Re: [Ietf-http-auth] Request for review and consensus -- draft-hartman-webauth-phishing

SM <sm@resistor.net> Mon, 08 September 2008 23:45 UTC

Return-Path: <sm@resistor.net>
X-Original-To: ietf-http-auth@osafoundation.org
Delivered-To: ietf-http-auth@osafoundation.org
Received: from laweleka.osafoundation.org (laweleka.osafoundation.org [204.152.186.98]) by leilani.osafoundation.org (Postfix) with ESMTP id 5974480D10 for <ietf-http-auth@osafoundation.org>; Mon, 8 Sep 2008 16:45:14 -0700 (PDT)
Received: from localhost (laweleka.osafoundation.org [127.0.0.1]) by laweleka.osafoundation.org (Postfix) with ESMTP id 04A8214222A for <ietf-http-auth@osafoundation.org>; Mon, 8 Sep 2008 16:45:13 -0700 (PDT)
X-Virus-Scanned: by amavisd-new and clamav at osafoundation.org
X-Spam-Score: -2.879
X-Spam-Level:
X-Spam-Status: No, score=-2.879 tagged_above=-50 required=4 tests=[AWL=-0.280, BAYES_00=-2.599]
Received: from laweleka.osafoundation.org ([127.0.0.1]) by localhost (laweleka.osafoundation.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id R+DktL36Bfih for <ietf-http-auth@osafoundation.org>; Mon, 8 Sep 2008 16:45:02 -0700 (PDT)
Received: from ns1.qubic.net (ns1.qubic.net [208.69.177.116]) by laweleka.osafoundation.org (Postfix) with ESMTP id 405D5142224 for <ietf-http-auth@osafoundation.org>; Mon, 8 Sep 2008 16:45:02 -0700 (PDT)
Received: from subman.resistor.net ([10.0.0.1]) (authenticated bits=0) by ns1.qubic.net (8.14.3/8.14.3) with ESMTP id m88NiUpe008514 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 8 Sep 2008 16:44:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=resistor.net; s=mail; t=1220917480; x=1221003880; bh=JJdjqfn5GIGKSl+bzgaeOKYSv1WTRMDQWgd4 zZpzjQ0=; h=Message-Id:Date:To:From:Subject:Cc:In-Reply-To: References:Mime-Version:Content-Type; b=m6aDc2pzLsyB30gkUF9IrRXLmN 1DyZ3fyOprNyAWdHBKsnKJ5viCSaXWaOtYwtq02loF0WTd327h/M1vjRyFfdgRYqAM8 jYqrgW0Hd9mTQKIANo9UfINzyNZQ/eliaTWIiyIJ6cFzLjEy/1UvfhULXiWTZcpR/91 /ueyXYZ7pXc=
DomainKey-Signature: a=rsa-sha1; s=mail; d=resistor.net; c=simple; q=dns; b=b+/jMFCp6n1c7s4vaggkV6G2xWZRo9F1qd0bjj3FV8uZesiLE6AiriC4QO9yBX9sO vfSqzF/5sZZNgDSEnel7Qo4lwpaymo/AJmch0x3CezVKkKFsMWna3W9O8LakCX/MR36 bk1XRwLQJ+Au4ioyTZeaw+xmrgmtZcPEOyB4r7w=
Message-Id: <6.2.5.6.2.20080908125602.02bb9ab8@resistor.net>
X-Mailer: QUALCOMM Windows Eudora Version 6.2.5.6
Date: Mon, 08 Sep 2008 15:00:20 -0700
To: Sam Hartman <hartmans-ietf@mit.edu>
From: SM <sm@resistor.net>
Subject: Re: [Ietf-http-auth] Request for review and consensus -- draft-hartman-webauth-phishing
In-Reply-To: <tsltzcqxzjb.fsf@mit.edu>
References: <47490048-25ED-403E-96B9-0D385F764292@osafoundation.org> <6.2.5.6.2.20080908104107.02d68650@resistor.net> <tsltzcqxzjb.fsf@mit.edu>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format="flowed"
Cc: ietf-http-auth@osafoundation.org
X-BeenThere: ietf-http-auth@osafoundation.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ietf-http-auth.osafoundation.org
List-Unsubscribe: <http://lists.osafoundation.org/cgi-bin/mailman/listinfo/ietf-http-auth>, <mailto:ietf-http-auth-request@osafoundation.org?subject=unsubscribe>
List-Archive: <http://lists.osafoundation.org/pipermail/ietf-http-auth>
List-Post: <mailto:ietf-http-auth@osafoundation.org>
List-Help: <mailto:ietf-http-auth-request@osafoundation.org?subject=help>
List-Subscribe: <http://lists.osafoundation.org/cgi-bin/mailman/listinfo/ietf-http-auth>, <mailto:ietf-http-auth-request@osafoundation.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Sep 2008 23:45:14 -0000

Hi Sam,
At 11:28 08-09-2008, Sam Hartman wrote:
>Can I get you to focus on what we want the ietf consensus to be 
>rather than on how to accomplish that?

Yes, we can.  Most of us would agree that phishing is a problem and 
something has to be done about it.  As such, your I-D is a step in 
the right direction.  In Section 1, it is mentioned that:

   "The requirements presented in this memo are intended to be useful to
    browser designers, designers of other HTTP applications and designers
    of future HTTP authentication mechanisms."

It may be difficult to gain IETF consensus on such requirements if 
the document does not take into account ongoing work such as 
draft-oiwa-http-mutualauth-03.  By coming up with a set of 
requirements at this stage, we may be constraining "other promising paths".

>I agree that we'll need to have a discussion of  how  to accomplish 
>that.  I think it is better to have a discussion of what we're 
>accomplishing though.

The document describes a threat model, then gets in protocol and user 
interface issues.  What we are accomplishing is mixing the two sides 
of the issue.

>Can I get you to ignore the intended status, review section 1.1 and
>the rest of the draft and comment on whether you think that would be a
>good position for the IETF to take on this issue, and if not, what
>position the IETF should take?

1. Does the work fall under the purview of the IETF?

2. Is the IETF in a position to solve the problem?

3. Is there interest within the IETF to work on a solution?

In my opinion, the IETF could tackle the protocol questions whereas 
the user interface questions are better suited for the W3C.  As we 
are discussing about requirements, it may be better to get this done 
through a Working Group effort.  If the community believes that the 
answers to the above questions are yes, then I would say "take on the 
issue".  Otherwise, we can settle for "the IETF takes no position".

Quoting a sentence from Section 3:

    "We assume that users have limited motivation to combat phishing."

I beg to differ.  That sounds like the users do not care about 
phishing.  Some users have the motivation but they don't know how to 
do it.  In a nutshell, we have failed in providing them with adequate 
tools to detect phishing attempts.

>No, I believe this ID makes no normative statement about how a user
>interface should be constructed.  It does make statements about what
>the protocol requires of the user interface at a very abstract
>level--well within what I've seen from other standards.

In Section 4.1:

   "The web authentication solution MUST support the password user
    interface and MUST be secure even when the password interface is
    commonly used."

I don't see how we can set a requirement level for a password user 
interface.  What we can do is to provide "hooks" into the system so 
as to interact with it through an API.

   "A solution to these requirements MUST also support smart cards and
    other authentication solutions."
Again, I don't see why smart cards is a MUST.

Regards,
-sm