Re: Straw-man charter for http-bis

Chris Newman <Chris.Newman@Sun.COM> Fri, 15 June 2007 21:58 UTC

Return-path: <discuss-bounces@apps.ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1HzJob-00086K-0f; Fri, 15 Jun 2007 17:58:45 -0400
Received: from discuss by megatron.ietf.org with local (Exim 4.43) id 1HzJoa-00086F-64 for discuss-confirm+ok@megatron.ietf.org; Fri, 15 Jun 2007 17:58:44 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1HzJoZ-000867-So for discuss@apps.ietf.org; Fri, 15 Jun 2007 17:58:43 -0400
Received: from brmea-mail-4.sun.com ([192.18.98.36]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1HzJoX-0004u4-Pm for discuss@apps.ietf.org; Fri, 15 Jun 2007 17:58:43 -0400
Received: from fe-amer-01.sun.com ([192.18.108.175]) by brmea-mail-4.sun.com (8.13.6+Sun/8.12.9) with ESMTP id l5FLwf5o002404 for <discuss@apps.ietf.org>; Fri, 15 Jun 2007 21:58:41 GMT
Received: from conversion-daemon.mail-amer.sun.com by mail-amer.sun.com (Sun Java System Messaging Server 6.2-6.01 (built Apr 3 2006)) id <0JJP0000153ZJV00@mail-amer.sun.com> (original mail from Chris.Newman@Sun.COM) for discuss@apps.ietf.org; Fri, 15 Jun 2007 15:58:41 -0600 (MDT)
Received: from [10.1.110.5] by mail-amer.sun.com (Sun Java System Messaging Server 6.2-6.01 (built Apr 3 2006)) with ESMTPSA id <0JJP009EG6DPQS00@mail-amer.sun.com>; Fri, 15 Jun 2007 15:58:41 -0600 (MDT)
Date: Fri, 15 Jun 2007 14:58:38 -0700
From: Chris Newman <Chris.Newman@Sun.COM>
Subject: Re: Straw-man charter for http-bis
In-reply-to: <466CC26F.90603@cs.utk.edu>
To: Keith Moore <moore@cs.utk.edu>, Henrik Nordstrom <henrik@henriknordstrom.net>
Message-id: <342C5167F40AD28C4ED69C9B@[10.1.110.5]>
MIME-version: 1.0
X-Mailer: Mulberry/3.1.6 (Mac OS X)
Content-type: text/plain; format=flowed; charset=us-ascii
Content-transfer-encoding: 7BIT
Content-disposition: inline
References: <BA772834-227A-4C1B-9534-070C50DF05B3@mnot.net> <392C98BA-E7B8-44ED-964B-82FC48162924@mnot.net> <6AE049B9045C00064222693F@[10.1.110.5]> <1181250794.24162.109.camel@henriknordstrom.net> <46696B98.1090201@cisco.com> <1181342059.4818.63.camel@henriknordstrom.net> <8DD2BD5A-9068-43C3-973E-382FAD2E0EA8@osafoundation.org> <1181532224.3389.47.camel@henriknordstrom.net> <466CC26F.90603@cs.utk.edu>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 69a74e02bbee44ab4f8eafdbcedd94a1
Cc: Apps Discuss <discuss@apps.ietf.org>, Mark Nottingham <mnot@mnot.net>, "ietf-http-wg@w3.org Group" <ietf-http-wg@w3.org>, Eliot Lear <lear@cisco.com>
X-BeenThere: discuss@apps.ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: general discussion of application-layer protocols <discuss.apps.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/discuss>, <mailto:discuss-request@apps.ietf.org?subject=unsubscribe>
List-Post: <mailto:discuss@apps.ietf.org>
List-Help: <mailto:discuss-request@apps.ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/discuss>, <mailto:discuss-request@apps.ietf.org?subject=subscribe>
Errors-To: discuss-bounces@apps.ietf.org

Keith Moore wrote on 6/10/07 23:33 -0400:
>>> Digest has a bad reputation particularly among Web App developers for
>>> a number of reasons, some inherent to the design and specification,
>>> some stemming from implementation and deployment choices.
>>>
>>
>> Nearly all is implementation.
>>
> ah, but what's the reason for all of those implementation-imposed
> constraints?

I would speculate it's because the following mandatory pieces of a complete 
DIGEST-based solution were never written down:

* Client UI requirements
* How to store DIGEST H(A1) in a central authentication repository such as
  LDAP or RADIUS in an interoperable fashion
* How web CGIs, PHP modules, etc. interface to the HTTP server's DIGEST support
* How to tie the DIGEST identity to whatever real identity system happens to
  be deployed at the web site.  From an IETF standards perspective, that
  means getting the LDAP directory entry and/or RADIUS/DIAMETER attributes for
  the user to the subsystem that needs that information.  In practice this can
  also involve a SQL database with unspecified keys and attributes.
* How a web page can securely associate branding with a DIGEST authentication
  UI in the browser
* How to migrate an existing password repository using an arbitrary
  one-way-function to store password verifiers to one that's DIGEST compatible,
  and do so in a way that won't generate service calls from customers.

Since implementations already have all this infrastructure for plaintext 
passwords (existing standards are sufficient due to plaintext simplicity), why 
should they waste time doing a one-off version of all this work if there aren't 
enough standards written for it to interoperate?  Besides, DIGEST without TLS 
is now so weak in a 10-cents-per-windows-zombie-CPU-week world that I question 
the value of doing any of this work just for DIGEST.

                - Chris