[+ OAuth WG as this touches their core specs]

Thanks Jonathan and Pat for putting that forward.

Here are some comments / questions / suggestions:


  *   The use cases are very clear and are very good thought experiments to 
rubberstamp / challenge the models of delegated authorization we have build so 
far



  *   Unfortunately, the proposition seems to point towards a glorified 
Knowledge Based Authentication (KBA) as it will use PII validation to 
authenticate  as a form of "password" in a glorified Resource Owner Password 
Grant type flow as the request is only dealing with the Token endpoint... the 
problems are:
     *   Knowledge Based Authentication is highly insecure cause anyone that 
knowing this static information can impersonate someone else
     *   It is based on PII which are Identifiers and not Authentication 
factors, therefore can only allow to identify someone. On top of that, PII leak 
constantly and are no longer considered secure
        *   Also what would prevent the AI agent to fetch those information 
from the internet on behalf od the user as you noted into section 3.1. 
<https://datatracker.ietf.org/doc/html/draft-rosenberg-oauth-aauth#section-3.1> 
Basic Token 
Flow<https://datatracker.ietf.org/doc/html/draft-rosenberg-oauth-aauth#name-basic-token-flow>

By altering the required set of PII elements, designers of AI Agents can 
control the likelihood of hallucination (or malicious prompt injection attacks) 
resulting in a token issuance for the wrong user. The selection of the 
information becomes even more important for AI Agents. Usage of PII elements 
which are known publically becomes a real risk. If these are included in the 
training data for the LLM, it is indeed possible (and likely) that the LLM 
would hallucinate it. For example, if the patient in question is a famous 
actor, and their date of birth is public record in the IMDB, it is likely that 
the LLM would hallucinate the date of birth. Consequently, the Authorization 
Servers can be configured to require sufficient number and complexity of PII in 
order to provide the desired level of security.


        *   This hardly advocates for the PII to not flow through the AI cause 
thinking the AS will be smarter than the AI by configured to require sufficient 
number and complexity of PII in order to provide the desired level of security 
is a false expectation


     *   Resource Owner Password Grant flow is obsolete and deprecated see 
https://www.rfc-editor.org/rfc/rfc9700.html#name-resource-owner-password-cre



  *   Without consideration about the above points we are exchanging an AI 
Agent risk by a very secure AI Agent that could on very misleading / spoofable 
/ malicious crafted information. I don't think this better.



  *   Have you evaluated Client Initiated Backchannel Authorization grant type 
flow [  
https://openid.net/specs/openid-client-initiated-backchannel-authentication-core-1_0.html
 ] before designing this new specification?
     *   This would perfectly fit into the following specification statement in 
section 3.2. 
<https://datatracker.ietf.org/doc/html/draft-rosenberg-oauth-aauth#section-3.2> 
Human-In-The-Loop<https://datatracker.ietf.org/doc/html/draft-rosenberg-oauth-aauth#name-human-in-the-loop>

Initiate the consent review flow with the user. This spec does not specify how 
this occurs, it could be through an app, a chat client, or some other mechanism.

My 0.02 Canadian Dollars

Jeff

Jean-François "Jeff" Lombardo | Amazon Web Services

Architecte Principal de Solutions, Spécialiste de Sécurité
Principal Solution Architect, Security Specialist
Montréal, Canada
( +1 514 778 5565

Commentaires à propos de notre échange? Exprimez-vous 
ici<https://urldefense.com/v3/__https:/feedback.aws.amazon.com/?ea=jeffsec&fn=Jean*20Francois&ln=Lombardo__;JQ!!Pe07N362zA!0k9CkAV8Djpw_8EfIAKrbhP3TQrJr0oMnznlUgBJ3V3NoEk6hihx7dNHnQuejn6SSH2CP8Iow3G-tTzppHeg$>.

Thoughts on our interaction? Provide feedback 
here<https://urldefense.com/v3/__https:/feedback.aws.amazon.com/?ea=jeffsec&fn=Jean*20Francois&ln=Lombardo__;JQ!!Pe07N362zA!0k9CkAV8Djpw_8EfIAKrbhP3TQrJr0oMnznlUgBJ3V3NoEk6hihx7dNHnQuejn6SSH2CP8Iow3G-tTzppHeg$>.

_______________________________________________
OAuth mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to