Re: [Captive-portals] Fixing RFC 7710

Warren Kumari <warren@kumari.net> Mon, 05 March 2018 01:33 UTC

Return-Path: <warren@kumari.net>
X-Original-To: captive-portals@ietfa.amsl.com
Delivered-To: captive-portals@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 761F5124C27 for <captive-portals@ietfa.amsl.com>; Sun, 4 Mar 2018 17:33:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=kumari-net.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qls1gcu4CEWh for <captive-portals@ietfa.amsl.com>; Sun, 4 Mar 2018 17:33:24 -0800 (PST)
Received: from mail-wm0-x233.google.com (mail-wm0-x233.google.com [IPv6:2a00:1450:400c:c09::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 57A32124BE8 for <captive-portals@ietf.org>; Sun, 4 Mar 2018 17:33:24 -0800 (PST)
Received: by mail-wm0-x233.google.com with SMTP id x7so12437795wmc.0 for <captive-portals@ietf.org>; Sun, 04 Mar 2018 17:33:23 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kumari-net.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=pUsXc8Qe5ukGu5y4Oi7/qLbSDXgktXNsQE8sM+AeI5w=; b=gFiOOYYQI4pjVaASZM+4zdL07CXnN1uO2fhfhj3OsRuvrqoPW4N6ys5j5bAMQzg4H9 UyUMKyCHk584jlaZcJ2EKbGa0YKS7ABUmwAFWc7ou4Za7Dfi0L4fh8NCYIWfcYltHt0r oJ4+mp7FqIbb9ivgiVo759+r3yoaqyQgtLLJhJacCCGIlP5tL6DNVmk3imA6tUB9yiJ5 A0ZMVDs17XJANUSgfa3TmWKi1rNCCH2726kbdmbdYqNfMp/B1JvWr+g93xpKIKedxXBu N9s6k+bMTJmCu0V0drkrb50ma7IEbVSoJhPRZYKkCYYEYiFgDwURCTo91qPjWMVbPW1d L+tA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=pUsXc8Qe5ukGu5y4Oi7/qLbSDXgktXNsQE8sM+AeI5w=; b=G5ex7tsRabjdEEkbOCySn3Q//ShF+UXChFVqydQzA/h+D5pZtQm0zWHT+6FEhl6z/R sBrmyS9+gkfb0Aqb/4M6ZbFAVCfa6kpSOqiPxOFthjZNPoTXpuG1b+r9Z/I84KNUjgsi /8p4ZeDL1ZMFdW3KEapd+jqXAjbfA5bIRXnCLiYe8m9Zlji2/sy5va/eFiHbzeroKcid Rp8eRqh8OG3fERkNBr7ed9u5UAwxnfPzOmfv7aFuvv5zaMW3haEaSQfFk86yxtiUCAPb q+sACMNhZ1CObGluYPhvCkMOZz4R0BQjuECTt62dZl9biyxtSfXC9HfztJ4v+EuhLWCv BBrA==
X-Gm-Message-State: AElRT7E+OtKW09zEsSE6bUuAusb7maZHkyO2DOHwFRu5PgjI9a2LTYnC QPZSOi27G3i4y9nwEme5BUPA88tpM8bsXA6pa2oyow==
X-Google-Smtp-Source: AG47ELu7VK8cQH9RWmCK8lzSs3ugII5e5UdG40kVCDALaiaKosvmIIzDN1Y57WCv7O2M00zniul4qqDPNNjL/EmV+30=
X-Received: by 10.28.136.74 with SMTP id k71mr6396657wmd.46.1520213601978; Sun, 04 Mar 2018 17:33:21 -0800 (PST)
MIME-Version: 1.0
Received: by 10.223.152.235 with HTTP; Sun, 4 Mar 2018 17:32:41 -0800 (PST)
In-Reply-To: <CABkgnnUTUrDCJgaiYOjwbhgz6r0s+oP598TL-obyGjMCULfJyQ@mail.gmail.com>
References: <CABkgnnWJMipRtG-p0EoUXmK3u1c2ab-v4xN3WZfm3XL8s08aZA@mail.gmail.com> <CAHw9_iKmj_CYNwm+i6ETKF3FSVwEp-NGVfiMfPiBE3QCUbKzkQ@mail.gmail.com> <CABkgnnUTUrDCJgaiYOjwbhgz6r0s+oP598TL-obyGjMCULfJyQ@mail.gmail.com>
From: Warren Kumari <warren@kumari.net>
Date: Sun, 04 Mar 2018 20:32:41 -0500
Message-ID: <CAHw9_i+j3HCe2c-_2UP-HibRZOnx-xxtpZJ4228GaXJT0_9g5Q@mail.gmail.com>
To: Martin Thomson <martin.thomson@gmail.com>
Cc: captive-portals@ietf.org, Olafur Gudmundssen <olafur@cloudflare.com>, Paul Ebersman <ebersman-ietf@dragon.net>, Steve Sheng <steve.sheng@icann.org>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/captive-portals/ZvLu_yAs-daMDSoI2D1aUbA_pFs>
Subject: Re: [Captive-portals] Fixing RFC 7710
X-BeenThere: captive-portals@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Discussion of issues related to captive portals <captive-portals.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/captive-portals>, <mailto:captive-portals-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/captive-portals/>
List-Post: <mailto:captive-portals@ietf.org>
List-Help: <mailto:captive-portals-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/captive-portals>, <mailto:captive-portals-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 05 Mar 2018 01:33:26 -0000

On Sun, Mar 4, 2018 at 5:55 PM, Martin Thomson <martin.thomson@gmail.com> wrote:
> On Sat, Mar 3, 2018 at 9:52 AM, Warren Kumari <warren@kumari.net> wrote:
>> Yeah, there was a significant amount of discussion on this at the time
>> of the original document -- I can probably dredge it up if needed, but
>> IIRC, it focused around the fact that 1: many clients behind a CP
>> would not have enough working connectivity to be able to do the DNS
>> stuff required to be able to validate the cert, and 2: a lack of
>> clarity on what exactly would be authenticated.
>
> We have good tools for that now.  In practice, the only relevant
> network connectivity needed to validate the cert is the revocation
> information.  The current idea is that mandating OCSP stapling is
> enough.
>

Okey dokey!


> Of the other things that are included, AIA is the only one that I know
> is used in practice, but that can be forbidden here.  The only reason
> to do AIA is to avoid including intermediate certificates in the
> handshake, and this is a clear case where doing that is not helpful.
> Practically speaking, not all clients do AIA, so it's not an
> interoperable choice anyway.
>
>> 2: How does the client know that your-preferred-internet-provider.com
>> is the identity which *should* be providing Internets? Having the
>> client accept that /might/ give the impression that there is some
>> *reason* to believe this, and was viewed as a usability concern --
>> training users / developers to make a leap of trust that "you should
>> trust this identity is the right one" was viewed as a dangerous
>> pattern.
>>
>> Somehow this turned into "Just ship http://192.168.1.1/foo and then
>> that, um, someone else's problem"  -- before everyone jumps down my
>> throat, I'm not arguing for or against the positions, rather trying to
>> provide some background on how we ended up here. :-P
>
> That's not substantially different to https://example.com/.  You end
> up trusting that your DHCP/RA wasn't intercepted.  Look at it this
> way: whatever you get from DHCP/RA is clearly from someone who
> controls the network.  If the person who controls the network isn't
> the one paying for it, then that's a problem for the person paying for
> the network; it doesn't change what the device connecting to the
> network thinks.

Yup, 100% agree -- I believe that hte argument wasn't a technical
objection, but rather a human factors / "If we let people think that
it is OK to trust a TLS cert (note the above was HTTP) without having
in mind some identity to tie it to, they will start believing that
this is OK for their bank and similar - cats and dogs will lie down
together, rains of blood, etc."


>  HTTPS is better in that the target of the URI might
> not be on the local network, and so at least you have confidentiality
> once packets leave the network.

Yup. And even if it *is* on the local network, there is a good chance
that this is an unencrypted WiFi network, and so you and all your
fellow coffee drinkers can happy watch the packets go by.

>
>> I don't have the time to be the only / primary author, but I'd be more
>> than happy to help co-author (if that would be useful), contribute,
>> review, fold, spindle or mutilate -- whatever would be helpful.
>
> We might hold you to that :)

Doh! Sure..

W




-- 
I don't think the execution is relevant when it was obviously a bad
idea in the first place.
This is like putting rabid weasels in your pants, and later expressing
regret at having chosen those particular rabid weasels and that pair
of pants.
   ---maf