Re: [Geopriv] Please note: Re: I-D Action: draft-ietf-geopriv-deref-protocol-06.txt

Martin Thomson <martin.thomson@gmail.com> Fri, 13 July 2012 16:15 UTC

Return-Path: <martin.thomson@gmail.com>
X-Original-To: geopriv@ietfa.amsl.com
Delivered-To: geopriv@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D4D9C21F86CF for <geopriv@ietfa.amsl.com>; Fri, 13 Jul 2012 09:15:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.711
X-Spam-Level:
X-Spam-Status: No, score=-3.711 tagged_above=-999 required=5 tests=[AWL=-0.112, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gp816r0yxC70 for <geopriv@ietfa.amsl.com>; Fri, 13 Jul 2012 09:15:35 -0700 (PDT)
Received: from mail-bk0-f44.google.com (mail-bk0-f44.google.com [209.85.214.44]) by ietfa.amsl.com (Postfix) with ESMTP id 2220921F86CE for <geopriv@ietf.org>; Fri, 13 Jul 2012 09:15:26 -0700 (PDT)
Received: by bkty7 with SMTP id y7so2996691bkt.31 for <geopriv@ietf.org>; Fri, 13 Jul 2012 09:16:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=LMh6FhqPW5UlwcexZOTHTwWLfIJPk7pqJH9kpiizPuw=; b=k2/5seOn4XA8SzBAlm35WZidR+HEEvLMWiYStPNsCAHp9V9t/gEpk8obFErihEBFED FyagLDax3lb7Xo9DjM5Mfx5pPxq0bc0VnNtHgJurq31RvgZKZCyV8AgZAip/vgu3l/cL TEmYugXFh8ETYXIqWG6eq0Eh3JEPCGMPXrInUjUOAXQ26VF7aO5j7hHknYsPePi45IUj +XOhwU3jUEeXGsqB/PXWX1DOxp5EB4sXil696zwDJwKNndeMLtGh5VPBpBlvz9PjkhWy /361PfVBy+XyAkC6KKkQNXABqqahhYQBG+7dp20iYDD0miKlRdqYaK2o2sod4NBcOj9y DeFA==
MIME-Version: 1.0
Received: by 10.204.155.69 with SMTP id r5mr1335375bkw.49.1342196162793; Fri, 13 Jul 2012 09:16:02 -0700 (PDT)
Received: by 10.204.66.17 with HTTP; Fri, 13 Jul 2012 09:16:02 -0700 (PDT)
In-Reply-To: <D77B2668-C930-4D56-B857-805729C13A23@bbn.com>
References: <20120711231357.12731.12817.idtracker@ietfa.amsl.com> <4FFF145D.9050409@nostrum.com> <6277DD8F-3932-45B8-A68A-04820E0EAA55@bbn.com> <50003106.2080800@nostrum.com> <D77B2668-C930-4D56-B857-805729C13A23@bbn.com>
Date: Fri, 13 Jul 2012 09:16:02 -0700
Message-ID: <CABkgnnX0=dEt9dYRw+h4aoUhs1w_MCwxFpwVQb5ViEVQ38M=pQ@mail.gmail.com>
From: Martin Thomson <martin.thomson@gmail.com>
To: "Richard L. Barnes" <rbarnes@bbn.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Cc: geopriv@ietf.org, draft-ietf-geopriv-deref-protocol@tools.ietf.org, sec-ads@tools.ietf.org
Subject: Re: [Geopriv] Please note: Re: I-D Action: draft-ietf-geopriv-deref-protocol-06.txt
X-BeenThere: geopriv@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Geographic Location/Privacy <geopriv.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/geopriv>, <mailto:geopriv-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/geopriv>
List-Post: <mailto:geopriv@ietf.org>
List-Help: <mailto:geopriv-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/geopriv>, <mailto:geopriv-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Jul 2012 16:15:37 -0000

This is more explicit text, which makes things a lot clearer.  In
particular, I like the point that it is the choice of the server to
choose an http: URI.

I don't see the need for your more recent additions, which implies
permission to do these things.  When redirects from HTTP are
encouraged (though I hardly think that is your intent, that's how it
appears to me), this offers an attacker the opportunity to change the
URI target.  I'd rather just drop any statements of that sort.  I
prefer your original suggestion, with the edits implied by Robert.

