Re: [Geopriv] Please note: Re: I-D Action: draft-ietf-geopriv-deref-protocol-06.txt

Martin Thomson <martin.thomson@gmail.com> Fri, 13 July 2012 18:23 UTC

Return-Path: <martin.thomson@gmail.com>
X-Original-To: geopriv@ietfa.amsl.com
Delivered-To: geopriv@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CDABF21F86B7 for <geopriv@ietfa.amsl.com>; Fri, 13 Jul 2012 11:23:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.701
X-Spam-Level:
X-Spam-Status: No, score=-4.701 tagged_above=-999 required=5 tests=[AWL=0.898, BAYES_00=-2.599, GB_I_LETTER=-2, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HEh3nolhY1B2 for <geopriv@ietfa.amsl.com>; Fri, 13 Jul 2012 11:23:55 -0700 (PDT)
Received: from mail-bk0-f44.google.com (mail-bk0-f44.google.com [209.85.214.44]) by ietfa.amsl.com (Postfix) with ESMTP id 4CD9B21F86B4 for <geopriv@ietf.org>; Fri, 13 Jul 2012 11:23:55 -0700 (PDT)
Received: by bkty7 with SMTP id y7so3093459bkt.31 for <geopriv@ietf.org>; Fri, 13 Jul 2012 11:24:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=tkEJd9pO0qsVq8oJ6eozrIIZ+Kkd2JnxUJmoTYn5f8o=; b=Z8CTvMvZP8vatk8U8Ff9spx0irmv4vi8YPVA5JFcv4ktesBhRwn9Tu1Nv2843CZQis UuChzbsaidWnKBR5D6dx/jx5xqdtcjIp7lwe50z5jKbngcmEI2X/TyaIApUtMj0k2kS6 TmwaAmuMwNCUKC06Bg7WdmIlG4i5VBNwwCCDGB4skmRxt+/ts3PCrj4AlwJS9MMmRWgy vo5q0+WQXJeNe4j/7K2X2JGqDPL/DQPjm3/I8JPISijzcHC8z3f0huFDGkASI9KmHhjz XPvlSk4h+0TyRsYOl/QYwe1rwbJ/GEH5I8r9gZB026PSs43CdY2TFUY3bZeQbGDbsVhH JbQw==
MIME-Version: 1.0
Received: by 10.205.132.6 with SMTP id hs6mr1530885bkc.26.1342203870594; Fri, 13 Jul 2012 11:24:30 -0700 (PDT)
Received: by 10.204.66.17 with HTTP; Fri, 13 Jul 2012 11:24:30 -0700 (PDT)
In-Reply-To: <A6D7C283-D50B-40A0-8279-B8B1D4BA0A88@bbn.com>
References: <20120711231357.12731.12817.idtracker@ietfa.amsl.com> <4FFF145D.9050409@nostrum.com> <6277DD8F-3932-45B8-A68A-04820E0EAA55@bbn.com> <50003106.2080800@nostrum.com> <D77B2668-C930-4D56-B857-805729C13A23@bbn.com> <CABkgnnX0=dEt9dYRw+h4aoUhs1w_MCwxFpwVQb5ViEVQ38M=pQ@mail.gmail.com> <A6D7C283-D50B-40A0-8279-B8B1D4BA0A88@bbn.com>
Date: Fri, 13 Jul 2012 11:24:30 -0700
Message-ID: <CABkgnnXHN9+Xaq04eqgMNm263Dg5T4CbcKdZEyAAee_wZ05-Tg@mail.gmail.com>
From: Martin Thomson <martin.thomson@gmail.com>
To: "Richard L. Barnes" <rbarnes@bbn.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Cc: geopriv@ietf.org, draft-ietf-geopriv-deref-protocol@tools.ietf.org, sec-ads@tools.ietf.org
Subject: Re: [Geopriv] Please note: Re: I-D Action: draft-ietf-geopriv-deref-protocol-06.txt
X-BeenThere: geopriv@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Geographic Location/Privacy <geopriv.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/geopriv>, <mailto:geopriv-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/geopriv>
List-Post: <mailto:geopriv@ietf.org>
List-Help: <mailto:geopriv-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/geopriv>, <mailto:geopriv-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Jul 2012 18:23:57 -0000

The text that you propose contains the same escape clause, which is
either sufficient for this, or not.  That is, "unless confidentiality
and integrity protection are provided by some other mechanism".

