Re: [http-auth] Normalization forms in draft-ietf-httpauth-basicauth-enc

Bjoern Hoehrmann <derhoermi@gmx.net> Tue, 02 July 2013 13:52 UTC

Return-Path: <derhoermi@gmx.net>
X-Original-To: http-auth@ietfa.amsl.com
Delivered-To: http-auth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D8DC721F9E49 for <http-auth@ietfa.amsl.com>; Tue, 2 Jul 2013 06:52:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8DuC2fXbmMLL for <http-auth@ietfa.amsl.com>; Tue, 2 Jul 2013 06:52:18 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.19]) by ietfa.amsl.com (Postfix) with ESMTP id 11C0321F9E48 for <http-auth@ietf.org>; Tue, 2 Jul 2013 06:52:18 -0700 (PDT)
Received: from mailout-de.gmx.net ([10.1.76.32]) by mrigmx.server.lan (mrigmx001) with ESMTP (Nemesis) id 0MQKg6-1UoTef04xI-00TjwH for <http-auth@ietf.org>; Tue, 02 Jul 2013 15:52:17 +0200
Received: (qmail invoked by alias); 02 Jul 2013 13:52:16 -0000
Received: from p5B2339F3.dip0.t-ipconnect.de (EHLO netb.Speedport_W_700V) [91.35.57.243] by mail.gmx.net (mp032) with SMTP; 02 Jul 2013 15:52:16 +0200
X-Authenticated: #723575
X-Provags-ID: V01U2FsdGVkX1/I/Gw+L8rIUNTbB/hObeH2cUEo4hJYuJistdHYVt tgwnl46BH+kj8L
From: Bjoern Hoehrmann <derhoermi@gmx.net>
To: Yoav Nir <ynir@checkpoint.com>
Date: Tue, 02 Jul 2013 15:52:14 +0200
Message-ID: <f9l5t8lou21ekkc3mjqs0rng2mujvajfap@hive.bjoern.hoehrmann.de>
References: <20130630142838.31885.15315.idtracker@ietfa.amsl.com> <51D04326.5060600@gmx.de> <DEA2EA74-7587-4CAA-9424-4478B136308E@vpnc.org> <51D09F98.2070508@gmail.com> <D434C8F9-D3DC-40EB-A25A-3A259C1A22E6@vpnc.org> <51D1175C.3020007@it.aoyama.ac.jp> <51D11AD4.5050705@gmx.de> <is85t8ti72t5tabfbslqk33oqupjhmmbdr@hive.bjoern.hoehrmann.de> <CD0BB486-C08B-41DB-B30F-87F417F3FA68@checkpoint.com>
In-Reply-To: <CD0BB486-C08B-41DB-B30F-87F417F3FA68@checkpoint.com>
X-Mailer: Forte Agent 3.3/32.846
MIME-Version: 1.0
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 8bit
X-Y-GMX-Trusted: 0
Cc: Julian Reschke <julian.reschke@gmx.de>, "<http-auth@ietf.org>" <http-auth@ietf.org>, Paul Hoffman <paul.hoffman@vpnc.org>
Subject: Re: [http-auth] Normalization forms in draft-ietf-httpauth-basicauth-enc
X-BeenThere: http-auth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: HTTP authentication methods <http-auth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/http-auth>, <mailto:http-auth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/http-auth>
List-Post: <mailto:http-auth@ietf.org>
List-Help: <mailto:http-auth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/http-auth>, <mailto:http-auth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jul 2013 13:52:31 -0000

* Yoav Nir wrote:
>The group can decide to mandate one behavior (entirely server-side) for 
>basicauth, and something else for others (like maybe negotiate the kind 
>of normalization to perform). But I'd rather we use the same kind of 
>processing for all methods unless there's a good reason to do so. 

The specification in question cannot really require server-side normali-
sation. It is entirely up to the server whether to authorize a client to
access its resources. The server might treat user names case-sensitively
or might reject passwords that are not in NFC form or do whatever else
it feels like. You cannot make a black box test that would demonstrate
non-compliance to such a requirement. This would rather note that use of
certain combinations of characters can result in unexpected failures and
various forms of normalisation and tolerances can be used to mitigate.

I think it would be out of scope of the document to do much more and it
would very likely delay and complicate deployment without a clear gain.

There is of course the option to make sure the draft defines that user
agents must treat certain unrecognized values for the charset parameter
or multiple `WWW-Authenticate` headers for the same Basic realm such
that servers have an option to opt into client-side normalization later,
if the group decides on some common options. So,

  WWW-Authenticate: Basic realm="example", charset="UTF-8/NFCv6+"

or

  WWW-Authenticate: Basic realm="example", charset="UTF-8", x="precis"
  WWW-Authenticate: Basic realm="example", charset="UTF-8"

for instance.
-- 
Björn Höhrmann · mailto:bjoern@hoehrmann.de · http://bjoern.hoehrmann.de
Am Badedeich 7 · Telefon: +49(0)160/4415681 · http://www.bjoernsworld.de
25899 Dagebüll · PGP Pub. KeyID: 0xA4357E78 · http://www.websitedev.de/