Re: [alto] Roman Danyliw's Discuss on draft-ietf-alto-new-transport-17: (with DISCUSS and COMMENT)

Qin Wu <bill.wu@huawei.com> Tue, 12 December 2023 09:15 UTC

Return-Path: <bill.wu@huawei.com>
X-Original-To: alto@ietfa.amsl.com
Delivered-To: alto@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9C1F8C15155A; Tue, 12 Dec 2023 01:15:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.905
X-Spam-Level:
X-Spam-Status: No, score=-6.905 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CBYlqt1JDSlK; Tue, 12 Dec 2023 01:15:34 -0800 (PST)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AAB83C14F683; Tue, 12 Dec 2023 01:15:20 -0800 (PST)
Received: from mail.maildlp.com (unknown [172.18.186.231]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4SqCby4Mx4z6JB3w; Tue, 12 Dec 2023 17:14:22 +0800 (CST)
Received: from lhrpeml500002.china.huawei.com (unknown [7.191.160.78]) by mail.maildlp.com (Postfix) with ESMTPS id 511A21400D5; Tue, 12 Dec 2023 17:15:19 +0800 (CST)
Received: from canpemm100008.china.huawei.com (7.192.104.152) by lhrpeml500002.china.huawei.com (7.191.160.78) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Tue, 12 Dec 2023 09:15:18 +0000
Received: from canpemm500005.china.huawei.com (7.192.104.229) by canpemm100008.china.huawei.com (7.192.104.152) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Tue, 12 Dec 2023 17:15:16 +0800
Received: from canpemm500005.china.huawei.com ([7.192.104.229]) by canpemm500005.china.huawei.com ([7.192.104.229]) with mapi id 15.01.2507.035; Tue, 12 Dec 2023 17:15:16 +0800
From: Qin Wu <bill.wu@huawei.com>
To: Roman Danyliw <rdd@cert.org>
CC: The IESG <iesg@ietf.org>, "alto-chairs@ietf.org" <alto-chairs@ietf.org>, "draft-ietf-alto-new-transport@ietf.org" <draft-ietf-alto-new-transport@ietf.org>, "alto@ietf.org" <alto@ietf.org>, "kaigao@scu.edu.cn" <kaigao@scu.edu.cn>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>
Thread-Topic: [alto] Roman Danyliw's Discuss on draft-ietf-alto-new-transport-17: (with DISCUSS and COMMENT)
Thread-Index: Ados2ue6a8Qn/fRLTy+IJyq2PQVukg==
Date: Tue, 12 Dec 2023 09:15:16 +0000
Message-ID: <2799f45871c048b4ad1b9e9f092be714@huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.136.118.68]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/alto/ixPuQBn2prBxk95nhIIOjhdnTrE>
Subject: Re: [alto] Roman Danyliw's Discuss on draft-ietf-alto-new-transport-17: (with DISCUSS and COMMENT)
X-BeenThere: alto@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Application-Layer Traffic Optimization \(alto\) WG mailing list" <alto.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/alto>, <mailto:alto-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/alto/>
List-Post: <mailto:alto@ietf.org>
List-Help: <mailto:alto-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/alto>, <mailto:alto-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Dec 2023 09:15:38 -0000

Hi, Roman:
Talking with Kai recently, he confirmed two issues raised in the Discuss (2023-10-23 for -17) 
Have been addressed. The latest version is v-21.
Also he mentioned that his response to your email sometimes got filtered for some unknown reasons, I hope you have received Med's follow up and my followup. 
Thanks!

-Qin (on behalf of chairs)
-----邮件原件-----
发件人: mohamed.boucadair@orange.com [mailto:mohamed.boucadair@orange.com] 
发送时间: 2023年12月7日 16:18
收件人: Roman Danyliw <rdd@cert.org>
抄送: The IESG <iesg@ietf.org>; alto-chairs@ietf.org; draft-ietf-alto-new-transport@ietf.org; alto@ietf.org; kaigao@scu.edu.cn
主题: RE: [alto] Roman Danyliw's Discuss on draft-ietf-alto-new-transport-17: (with DISCUSS and COMMENT)

Hi Roman, 

This is a nudge to check whether the revised spec and the clarification provided by kai addressed your concerns.

