Skip to content

Possible identity assertion reuse across origins #65

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
murillo128 opened this issue Mar 27, 2018 · 1 comment
Closed

Possible identity assertion reuse across origins #65

murillo128 opened this issue Mar 27, 2018 · 1 comment

Comments

@murillo128
Copy link

As described in the (mailing list discussion)[https://mailarchive.ietf.org/arch/search/?email_list=rtcweb&gbt=1&index=bHtRzwKfRoI7bHr2eV1V7r0Ul_s#]

As the RTCCertificates are allowed to be stored or transferred across domains via postMessage it could allow a potential attacker to reuse a past identity assertion when it is no longer valid.

A possible solution would to generate an unique dtls external session Id per peerconnection as described in https://tools.ietf.org/html/draft-ietf-mmusic-sdp-uks-01 and provide that information to the generate and validate assertion js methods.

@seanturner
Copy link
Contributor

I think where this conversation ended up, based on Harald's email:
https://mailarchive.ietf.org/arch/msg/rtcweb/B3_DMaMUFNdDeLsmWvx9ZEntR3k

Means that the security arch draft needs to say that the security architecture depends on the keying material not being available to move between origins, but that we understand and assume that the identity token can be passed to anyone that the page cares to.

And, Martin also added this PR to the WebRTC spec:
Also w3c/webrtc-pc#1870

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants