Re: [dispatch] [RAI] MSRP Expert Review of draft-pd-dispatch-msrp-websocket-04

"Cullen Jennings (fluffy)" <fluffy@cisco.com> Wed, 29 January 2014 16:11 UTC

Return-Path: <fluffy@cisco.com>
X-Original-To: dispatch@ietfa.amsl.com
Delivered-To: dispatch@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 255601A03BF; Wed, 29 Jan 2014 08:11:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -115.036
X-Spam-Level:
X-Spam-Status: No, score=-115.036 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.535, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4lXLrZn2Uabs; Wed, 29 Jan 2014 08:11:34 -0800 (PST)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) by ietfa.amsl.com (Postfix) with ESMTP id ADA621A03E8; Wed, 29 Jan 2014 08:11:30 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1761; q=dns/txt; s=iport; t=1391011888; x=1392221488; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=Aanm7d3T4xziWPJycVHoiiYV57PaMbCogtcYwHvWFcQ=; b=eto8kBCIwlKRspX/Mc6toKZhhiFd9tNur0gJLa4SohwT7FucmQ2Sxsow NgDAH2OzSs7KX7KaJgDBK/ofznAYkG27GRiOqyccFr81Ofd/YY3512v39 yWOB4UL/Cqps0v+JKu+6HXOZOK6or2ET6na9irRULxQdjekJArbS0onCt s=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: Ag0FAJwn6VKtJXG+/2dsb2JhbABTBoMMOFa8f4EHFnSCJQEBAQMBAQEBaAMLEAIBCBguJwslAgQOBYd9CA3JeRMEjh0RAQ0QMweDJIEUBJgokh+DLYFxOQ
X-IronPort-AV: E=Sophos;i="4.95,742,1384300800"; d="scan'208";a="300521133"
Received: from rcdn-core2-3.cisco.com ([173.37.113.190]) by rcdn-iport-3.cisco.com with ESMTP; 29 Jan 2014 16:11:27 +0000
Received: from xhc-rcd-x12.cisco.com (xhc-rcd-x12.cisco.com [173.37.183.86]) by rcdn-core2-3.cisco.com (8.14.5/8.14.5) with ESMTP id s0TGBRd4013026 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Wed, 29 Jan 2014 16:11:27 GMT
Received: from xmb-aln-x02.cisco.com ([169.254.5.76]) by xhc-rcd-x12.cisco.com ([173.37.183.86]) with mapi id 14.03.0123.003; Wed, 29 Jan 2014 10:11:27 -0600
From: "Cullen Jennings (fluffy)" <fluffy@cisco.com>
To: Ben Campbell <ben@nostrum.com>
Thread-Topic: [RAI] MSRP Expert Review of draft-pd-dispatch-msrp-websocket-04
Thread-Index: AQHPHQzD5NPJAZ1BGUCGp1O/NMagzw==
Date: Wed, 29 Jan 2014 16:11:26 +0000
Message-ID: <A25E55DD-59E3-4F43-BE9A-6304378FAE0B@cisco.com>
References: <45B84D8F-AD8C-4B28-90DF-9B1C40771104@nostrum.com> <6833E320-7B45-4FC2-853B-62311DCF7E7B@nostrum.com>
In-Reply-To: <6833E320-7B45-4FC2-853B-62311DCF7E7B@nostrum.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.20.249.164]
Content-Type: text/plain; charset="Windows-1252"
Content-ID: <22E36ED91B054E498BEF37DD9EAA9EC4@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: DISPATCH <dispatch@ietf.org>, "draft-pd-dispatch-msrp-websocket.all@tools.ietf.org" <draft-pd-dispatch-msrp-websocket.all@tools.ietf.org>, "rai@ietf.org" <rai@ietf.org>
Subject: Re: [dispatch] [RAI] MSRP Expert Review of draft-pd-dispatch-msrp-websocket-04
X-BeenThere: dispatch@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: DISPATCH Working Group Mail List <dispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dispatch>, <mailto:dispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dispatch/>
List-Post: <mailto:dispatch@ietf.org>
List-Help: <mailto:dispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dispatch>, <mailto:dispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 Jan 2014 16:11:43 -0000

I don’t see why using websockets would require us to get rid of the MUST use TLS. 

The security of relays is a total disaster if you don’t have this so if the MUST be security authenticated goes away for relays, then I suspect this mechanisms is too broken to publish.

Cullen ( in my individual contributor role just to be clear )


On Jan 11, 2014, at 2:54 PM, Ben Campbell <ben@nostrum.com> wrote:

> 
> On Jan 10, 2014, at 5:34 PM, Ben Campbell <ben@nostrum.com> wrote:
> 
>> --3
>> 
>> I am not happy with the downgrade of of the TLS requirement between client and relay. I recognize that WebSocket
> 
> Robert pointed out to me that my comments on this section were truncated. Apparently I'm not qualified for this email gizmo. Here's another try:
> 
> I recognize that the WebSocket API limits the application's ability to control the security parameters of the connection. I think this is a general issue for moving application protocols to use WebSocket, that perhaps needs to be addressed in the WebSocket API.  We probably need an whole IETF (or at least RAI+APPS) policy for how to handle this. But MSRP is somewhat unusual in having a "MUST use" TLS requirement, and in the current security climate we need to take a really hard look at anything that weakens the normative security requirements of a messaging protocol.
> 
> I don't have an answer for how to proceed, but at a minimum I would like to see considerably more discussion of the implications and any potential mitigation of this in the Security Considerations sections.
> _______________________________________________
> RAI mailing list
> RAI@ietf.org
> https://www.ietf.org/mailman/listinfo/rai