Re: [http-auth] Richard Barnes' Discuss on draft-ietf-httpauth-basicauth-update-06: (with DISCUSS and COMMENT)

Julian Reschke <julian.reschke@greenbytes.de> Wed, 18 February 2015 19:52 UTC

Return-Path: <julian.reschke@greenbytes.de>
X-Original-To: http-auth@ietfa.amsl.com
Delivered-To: http-auth@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5530F1A0155; Wed, 18 Feb 2015 11:52:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.561
X-Spam-Level:
X-Spam-Status: No, score=-1.561 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JWqglRRxnqGD; Wed, 18 Feb 2015 11:52:12 -0800 (PST)
Received: from mail.greenbytes.de (mail.greenbytes.de [217.91.35.233]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 90B191A0179; Wed, 18 Feb 2015 11:52:12 -0800 (PST)
Received: from [192.168.2.175] (unknown [93.217.116.45]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by mail.greenbytes.de (Postfix) with ESMTPSA id 2396D15A047B; Wed, 18 Feb 2015 20:52:09 +0100 (CET)
Message-ID: <54E4ED66.4040100@greenbytes.de>
Date: Wed, 18 Feb 2015 20:52:06 +0100
From: Julian Reschke <julian.reschke@greenbytes.de>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.4.0
MIME-Version: 1.0
To: Richard Barnes <rlb@ipv.sx>, The IESG <iesg@ietf.org>
References: <20150218194749.23802.1910.idtracker@ietfa.amsl.com>
In-Reply-To: <20150218194749.23802.1910.idtracker@ietfa.amsl.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/http-auth/37KOn-vI0C2rOojsV8mj3XS_n_E>
Cc: http-auth@ietf.org, draft-ietf-httpauth-basicauth-update.all@ietf.org, httpauth-chairs@ietf.org
Subject: Re: [http-auth] Richard Barnes' Discuss on draft-ietf-httpauth-basicauth-update-06: (with DISCUSS and COMMENT)
X-BeenThere: http-auth@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: HTTP authentication methods <http-auth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/http-auth>, <mailto:http-auth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/http-auth/>
List-Post: <mailto:http-auth@ietf.org>
List-Help: <mailto:http-auth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/http-auth>, <mailto:http-auth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Feb 2015 19:52:15 -0000

On 2015-02-18 20:47, Richard Barnes wrote:
> Richard Barnes has entered the following ballot position for
> draft-ietf-httpauth-basicauth-update-06: Discuss
>
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
>
>
> Please refer to http://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
>
>
> The document, along with other ballot positions, can be found here:
> http://datatracker.ietf.org/doc/draft-ietf-httpauth-basicauth-update/
>
>
>
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
>
> Section 2.2 seems like a significant departure from RFC 2617, which says
> nothing about the scope of authentication.

It's only a rephrasing of 
<http://greenbytes.de/tech/webdav/rfc2617.html#rfc.section.2.p.8>.

> (1) Did the WG discuss the compatibility impact of this change?  Although
> clients might send the Authorization header preemptively, they should
> still be prepared to get a 401 response back.
>
> (2) Did the WG discuss the possibilities for leakage of credentials due
> to this change?  It's not hard to imagine scenarios where, say,
> "http://example.com/~user1" and "http://example.com/~user2" are
> controlled by different entities, and leakage between them would be
> harmful.
>
> (3) At the very least, there needs to be (a) a mention of this change in
> Appendix A, and (b) a discussion of leakage through unsolicited
> Authorization headers in the Security Considerations.
>
>
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>
> The current text on the use of TLS is an OK start, but I would prefer if
> it were refactored so that the recommendation against Basic were general
> to HTTP and HTTPS.
>
> "Because Basic authentication involves the cleartext transmission of
> passwords it SHOULD NOT be used except over a secure channel such as
> HTTPS [RFC2818]. Likewise, due to the risk of compromise, Basic
> authentication SHOULD NOT be used to protect sensitive or valuable
> information."
>
>


-- 
<green/>bytes GmbH, Hafenweg 16, D-48155 Münster, Germany
Amtsgericht Münster: HRB5782