Token Binding is a proposed standard for a Transport Layer Security (TLS) extension that aims to increase TLS security by using cryptographic certificates on both ends of the TLS connection. Current practice often depends on bearer tokens,[1] which may be lost or stolen. Bearer tokens are also vulnerable to man-in-the-middle attacks or replay attacks. In contrast, bound tokens are established by a user agent that generates a private-public key pair per target server, providing the public key to the server, and thereafter proving possession of the corresponding private key on every TLS connection to the server.

Token Binding is an evolution of the Transport Layer Security Channel ID (previously known as Transport Layer Security – Origin Bound Certificates (TLS-OBC)) extension.

Industry participation is widespread with standards contributors including Microsoft,[2] Google,[3] PayPal, Ping Identity, and Yubico. Browser support remains limited, however. Only Microsoft Edge has support for token binding.[4]

IETF standards

The following group of IETF RFCs and Internet Drafts comprise a set of interrelated specifications for implementing different aspects of the Token Binding standard.

Related IETF draft standard:

Related standards

The use of TLS Token Binding allows for more robust web authentication. Several web authentication standards developed by standards bodies outside of IETF are adopting the draft standards.

References

  1. ^ M. Jones, Microsoft; D. Hardt, Independent (2012). "The OAuth 2.0 Authorization Framework: Bearer Token Usage". IETF Tools. Internet Engineering Task Force. doi:10.17487/RFC6750. Retrieved 23 August 2018.
  2. ^ Alex Simons (2018-08-21). "It's Time for Token Binding". Microsoft Enterprise Mobility + Security. Microsoft. Retrieved 23 August 2018.
  3. ^ "Google Chrome Privacy Whitepaper". Google. Retrieved 23 August 2018.
  4. ^ "Introducing Token Binding". Microsoft. 8 November 2016. Retrieved 15 January 2019.
  5. ^ A. Popov, Ed.; M. Nystroem; D. Balfanz; J. Hodges. "The Token Binding Protocol Version 1.0". IETF Tools. IETF. doi:10.17487/RFC8471. RFC 8471. Retrieved 22 January 2019.
  6. ^ A. Popov, Ed.; M. Nystroem; D. Balfanz. "Transport Layer Security (TLS) Extension for Token Binding Protocol Negotiation". IETF Tools. IETF. doi:10.17487/RFC8472. RFC 8472. Retrieved 22 January 2019.
  7. ^ A. Popov; M. Nystroem; D. Balfanz, Ed.; N. Harper; J. Hodges. "Token Binding over HTTP". IETF Tools. IETF. doi:10.17487/RFC8473. RFC 8473. Retrieved 22 January 2019.
  8. ^ Harper, N. Token Binding for Transport Layer Security (TLS) Version 1.3 Connections. IETF. I-D draft-ietf-tokbind-tls13. Retrieved 22 January 2019.
  9. ^ Campbell, B. "HTTPS Token Binding with TLS Terminating Reverse Proxies". IETF Tools. IETF. I-D draft-ietf-tokbind-ttrp. Retrieved 22 January 2019.
  10. ^ Jones, M.; Campbell, B.; Bradley, J.; Denniss, W. "OAuth 2.0 Token Binding". IETF Tools. IETF. I-D draft-ietf-oauth-token-binding. Retrieved 22 January 2019.
  11. ^ M. Jones, Microsoft; J. Bradley, Yubico; B. Campbell, Ping Identity. "OpenID Connect Token Bound Authentication". OpenID Foundation. Retrieved 23 August 2018.
  12. ^ Dirk Balfanz, Google; Alexei Czeskis, Google; Jeff Hodges, PayPal; J.C. Jones, Mozilla; Michael B. Jones, Microsoft; Akshay Kumar, Microsoft; Angelo Liao, Microsoft; Rolf Lindemann, Nok Nok Labs; Emil Lundberg, Yubico; Vijay Bharadwaj, Microsoft; Arnar Birgisson, Google; Hubert Le Van Gong, PayPal; Christiaan Brand, Google; Adam Langley, Google; Giridhar Mandyam, Qualcomm; Mike West, Google; Jeffrey Yasskin, Google. "Web Authentication: An API for accessing Public Key Credentials". World Wide Web Consortium. Retrieved 23 August 2018. ((cite web)): |author1= has generic name (help)