If the "other mechanism" is unicorns and fairies, as long as the
people deploying are OK with that, then the letter and spirit of the
language is adhered to.  We all sleep soundly at night knowing that
the fairy princess and her noble unicorn mount are defending our
location privacy.

I think that you might need to provide a stronger case for the weaker
security you advocate.

--Martin

On 13 July 2012 09:37, Richard L. Barnes <rbarnes@bbn.com> wrote:
> Thanks, Martin.
>
> The reason I'm cautious about the "only respond over HTTPS" suggested by Robert is that it seems to me to disallow the redirect case.  Even though the redirect case does have the vulnerability that you point out, it can be a fail-safe in case an HTTPS URI gets transposed to an HTTP URI.
>
> But if we don't say "only respond over HTTPS", then we need to clarify that you shouldn't actually do a dereference over HTTP, just ancillary stuff like redirects.
>
>
>
>
> On Jul 13, 2012, at 12:16 PM, Martin Thomson wrote:
>
>> This is more explicit text, which makes things a lot clearer.  In
>> particular, I like the point that it is the choice of the server to
>> choose an http: URI.
>>
>> I don't see the need for your more recent additions, which implies
>> permission to do these things.  When redirects from HTTP are
>> encouraged (though I hardly think that is your intent, that's how it
>> appears to me), this offers an attacker the opportunity to change the
>> URI target.  I'd rather just drop any statements of that sort.  I
>> prefer your original suggestion, with the edits implied by Robert.
>>
>> --Martin
>>
>> On 13 July 2012 09:05, Richard L. Barnes <rbarnes@bbn.com> wrote:
>>> I don't think we want to preclude HTTP entirely.  For example, a LIS might want to use HTTP to redirect clients to HTTPS if they decide to try going non-secure.  But obviously, it shouldn't send location in HTTPS unless alternative protections are in place.
>>>
>>> NEW:
>>> "
>>> The scheme of a location URI determines whether or not TLS is used on a given dereference transaction.  Location Servers MUST be configured to issue only HTTPS URIs and respond to only to HTTPS dereference request, unless confidentiality and integrity protection are provided by some other mechanism.  For example, the server might only accept requests from clients within a trusted network, or via an IPsec-protected channel.  Location Servers MAY respond to dereference requests over HTTP, but MUST NOT provide location information over HTTP unless alternative protections are in place.  HTTP should only be used for ancillary functions, such as redirecting clients toward HTTPS URIs.  Dereference clients MUST support dereference of HTTPS URIs and SHOULD support dereference of HTTP URIs.
>>> "
>>>
>>>
>>>
>>>
>>> On Jul 13, 2012, at 10:30 AM, Robert Sparks wrote:
>>>
>>>> Hi Richard.
>>>>
>>>> Where you say "be configure to" and "respond to", do you mean "be configured to only" and "respond only to"?
>>>>
>>>> RjS
>>>>
>>>> On 7/12/12 2:35 PM, Richard L. Barnes wrote:
>>>>> <hat type="individual"/>
>>>>>
>>>>> I would prefer that this text make a little clearer which entities in the protocol are required to do something and when.
>>>>>
>>>>> OLD:
>>>>> "
>>>>> TLS SHOULD be used.
>>>>> "
>>>>>
>>>>> NEW:
>>>>> "
