Re: [Gen-art] Genart last call review of draft-ietf-httpbis-cdn-loop-01

"Joel M. Halpern" <jmh@joelhalpern.com> Tue, 18 December 2018 03:56 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: gen-art@ietfa.amsl.com
Delivered-To: gen-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3731C13102A; Mon, 17 Dec 2018 19:56:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eKlL-HWWzzki; Mon, 17 Dec 2018 19:56:04 -0800 (PST)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1726F130E3C; Mon, 17 Dec 2018 19:56:04 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 43Jkhg5B86zX5K1; Mon, 17 Dec 2018 19:56:03 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=2.tigertech; t=1545105363; bh=HhSHBOZsg/T7lVtlD70Lfeb5QcGlR4CV4IWFDr5m7OA=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=peJtqMxeTzChEtdWw8LGle28tjAt2U7OUKHmkWHvxUnjZkXV3jOPve9LXK1s73TVQ d67LKohWlnTQeV9DCrcP3UZQfYflDn6zdal4lYFUrATR4WBfJT3mle0t7hco9aFyDD bw0LdoN7SiOWUWKktbBeycCXul1UkSb2H2qPoseo=
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 43Jkhf3DQszX5Jw; Mon, 17 Dec 2018 19:56:02 -0800 (PST)
To: Mark Nottingham <mnot@mnot.net>
Cc: gen-art@ietf.org, draft-ietf-httpbis-cdn-loop.all@ietf.org, ietf@ietf.org, ietf-http-wg@w3.org
References: <154386274295.5033.8259810220470907158@ietfa.amsl.com> <BEF06AF3-42E3-4795-B3DE-3FDC3AD947A2@mnot.net> <f6d36cdf-9447-0285-f51d-c78de9da8ffc@joelhalpern.com> <86F6B8B0-5CC4-4B65-9A4F-DFB6E0DBAE33@mnot.net>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <714b4660-89f3-ba67-74ee-98cfb6182de4@joelhalpern.com>
Date: Mon, 17 Dec 2018 22:56:00 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:60.0) Gecko/20100101 Thunderbird/60.3.3
MIME-Version: 1.0
In-Reply-To: <86F6B8B0-5CC4-4B65-9A4F-DFB6E0DBAE33@mnot.net>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/gen-art/OiRxip5XIwPfsWfdbWCGpigOLHg>
Subject: Re: [Gen-art] Genart last call review of draft-ietf-httpbis-cdn-loop-01
X-BeenThere: gen-art@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "GEN-ART: General Area Review Team" <gen-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/gen-art>, <mailto:gen-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/gen-art/>
List-Post: <mailto:gen-art@ietf.org>
List-Help: <mailto:gen-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/gen-art>, <mailto:gen-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Dec 2018 03:56:07 -0000

Thanks for the rewrite on the first one.

I can live without adding the comment on the second.  I think the 
security folks will wonder and have to reproduce the reasoning as to why 
it is a non-issue.  (But if you add that disclaimer, they will probably 
just come up with another one.)

Yours,
Joel

On 12/17/18 10:26 PM, Mark Nottingham wrote:
> 
> 
>> On 18 Dec 2018, at 1:16 pm, Joel M. Halpern <jmh@joelhalpern.com> wrote:
>>
>> Thank you Mark.
>> On the first item, please look carefully at the use of pronouns.  It took me several readings to realize which CDNS "they" referred to.
> 
> I've rewritten to:
> 
> """
> Note that a CDN that allows customers to remove or modify the CDN-Loop header field (i.e., they do not implement this specification) remains an attack vector against both implementing and non-implementing CDNs.
> """
> 
>> On the second item, it was not TLS protection I was referring to. Rather, I was imagining one bad cache stripping the loop prevention.  I think the real answer to that is that it is no worse than such a cache originating bad requests.
> 
> s/cache/intermediary/, but yes -- there isn't any (or at least significant) amplification.
> 
> Cheers,
> 
> 
>>
>> Yours,
>> Joel
>>
>> On 12/17/18 6:53 PM, Mark Nottingham wrote:
>>> Hi Joel,
>>> Thanks for the review.
>>>> On 4 Dec 2018, at 5:45 am, Joel Halpern <jmh@joelhalpern.com> wrote:
>>> ...
>>>>     This depends upon CDNs which have not been upgraded not stripping this
>>>>     header.  While I can believe that is a reasonable assumption, it seems that
>>>>     a paragraph explaining that it is the case, and if possible what experience
>>>>     leads us to think it is the case, would be helpful.
>>> I've added:
>>> """
>>> Note that if a CDN that does not implement this specification allows customers to remove or modify the CDN-Loop header field, that CDN could become an attack vector against other CDNs, even if they do implement it.
>>> """
>>>>     This document says that it is to protect against attackers causing loops.
>>>>     If the attacker is an external customer, the advice in the security
>>>>     considerations section makes sense.  The other apparent attack would be an
>>>>     attacker in the network who strips the information each time it comes past.
>>>>      I believe the reason this is only an apparent attack is that such an
>>>>     attacker could almost as easily simply generate additional messages instead
>>>>     of producing a loop.  If I have inferred this correctly, it seems useful to
>>>>     state it.
>>> CDN back-end connections are increasingly protected by HTTPS. Also, most back-end connections are over transit that's unlikely to meddle in these ways (unless a state actor is involved).
>>> Even so, the spec already says:
>>> """
>>> The threat model that the CDN-Loop header field addresses is a customer who is attempting to attack
>>> a service provider by configuring a forwarding loop by accident or malice.
>>> """
>>> .... which seems to address your concern. I'm wary of enumerating the attacks which this header doesn't prevent, since it's a necessarily open list. Inserting requirements like "back-end connections SHOULD be over HTTPS" are more appropriate for a general spec defining what a CDN is (and we're not there yet; this spec is a baby step towards that :).
>>> Cheers,
>>> --
>>> Mark Nottingham   https://www.mnot.net/
> 
> --
> Mark Nottingham   https://www.mnot.net/
>