Re: [apps-discuss] Webfinger discussion

"Paul E. Jones" <paulej@packetizer.com> Mon, 26 March 2012 18:15 UTC

Return-Path: <paulej@packetizer.com>
X-Original-To: apps-discuss@ietfa.amsl.com
Delivered-To: apps-discuss@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D0C7521E80F7 for <apps-discuss@ietfa.amsl.com>; Mon, 26 Mar 2012 11:15:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.495
X-Spam-Level:
X-Spam-Status: No, score=-2.495 tagged_above=-999 required=5 tests=[AWL=0.104, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3Q15Nx7ZRqMG for <apps-discuss@ietfa.amsl.com>; Mon, 26 Mar 2012 11:15:38 -0700 (PDT)
Received: from dublin.packetizer.com (dublin.packetizer.com [75.101.130.125]) by ietfa.amsl.com (Postfix) with ESMTP id AAF2221E80CE for <apps-discuss@ietf.org>; Mon, 26 Mar 2012 11:15:37 -0700 (PDT)
Received: from sydney (rrcs-98-101-148-48.midsouth.biz.rr.com [98.101.148.48]) (authenticated bits=0) by dublin.packetizer.com (8.14.5/8.14.5) with ESMTP id q2QIFRXW022619 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Mon, 26 Mar 2012 14:15:29 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=packetizer.com; s=dublin; t=1332785729; bh=o8EtaC7Sb5TlTJGccXmDjBVy1no7HbEyD/onCmi2qi4=; h=From:To:References:In-Reply-To:Subject:Date:Message-ID: MIME-Version:Content-Type:Content-Transfer-Encoding; b=InbdfA6syRVJgSiKy8Nu/2aN40b7FJjvyNoTZ8PVE6mNQab2Nhzo0zanhP768tEKP MWS4cZ+2wIwvLM90LUAMxN2t5YnyMalDm59YKh+4ENUqZMfRZ0sMed1zizRTN3hb6C r+ArUchYDLSU/hm2ofhGBGHqz34mom7ebCrE72h0=
From: "Paul E. Jones" <paulej@packetizer.com>
To: 'Andrew Sullivan' <ajs@anvilwalrusden.com>, apps-discuss@ietf.org
References: <053201cd0b5d$c08c80f0$41a582d0$@packetizer.com> <20120326150556.GC3557@mail.yitter.info>
In-Reply-To: <20120326150556.GC3557@mail.yitter.info>
Date: Mon, 26 Mar 2012 14:15:31 -0400
Message-ID: <057101cd0b7c$6ec95170$4c5bf450$@packetizer.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQEg174HJISLlkWDD0VVkXSpmVuZQwKMareXl8DkonA=
Content-Language: en-us
Subject: Re: [apps-discuss] Webfinger discussion
X-BeenThere: apps-discuss@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: General discussion of application-layer protocols <apps-discuss.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/apps-discuss>, <mailto:apps-discuss-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/apps-discuss>
List-Post: <mailto:apps-discuss@ietf.org>
List-Help: <mailto:apps-discuss-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/apps-discuss>, <mailto:apps-discuss-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Mar 2012 18:15:38 -0000

Andrew,

> > > Andrew Sullivan: when I was a kid, they told us to turn off finger,
> > > so I'm concerned about security
> >
> > That was due to the fact the finger protocol implementations had
> > security holes.  It was also possible to do things like "ln
> > /etc/password .plan" and that was a bad thing :-)
> 
> That wasn't the only reason they told us this.  One of the things that
> people used to worry about was that finger leaked information.  In
> particular, it was an excellent way to identify targets for account
> takeover: people who never logged in, and people who were in for endless
> days and therefore whose account was probably often unmonitored.
> 
> Now, I never knew whether I believed this sort of complaint, but it was
> one, and the draft as it stands only just hints at the sort of analysis
> that ought to be done.  It seems like this requires a much expanded
> security considerations section, and that was the point I wanted to make.

I can see those argument against the traditional finger protocol.  At the
very least, one could determine which accounts have not changed passwords
since the last attack attempt.

For Webfinger, though, those same security issues do not exist.  It borrows
the concept of learning information about somebody (or something), but it's
certainly not exposing the same risks.

Further, whatever risks exist for Webfinger exist with RFC 6415, largely.
The acct URI, acct link relation, and use of CORS are two new
considerations, but everything else already exists.

So for the security considerations, we need to focus on those items.  I'm
happy to add whatever folks feel we should add.

Paul