>>>>> The scheme of a location URI determines whether or not TLS is used on a given dereference transaction.  Location Servers MUST be configured to issue HTTPS URIs and respond to HTTPS dereference request, unless confidentiality and integrity protection are provided by some other mechanism.  For example, the server might only accept requests from clients within a trusted network, or via an IPsec-protected channel.  Dereference clients MUST support dereference of HTTPS URIs and SHOULD support dereference of HTTP URIs.
>>>>> "
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> On Jul 12, 2012, at 2:15 PM, Robert Sparks wrote:
>>>>>
>>>>>> This revision addressed all the points from IESG review.
>>>>>>
>>>>>> Notably, it contained a clarification to when TLS is required:
>>>>>>
>>>>>> OLD:
>>>>>>  TLS SHOULD be used.
>>>>>>
>>>>>> NEW:
>>>>>>   TLS MUST be used unless confidentiality and integrity are provided by
>>>>>>   some other mechanism, such as IPsec or a fully trusted network.
>>>>>>   Without a reliable assertion that a mechanism is in place, such as
>>>>>>   through configuration or user override, then TLS MUST be used.
>>>>>>
>>>>>> If you have a concern with this change, please let me know ASAP.
>>>>>> If I haven't heard anything I'll approve the document towards the end of next week.
>>>>>>
>>>>>> RjS
>>>>>> On 7/11/12 6:13 PM, internet-drafts@ietf.org wrote:
>>>>>>> A New Internet-Draft is available from the on-line Internet-Drafts directories.
>>>>>>> This draft is a work item of the Geographic Location/Privacy Working Group of the IETF.
>>>>>>>
>>>>>>>   Title           : A Location Dereferencing Protocol Using HELD
>>>>>>>   Author(s)       : James Winterbottom
>>>>>>>                          Hannes Tschofenig
>>>>>>>                          Henning Schulzrinne
>>>>>>>                          Martin Thomson
>>>>>>>   Filename        : draft-ietf-geopriv-deref-protocol-06.txt
>>>>>>>   Pages           : 23
>>>>>>>   Date            : 2012-07-11
>>>>>>>
>>>>>>> Abstract:
>>>>>>>   This document describes how to use the Hypertext Transfer Protocol
>>>>>>>   (HTTP) over Transport Layer Security (TLS) as a dereferencing
>>>>>>>   protocol to resolve a reference to a Presence Information Data Format
>>>>>>>   Location Object (PIDF-LO).  The document assumes that a Location
>>>>>>>   Recipient possesses a URI that can be used in conjunction with the
>>>>>>>   HTTP-Enabled Location Delivery (HELD) protocol to request the
>>>>>>>   location of the Target.
>>>>>>>
>>>>>>>
>>>>>>> The IETF datatracker status page for this draft is:
>>>>>>>
>>>>>>> https://datatracker.ietf.org/doc/draft-ietf-geopriv-deref-protocol
>>>>>>>
>>>>>>>
>>>>>>> There's also a htmlized version available at:
>>>>>>>
>>>>>>> http://tools.ietf.org/html/draft-ietf-geopriv-deref-protocol-06
>>>>>>>
>>>>>>>
>>>>>>> A diff from previous version is available at:
>>>>>>>
>>>>>>> http://tools.ietf.org/rfcdiff?url2=draft-ietf-geopriv-deref-protocol-06
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> Internet-Drafts are also available by anonymous FTP at:
>>>>>>>
>>>>>>> ftp://ftp.ietf.org/internet-drafts/
>>>>>>>
>>>>>>>
>>>>>>> _______________________________________________
>>>>>>> Geopriv mailing list
>>>>>>>
>>>>>>> Geopriv@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/geopriv
>>>>>>
>>>>>> _______________________________________________
>>>>>> Geopriv mailing list
>>>>>> Geopriv@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/geopriv
>>>>
>>>>
>>>
>>> _______________________________________________
>>> Geopriv mailing list
>>> Geopriv@ietf.org
>>> https://www.ietf.org/mailman/listinfo/geopriv
>