For convenience, the changes made since your review can be tracked here: https://author-tools.ietf.org/iddiff?url1=draft-ietf-alto-new-transport-17&url2=draft-ietf-alto-new-transport-21&difftype=--html

Thank you

Med (Doc Shepherd)

> -----Message d'origine-----
> De : alto <alto-bounces@ietf.org> De la part de kaigao@scu.edu.cn 
> Envoyé : dimanche 29 octobre 2023 13:27 À : Roman Danyliw 
> <rdd@cert.org> Cc : The IESG <iesg@ietf.org>; alto-chairs@ietf.org; 
> draft-ietf-alto- new-transport@ietf.org; alto@ietf.org Objet : Re: 
> [alto] Roman Danyliw's Discuss on draft-ietf-alto-new-
> transport-17: (with DISCUSS and COMMENT)
> 
> Hi Roman,
> 
> I hope you are OK with our responses to your DISCUSS points. This is 
> the follow-up update regarding your comments.
> 
> First, for the comment on Digest authentication, we agree that this is 
> a fair request as RFC 7285 says Digest authentication is mandatory. An 
> example using Digest authentication is added in Sec 6.3.
> 
> For the comment on mandating RFC 9325, I am a bit hesitated to do so.
> First, this seems a bit repetitive as Section 15.1.2 in RFC 7285 
> already says
> 
>   "Software engineers developing and service providers deploying ALTO
>    should make themselves familiar with possibly updated standards
>    documents as well as up-to-date Best Current Practices on 
> configuring
>    HTTP over TLS."
> 
> Second, RFC 9325 seems to be applicable to any protocol building on 
> top of TLS, not specific to ALTO. It is also applicable to any 
> extension to ALTO. It feels a bit weird to add something that is 
> broader than the scope of the extension specified in the document, 
> especially when it does not require specific attentions to the TLS 
> layer.
> 
> We could certainly add a sentence saying that developers of this 
> extensions should follow RFC 9325 if you think this is really 
> important. Otherwise we intend to not include the discussion on TLS.
> 
> Best,
> Kai
> 
> > -----Original Messages-----
> > From: kaigao@scu.edu.cn
> > Send time:Wednesday, 10/25/2023 17:57:00
> > To: "Roman Danyliw" <rdd@cert.org>
> > Cc: "The IESG" <iesg@ietf.org>, alto-chairs@ietf.org, 
> > draft-ietf-alto-new-transport@ietf.org, alto@ietf.org
> > Subject: Re: [alto] Roman Danyliw's Discuss on
> > draft-ietf-alto-new-transport-17: (with DISCUSS and COMMENT)
> >
> > Hi Roman,
> >
> > Thanks for the review. Please see inline.
> >
> > Best,
> > Kai
> >
> >
> > > -----Original Messages-----
> > > From: "Roman Danyliw via Datatracker" <noreply@ietf.org> Send 
> > > time:Tuesday, 10/24/2023 10:40:46
> > > To: "The IESG" <iesg@ietf.org>
> > > Cc: alto-chairs@ietf.org, draft-ietf-alto-new-transport@ietf.org,
> > > alto@ietf.org
> > > Subject: [alto] Roman Danyliw's Discuss on
> > > draft-ietf-alto-new-transport-17: (with DISCUSS and COMMENT)
> > >
> > > Roman Danyliw has entered the following ballot position for
> > > draft-ietf-alto-new-transport-17: Discuss
> > >
> > > When responding, please keep the subject line intact and reply to 
> > > all email addresses included in the To and CC lines. (Feel free to 
> > > cut this introductory paragraph, however.)
> > >
> > >
> > > Please refer to
> > >
> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fww
> > > w.ietf.org%2Fabout%2Fgroups%2Fiesg%2Fstatements%2Fhandling-ballot-
> po
> > >
> sitions%2F&data=05%7C01%7Cmohamed.boucadair%40orange.com%7Cb767734f0
> > >
> 9704481993708dbd87a6810%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7
> > >
> C638341792466819799%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQ
> > >
> IjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=mqO
> > > DvELZY%2BRRd%2BP5DXCADt80aHoBoZ4mMHrxf8sspPw%3D&reserved=0
> > > for more information about how to handle DISCUSS and COMMENT
> positions.
> > >
> > >
> > > The document, along with other ballot positions, can be found
> here:
> > >
> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fda
> > > tatracker.ietf.org%2Fdoc%2Fdraft-ietf-alto-new-
> transport%2F&data=05%
> > >
> 7C01%7Cmohamed.boucadair%40orange.com%7Cb767734f09704481993708dbd87a
> > >
> 6810%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C638341792466819799
> > >
> %7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI
> > >
> 6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=0w%2FEszcA1tbg0DdXEVs6
> > > unVMO8OD19xLN%2BZLJtDQCyA%3D&reserved=0
> > >
> > >
> > >
> > > ------------------------------------------------------------------
> --
> > > --
> > > DISCUSS:
> > > ------------------------------------------------------------------
> --
> > > --
> > >
> > > ** Section 6.2.  Construction of the "tips-view-uri".
> > >
> > > -- Under what circumstances would it be appropriate to use http 
> > > (instead of
> > > https) for the tips-view-uri for this new protocol mechanism?  Why 
