in the policy-setting UX for the RO.

@xmlgrrl xmlgrrl added V1.0.1 and removed V1.0.1 labels Sep 5, 2015
@xmlgrrl
Copy link
Author

xmlgrrl commented Sep 8, 2015

In UMA ad hoc telecon 2015-09-08 (which had quorum), this was the discussion and conclusion:

"Should the RS be suspicious of the AS with respect to the user_access_policy_uri? Domenico is thinking that the RS had better trust the AS! If it can’t trust that URI, then it can’t trust the RPTs etc. either, and we’re in real trouble. :-) We’ve already required TLS. But what if the AS has gone rogue in this case?

Maybe we can say something very brief about the fact that the RS must trust the AS for a lot, including this URI. What is the realistic risk? The RS, trying to do something convenient for the RO, could redirect the RO to a page that has malware in it. If the RS were to check that the URI is fully qualified and matches the known AS host and scheme, that would do a ton to mitigate the risk. At least it would be sending the RO to the same AS that it’s been dealing with all this time."

Eve will write up a brief statement to add.

xmlgrrl added a commit that referenced this issue Sep 9, 2015
Keep in mind that RSR doesn’t actually mandate OAuth, so I also
softened some of the wording around this somewhat.
@xmlgrrl
Copy link
Author

xmlgrrl commented Sep 13, 2015

We reviewed the new wording in UMA telecon 2015-09-10 and concluded it suffices.

@xmlgrrl xmlgrrl closed this as completed Sep 13, 2015
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
rsrc-reg Related to resource registration (or the original UMA1 resource reg spec) V1.0.1
Projects
None yet
Development

No branches or pull requests

1 participant