Re: [http-auth] [saag] re-call for IETF http-auth BoF

Yutaka OIWA <y.oiwa@aist.go.jp> Mon, 06 June 2011 15:33 UTC

Return-Path: <y.oiwa@aist.go.jp>
X-Original-To: http-auth@ietfa.amsl.com
Delivered-To: http-auth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4D49021F8478 for <http-auth@ietfa.amsl.com>; Mon, 6 Jun 2011 08:33:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.84
X-Spam-Level:
X-Spam-Status: No, score=0.84 tagged_above=-999 required=5 tests=[AWL=0.930, BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id E2jdQcUpG-53 for <http-auth@ietfa.amsl.com>; Mon, 6 Jun 2011 08:33:02 -0700 (PDT)
Received: from mx1.aist.go.jp (mx1.aist.go.jp [150.29.246.133]) by ietfa.amsl.com (Postfix) with ESMTP id 5BDAA21F8442 for <http-auth@ietf.org>; Mon, 6 Jun 2011 08:33:02 -0700 (PDT)
Received: from rqsmtp1.aist.go.jp (rqsmtp1.aist.go.jp [150.29.254.115]) by mx1.aist.go.jp with ESMTP id p56FWjLN026691; Tue, 7 Jun 2011 00:32:45 +0900 (JST) env-from (y.oiwa@aist.go.jp)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=aist.go.jp; s=aist; t=1307374366; bh=FaYIzwbSV/7vEaxB8ij5UFeWgGjxujwlsyCQu3bA+K4=; h=From:Date:Message-ID; b=JMuT7/5+G2DJYF5ZcWHd9/fXvqevJTu7mUDREpCZryT7IhVgiI7VXI6sUMHotJuGA braed47C4OpGFMiPV6niiO8bYpOUGh3yG5Id++p7Samw0BYUOSwtbA+aacCHlR+p2t lOsY1Py08h0oaP9u1v1tsqd2m4D/QWycCClsOios=
Received: from smtp3.aist.go.jp by rqsmtp1.aist.go.jp with ESMTP id p56FWj3b012167; Tue, 7 Jun 2011 00:32:45 +0900 (JST) env-from (y.oiwa@aist.go.jp)
Received: by smtp3.aist.go.jp with ESMTP id p56FWjtH016273; Tue, 7 Jun 2011 00:32:45 +0900 (JST) env-from (y.oiwa@aist.go.jp)
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
References: <878vtgfbs1.fsf@bluewind.rcis.aist.go.jp> <A89D85D0-00AB-4F21-8841-6707E9CDCFC4@gmx.net>
From: Yutaka OIWA <y.oiwa@aist.go.jp>
Date: Tue, 07 Jun 2011 00:32:44 +0900
In-Reply-To: <A89D85D0-00AB-4F21-8841-6707E9CDCFC4@gmx.net> (Hannes Tschofenig's message of "Mon\, 6 Jun 2011 11\:30\:48 +0300")
Message-ID: <87pqmrdlgj.fsf@bluewind.rcis.aist.go.jp>
User-Agent: Gnus/5.11 (Gnus v5.11) Emacs/22.2 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Cc: http-auth@ietf.org
Subject: Re: [http-auth] [saag] re-call for IETF http-auth BoF
X-BeenThere: http-auth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: HTTP authentication methods <http-auth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/http-auth>, <mailto:http-auth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/http-auth>
List-Post: <mailto:http-auth@ietf.org>
List-Help: <mailto:http-auth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/http-auth>, <mailto:http-auth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Jun 2011 15:33:04 -0000

Dear Hannes,

thank you for good questions.

Hannes Tschofenig <hannes.tschofenig@gmx.net> writes:

>  * What is the biggest problem? 
>     You, for example, point to the usage of forms for user
>     authentication in Web pages in the agenda proposal.  The NSTIC
>     fans seem to believe that passwords are the problem to begin
>     with.

IMO, the main point is the lack of the protection for the
authentication credentials, and the lack of the mutual agreement and
assurance about authentication results.

For the first point, in current technology, the passwords are almost
used as a naked token (including the Digest authentication), which is
too weak in current computation environment; there are no protection
against steal by the communicated peer, no protection against
forwarding, etc. I understand that there will be no single solution to
solve the all problem, for example some high-secure applications such
as NSTIC or corporate-value banking needs cryptographic strong
credentials.  But, at the same time, passwords are the only tokens
which can be easily portable by human without help of mechanical
storages.  Both current federated ID management and cloud-based
password management, or even issuing/managing client certificates
online are relying on the password authentication in some form as a
starting point.  It is still worth to improve security of initial
password authentication with those stories.

