[Last-Call] Re: Secdir last call review of draft-ietf-rats-eat-media-type-10

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Tim,

Thanks for reviewing the draft, and for the feedback, much appreciated!

On Fri, 27 Sept 2024 at 22:38, Tim Hollebeek via Datatracker
<noreply@xxxxxxxx> wrote:
> However, I think the security considerations section needs a discussion of what
> happens when the MIME type on the request DOES NOT correspond correctly to the
> URI or OID that's in the payload. Failure to correctly handle that case could
> lead to cross-protocol attacks against other token types, and so on, so I think
> some discussion or advice is necessary, even if it is to simply point out why
> this isn't a concern, or which portion of the document handles this that I
> missed.

At present, the draft lacks that kind of considerations because there
is no extra attack surface that is introduced by these types. Changing
"application/eat+cwt; eat_profile=1.2.3" into "application/eat+cwt;
eat_profile=3.2.1" is not different from changing "application/foo"
into "application/bar".
Media types are just hints to the processing application. The latter
is in charge of checking that the received payload is as expected.
Typically, EAT messages are signed, so they are not malleable.  When
using UCCS, the required guarantees are moved to the outer secure
channel, and those are already excruciatingly detailed in that draft.
So, pointing at the parent documents seemed to us like a sensible
approach.

I have surveyed a few related RFCs to see if/how the argument is
treated (RFC9110, RFC9112, BCP56, RFC7252) but I couldn't find
anything relevant, except in section 8.3 of RFC9110, which has,
related to the risks of confusion arising from using “MIME sniffing”
techniques, the following: “[…] drawing incorrect conclusions about
the data, which might expose the user to additional security risks
(e.g., privilege escalation)”. Should we add something similar?

One thing that your comment about potential cross-protocol risks made
me think of is the fact that in EAT, "A profile can apply to evidence
or to attestation results or both." (last para of Section 6).  But
again this is (cross-protocol) attack surface that is intrinsic in EAT
profiles rather than being enabled by the EAT media types.

cheers, thanks
t

-- 
last-call mailing list -- last-call@xxxxxxxx
To unsubscribe send an email to last-call-leave@xxxxxxxx




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux