Re: RFC2616 vs RFC2617, was: Straw-man charter for http-bis

Mark Nottingham <mnot@yahoo-inc.com> Fri, 15 June 2007 15:03 UTC

Return-path: <discuss-bounces@apps.ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1HzDKJ-00006K-Hv; Fri, 15 Jun 2007 11:03:03 -0400
Received: from discuss by megatron.ietf.org with local (Exim 4.43) id 1HyjJw-00046Y-68 for discuss-confirm+ok@megatron.ietf.org; Thu, 14 Jun 2007 03:00:40 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1HyjJv-00044n-PW for discuss@apps.ietf.org; Thu, 14 Jun 2007 03:00:39 -0400
Received: from rsmtp2.corp.yahoo.com ([207.126.228.150]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1HyjJv-0003Px-Dn for discuss@apps.ietf.org; Thu, 14 Jun 2007 03:00:39 -0400
Received: from [127.0.0.1] (socks2.corp.yahoo.com [216.145.54.7]) (authenticated bits=0) by rsmtp2.corp.yahoo.com (8.13.8/8.13.6/y.rout) with ESMTP id l5E70QHq065021 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Thu, 14 Jun 2007 00:00:28 -0700 (PDT)
DomainKey-Signature: a=rsa-sha1; s=serpent; d=yahoo-inc.com; c=nofws; q=dns; h=in-reply-to:references:mime-version:content-type:message-id:cc: content-transfer-encoding:from:subject:date:to:x-mailer; b=ef8z4+LfntABOSfdGHYU2FzWUfRwmKQUdXJH4cUaq8CJvT9k8/+FbOBEcr/1hCxM
In-Reply-To: <466882A9.5010303@cs.utk.edu>
References: <BA772834-227A-4C1B-9534-070C50DF05B3@mnot.net> <392C98BA-E7B8-44ED-964B-82FC48162924@mnot.net> <6AE049B9045C00064222693F@[10.1.110.5]> <p06240871c28dd59e7371@[10.20.30.108]> <46682BC9.9050504@gmx.de> <46682E06.7030603@cs.utk.edu> <46682FC5.5030204@gmx.de> <466882A9.5010303@cs.utk.edu>
Mime-Version: 1.0 (Apple Message framework v752.2)
Content-Type: text/plain; charset=US-ASCII; delsp=yes; format=flowed
Message-Id: <6C2C0C9F-DB6E-402E-983D-1C47CDDC5761@yahoo-inc.com>
Content-Transfer-Encoding: 7bit
From: Mark Nottingham <mnot@yahoo-inc.com>
Subject: Re: RFC2616 vs RFC2617, was: Straw-man charter for http-bis
Date: Thu, 14 Jun 2007 17:00:24 +1000
To: Keith Moore <moore@cs.utk.edu>
X-Mailer: Apple Mail (2.752.2)
X-Spam-Score: -15.0 (---------------)
X-Scan-Signature: cd26b070c2577ac175cd3a6d878c6248
X-Mailman-Approved-At: Fri, 15 Jun 2007 11:03:01 -0400
Cc: Paul Hoffman <phoffman@imc.org>, "ietf-http-wg@w3.org Group" <ietf-http-wg@w3.org>, Apps Discuss <discuss@apps.ietf.org>
X-BeenThere: discuss@apps.ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: general discussion of application-layer protocols <discuss.apps.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/discuss>, <mailto:discuss-request@apps.ietf.org?subject=unsubscribe>
List-Post: <mailto:discuss@apps.ietf.org>
List-Help: <mailto:discuss-request@apps.ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/discuss>, <mailto:discuss-request@apps.ietf.org?subject=subscribe>
Errors-To: discuss-bounces@apps.ietf.org

Since discussion has veered towards "what's wrong with Digest?", a  
few more issues, FWIW;

- Forced timeout: it's important to be able to bound login state by  
time. While you can do this by keeping state on the server, this is  
impractical on massively distributed services (e.g., Yahoo!). While  
the opaque field of Digest can be used to transport a  
cryptographically signed timeout date, client implementation of  
Opaque is spotty AFAIK.

- Dictionary attacks: Because an analogue of the password is on the  
wire, it's possible to make dictionary attacks against poorly chosen  
passwords. Again, this can be mitigated by forcing users to choose  
good passwords, but that is difficult when dealing with large numbers  
of consumers.

- Downgrade attacks: Never mind intermediaries; imagine a pool of  
thousands of servers serving a site which use Digest auth. If one is  
compromised, and the browser has stored credentials, it can perform a  
downgrade attack by requesting Basic authentication.

There's a common thread through these that I don't think has surfaced  
in discussions much yet; the idea that, for some kinds of  
installations, it's very desirable to limit the number of servers  
that need to know the password to a small subset of the total set of  
deployed servers. Doing so makes the risk profile much more  
manageable and assures proper resource utilisation (servers doing  
password verification means that there's less resource for doing what  
they're supposed to), and is commonly seen on large Web sites by use  
of cookies as tokens + a dedicated 'login' hostname.

Again, digest has the potential for cross-domain authentication, but  
it isn't widely implemented, probably because people feel there are  
security issues in allowing it in an unmitigated fashion.

Cookies are also attractive because when they're used, the server  
doesn't need to trust that the implementation performs correctly;  
besides scoping issues (which have been mostly worked out), cookies  
generally either work or they don't. Additionally, it's not clear  
whether more than one credential is allowed at a time (IIRC they  
aren't), which limits its usefulness compared to Cookies.


Cheers,


On 2007/06/08, at 8:11 AM, Keith Moore wrote:

>
> Julian Reschke wrote:
>> Keith Moore wrote:
>>> no.  deprecate 2617.  deprecate the framework that is in 2616.  HTTP
>>> security needs a clean slate approach.
>>
>> I personally have no problem with this. In the wild, most
>> authentication isn't using RFC2617 anyway.
>>
>> However, my understanding is that the IESG doesn't allow RFC2616bis
>> not to discuss authentication in *some* manner.
> I'm certain that there will have to be a good answer to the
> authentication question before 2616bis will be allowed to get any kind
> of standardization status.  (it could probably be in a separate  
> document).
>> BTW: does the framework really require fixing?
> I am pretty sure that it does.  I think sites will continue to  
> insist on
> being in control of the look and feel of the username/password dialog.
> I also think that the phishing concerns have to be dealt with.  The  
> two
> of these together make for an interesting set of constraints.
>
> Keith
>
>

--
Mark Nottingham       mnot@yahoo-inc.com