--Martin

On 13 July 2012 09:05, Richard L. Barnes <rbarnes@bbn.com> wrote:
> I don't think we want to preclude HTTP entirely.  For example, a LIS might want to use HTTP to redirect clients to HTTPS if they decide to try going non-secure.  But obviously, it shouldn't send location in HTTPS unless alternative protections are in place.
>
> NEW:
> "
> The scheme of a location URI determines whether or not TLS is used on a given dereference transaction.  Location Servers MUST be configured to issue only HTTPS URIs and respond to only to HTTPS dereference request, unless confidentiality and integrity protection are provided by some other mechanism.  For example, the server might only accept requests from clients within a trusted network, or via an IPsec-protected channel.  Location Servers MAY respond to dereference requests over HTTP, but MUST NOT provide location information over HTTP unless alternative protections are in place.  HTTP should only be used for ancillary functions, such as redirecting clients toward HTTPS URIs.  Dereference clients MUST support dereference of HTTPS URIs and SHOULD support dereference of HTTP URIs.
> "
>
>
>
>
> On Jul 13, 2012, at 10:30 AM, Robert Sparks wrote:
>
>> Hi Richard.
>>
>> Where you say "be configure to" and "respond to", do you mean "be configured to only" and "respond only to"?
>>
>> RjS
>>
>> On 7/12/12 2:35 PM, Richard L. Barnes wrote:
>>> <hat type="individual"/>
>>>
>>> I would prefer that this text make a little clearer which entities in the protocol are required to do something and when.
>>>
>>> OLD:
>>> "
>>> TLS SHOULD be used.
>>> "
>>>
>>> NEW:
>>> "
>>> The scheme of a location URI determines whether or not TLS is used on a given dereference transaction.  Location Servers MUST be configured to issue HTTPS URIs and respond to HTTPS dereference request, unless confidentiality and integrity protection are provided by some other mechanism.  For example, the server might only accept requests from clients within a trusted network, or via an IPsec-protected channel.  Dereference clients MUST support dereference of HTTPS URIs and SHOULD support dereference of HTTP URIs.
>>> "
>>>
>>>
>>>
>>>
>>>
>>> On Jul 12, 2012, at 2:15 PM, Robert Sparks wrote:
>>>
>>>> This revision addressed all the points from IESG review.
>>>>
>>>> Notably, it contained a clarification to when TLS is required:
>>>>
>>>> OLD:
>>>>   TLS SHOULD be used.
>>>>
>>>> NEW:
>>>>    TLS MUST be used unless confidentiality and integrity are provided by
>>>>    some other mechanism, such as IPsec or a fully trusted network.
>>>>    Without a reliable assertion that a mechanism is in place, such as
>>>>    through configuration or user override, then TLS MUST be used.
>>>>
>>>> If you have a concern with this change, please let me know ASAP.
>>>> If I haven't heard anything I'll approve the document towards the end of next week.
>>>>
>>>> RjS
>>>>  On 7/11/12 6:13 PM, internet-drafts@ietf.org wrote:
>>>>> A New Internet-Draft is available from the on-line Internet-Drafts directories.
>>>>>  This draft is a work item of the Geographic Location/Privacy Working Group of the IETF.
>>>>>
>>>>>    Title           : A Location Dereferencing Protocol Using HELD
>>>>>    Author(s)       : James Winterbottom
>>>>>                           Hannes Tschofenig
>>>>>                           Henning Schulzrinne
>>>>>                           Martin Thomson
>>>>>    Filename        : draft-ietf-geopriv-deref-protocol-06.txt
>>>>>    Pages           : 23
>>>>>    Date            : 2012-07-11
>>>>>
>>>>> Abstract:
>>>>>    This document describes how to use the Hypertext Transfer Protocol
>>>>>    (HTTP) over Transport Layer Security (TLS) as a dereferencing
>>>>>    protocol to resolve a reference to a Presence Information Data Format
>>>>>    Location Object (PIDF-LO).  The document assumes that a Location
>>>>>    Recipient possesses a URI that can be used in conjunction with the
>>>>>    HTTP-Enabled Location Delivery (HELD) protocol to request the
>>>>>    location of the Target.
>>>>>
>>>>>
>>>>> The IETF datatracker status page for this draft is:
>>>>>
>>>>> https://datatracker.ietf.org/doc/draft-ietf-geopriv-deref-protocol
>>>>>
>>>>>
>>>>> There's also a htmlized version available at:
>>>>>
>>>>> http://tools.ietf.org/html/draft-ietf-geopriv-deref-protocol-06
>>>>>
>>>>>
>>>>> A diff from previous version is available at:
>>>>>
>>>>> http://tools.ietf.org/rfcdiff?url2=draft-ietf-geopriv-deref-protocol-06
>>>>>
>>>>>
>>>>>
>>>>> Internet-Drafts are also available by anonymous FTP at:
>>>>>
>>>>> ftp://ftp.ietf.org/internet-drafts/
>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> Geopriv mailing list
>>>>>
>>>>> Geopriv@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/geopriv
>>>>
>>>> _______________________________________________
>>>> Geopriv mailing list
>>>> Geopriv@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/geopriv
>>
>>
>
> _______________________________________________
> Geopriv mailing list
> Geopriv@ietf.org
> https://www.ietf.org/mailman/listinfo/geopriv