> > > is http needed?  Could https be the only option?  I appreciate
> that
> > > there is history of an http URL from RFC7285 published in 2014,
> but
> > > has field experience continue to dictate a need for this insecure 
> > > approach for an entirely new service?  If it is needed would there
> be a away to express a preference for secure transport?
> > >
> >
> > [KAI] One reason I can think of to keep http is to allow caching of 
> > incremental updates (whose uri is based on the tips-view-uir) for a 
> > given resource whose content is intended to be publicly accessible, 
> > which could happen if the server is hosted by the ISP and a cost map 
> > is intended to be accessible by all its users. How about we add the
> following sentence in sec 6.2:
> >
> >   An ALTO server SHOULD always use "https" unless the ALTO resource
> is intended to
> >   be publicly accessible and does not raise any security concerns.
> >
> > > -- Is there any underlying assumption in how "tips-view-path" is 
> > > constructed? I asked because Section 9.3 says "An outside party
> that
> > > can read the TIPS response or that can observe TIPS requests can 
> > > obtain the TIPS view URI and use that to send fraudulent 'DELETE'
> > > requests thus disabling the service for the valid ALTO client.
> This
> > > can be avoided by encrypting the requests and responses (Section
> 15
> > > of [RFC7285])."  Observing the tips-view-uri is one way to spoof
> the
> > > URI, but what if it could be guessed?  Is there an assumption that
> a
> > > unguessable random string is part of the path?  As far as I can 
> > > find, no text explicitly says that, although the examples imply
> it.
> > > If the string is guessable being encrypted doesn't help but using
> some kind of authentication would.
> > >
> > >
> >
> > [KAI] In -17, the fraudulent 'DELETE' issue no long exists as we now 
> > require the server to close of TIPS views, as suggested by the
> HTTPDIR
> > reviewer and the AD. I think that would address this issue.
> >
> > > ------------------------------------------------------------------
> --
> > > --
> > > COMMENT:
> > > ------------------------------------------------------------------
> --
> > > --
> > >
> > > Thank you to Donald Eastlake for the SECDIR review.
> > >
> > > ** Section 6.3.  The example in Figure 10 describes Basic Auth.
> > > Section 8.3.5 of RFC7295 notes that Digest Auth is MTI.  Recommend
> using that instead.
> > >
> > > ** Section 9.
> > >    The security considerations (Section 15 of [RFC7285]) of the
> base
> > >    protocol fully apply to this extension.  For example, the same
> > >    authenticity and integrity considerations (Section 15.1 of
> [RFC7285])
> > >    still fully apply;
> > >
> > > Since ALTO TIPS is a new protocol mechanism is it possible to 
> > > improve on the TLS guidance in Section 8.3.5 of RFC7295 (from
> circa
> > > 2014)?  Specifically, can
> > > RFC9325 be mandated?
> > >
> > >
> > >
> > > _______________________________________________
> > > alto mailing list
> > > alto@ietf.org
> > >
> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fww
> > >
> w.ietf.org%2Fmailman%2Flistinfo%2Falto&data=05%7C01%7Cmohamed.boucad
> > >
> air%40orange.com%7Cb767734f09704481993708dbd87a6810%7C90c7a20af34b40
> > >
> bfbc48b9253b6f5d20%7C0%7C0%7C638341792466819799%7CUnknown%7CTWFpbGZs
> > >
> b3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%
> > >
> 3D%7C3000%7C%7C%7C&sdata=N5ABDN%2BLaxE7ZcWS4%2FNstmxjOldJiwiZtsw1yDZ
> > > T6Cg%3D&reserved=0
> > _______________________________________________
> > alto mailing list
> > alto@ietf.org
> >
> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.
> >
> ietf.org%2Fmailman%2Flistinfo%2Falto&data=05%7C01%7Cmohamed.boucadair%
> >
> 40orange.com%7Cb767734f09704481993708dbd87a6810%7C90c7a20af34b40bfbc48
> >
> b9253b6f5d20%7C0%7C0%7C638341792466819799%7CUnknown%7CTWFpbGZsb3d8eyJW
> >
> IjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%
> >
> 7C%7C%7C&sdata=N5ABDN%2BLaxE7ZcWS4%2FNstmxjOldJiwiZtsw1yDZT6Cg%3D&rese
> > rved=0
> _______________________________________________
> alto mailing list
> alto@ietf.org
> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.
> ietf.org%2Fmailman%2Flistinfo%2Falto&data=05%7C01%7Cmohamed.boucadair%
> 40orange.com%7Cb767734f09704481993708dbd87a6810%7C90c7a20af34b40bfbc48
> b9253b6f5d20%7C0%7C0%7C638341792466819799%7CUnknown%7CTWFpbGZsb3d8eyJW
> IjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%
> 7C%7C%7C&sdata=N5ABDN%2BLaxE7ZcWS4%2FNstmxjOldJiwiZtsw1yDZT6Cg%3D&rese
> rved=0
____________________________________________________________________________________________________________
Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration, Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law; they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.