For the second point, in many high-value applications the security
(privacy) of the user-submitted data is equally or even more important
as/than the integrity of client authorization (I do NOT mean that the
latter is unimportant :-).  Strong mutual authentication is a
important key for this.  Virtually all authentication technologies
which are currently available to Web are weak in this aspect,
including TLS client certificate authentication.  I believe that even
for non-password-based authentication this is important to be fixed.
I currently do not have a proposal for those non-password stories, but
we should really work on this, I believe.

As I mentioned and promised in the previous Bar-BoF, my proposal can
(and will) be separated to a core mutual authentication framework and
a specific algorithm for password-based authentication.  I welcome to
use the framework part for mutually securing other types of
authentications (if algorithmically applicable) as well as password
authentications.  It can also potentially provide shared keys for
channel-binding for higher-layer applications.

The third point, not mentioned earlier, is that all kinds of current
authentication methods, both password- and non-password-based, are 
just hard to use compared to Form-based authentication.
I'm also working on this "applicability" problem and proposing a solution.

>  * What solution approach is most promising? (or multiple approaches)

>      You seem to suggest to standardize a strong-password based
>      authentication mechanism in
>      http://tools.ietf.org/html/draft-oiwa-http-mutualauth-05 NSTIC
>      fans seem to believe that the approach is towards stronger
>      credentials (non-password-based) and the usage of federated
>      log-ins.  Again others believe that we will never agree on a
>      single authentication protocol and hence we need a framework
>      that allows passwords to be plugged in dynamically.  Browser
>      vendors are interested, as you may recall from the Identity in
>      the Browser discussion, in standardizing username/password form
>      indications so that the user does not need to type their
>      username & password too often into forms - but the browser does
>      it instead.

I believe we need multiple approaches, depending on the nature of each
specific application.  In my opinion, password authentication and
(better) certificate/private-key authentication are needed as starting
points.  I don't believe that current TLS client cert auth is the
perfect solution for the latter, however.  I also would like to see
how they can be integrated with federated authentication mechanisms.
Pluggable approaches need a little-bit careful consideration about the
mutual influences of plug-ins against total security, but my proposal
is actually going in that way in some aspects, as mentioned above.

# I really want to see someone proposing a draft fixing the
# certificate-based authentication to be more secure and useful :-)

In my personal opinion, browser-assisted fill-ins are in a different
layer, which means that we like to have both at the same time in the
future.  To easily use my proposed technology we need a good password
managers, and to make the browser-stored password secure in all time,
(I believe) we need a good underlying protocol e.g. for mutual
assurance and portability.

My personal intention to proposing BoF and a working group (if people
agrees) is to solve the whole problems, not only our proposed ones.
Currently I only have our draft to count on, but I really don't want
to finish by standardizing ours only.

# How should I write an agenda (or a proposed charter) in this situation?
# "Start-then-recharter" approach will work?

I don't know, however, how much extent of those can be worked on by
our proposed group within next several seasons.  I hope as much as
possible :-)

>  * How do we motivate the different stakeholders to implement and
>  deploy our favorite solutions? (There is also the usability issue
>  for the user.)

>     Whatever you come up with changes are needed on the client, and
>     on the server side. That requires a lot of cooperation.

This was (is) one of the most hard points for us (I believe not only
for our group :-).  But, for ensuring mutual authentication integrity,
we need at some point to change both peers anyway.

For the "technical" usability/deployability problem of the RFC 2617
HTTP authentication, we're actually proposing a solution for that.
For gradual transition, our current proposal can be parallel-served
with existing form-based authentication framework for transition
periods.  We also keep trying to keep contact with browser vendors, of
course.

-- 
Yutaka OIWA, Ph.D.                                       Research Scientist
                            Research Center for Information Security (RCIS)
    National Institute of Advanced Industrial Science and Technology (AIST)
                      Mail addresses: <y.oiwa@aist.go.jp>, <yutaka@oiwa.jp>
OpenPGP: id[440546B5] fp[7C9F 723A 7559 3246 229D  3139 8677 9BD2 4405 46B5]