Skip to main content

Minutes for TOKBIND at IETF-94
minutes-94-tokbind-1

Meeting Minutes Token Binding (tokbind) WG
Date and time 2015-11-02 08:10
Title Minutes for TOKBIND at IETF-94
State Active
Other versions plain text
Last updated 2015-11-13

minutes-94-tokbind-1
Meeting begins at 17:13

Token binding over HTTPS (Vinod)
Some pushback against doing a recap
Showing federation use-case
Since last time:

    Changed header name from Sec-Token-Binding to Token-Binding

    Prove key possision by signing EKM

    updated secuirty considerations

Questions about threats:

    victim's private key should not only be kept secret, but also protected
    from signing arbitrary attacker-controlled data.

    EKR: why does EKM need to be secret.

    EKR: if EKM is leaked, attacker can impose their own sec header.

    MThomson: if we know about the header we can make ...

    EKR: sec header by default makes it impossible to inject. What is the
    argument for not using a sec header

Chairs: ready for LC?
MThomson: things come up in this area that may be interesting (duplicate
signatures).

    I wonder whether is someone considered doing a formal analysis of this
    protocol.

    Not sure we don't have something like this, especially in the federated
    case.

Andrei Popov: going to enable it in Microsoft browser. Will be interesting to
see how it fares in the wild. Chairs: list is quiet. That there are
implementations is good. Andrei: yes. Also want early allocation - could help.

EKR: would be more antsy if this was primary authentication.
Andrei: yes, this is for secondary.
MThomson: not prepared to do this in the clear.

Andrei Popv presenting on changes in token binding and negotiation drafts
(17:42) Using TLS extractors instead of tls_unique ekr: what appears in the
digestinfo in pkcs#1.5. What algorithm identifier (OID) EKR: one more point:
kind of trivial: why does the client order by preference but the server picks
whatever they want. Andrei: server may or may not respect the client's order.

EKR: looks very solid. exporters should be enough as personalization string.

folunteering to review and post on the list: Tony, Yoav, EKR and Tony.  This is
the protocol document.

Nothing on open mic.