Re: [http-auth] AD review of draft-ietf-httpauth-mutual-08

Yutaka OIWA <y.oiwa@aist.go.jp> Thu, 22 September 2016 12:52 UTC

Return-Path: <y.oiwa@aist.go.jp>
X-Original-To: http-auth@ietfa.amsl.com
Delivered-To: http-auth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B3B2312DCF5 for <http-auth@ietfa.amsl.com>; Thu, 22 Sep 2016 05:52:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level:
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=aist.go.jp
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id R4IDdxq97NmU for <http-auth@ietfa.amsl.com>; Thu, 22 Sep 2016 05:52:26 -0700 (PDT)
Received: from JPN01-OS2-obe.outbound.protection.outlook.com (mail-os2jpn01on0061.outbound.protection.outlook.com [104.47.92.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AA7FA12B01D for <http-auth@ietf.org>; Thu, 22 Sep 2016 05:45:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=aist.go.jp; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=QEQUCsbsVn3s+nFHDNhoCt6zUY3e3TMF4GdyhXLuUdE=; b=AKE98OZhBrUZw9EXOgvNHMTrExfxOpdypLrpRwmjpRt8QISjjyA9egsJxHhK/ao9DLp3LIH+6q9glOW7PK9ug+3PBDR/sSoNG6PvBrlbP9gSUqG98eM0Lnj7iASksS+wxUP7hhRAjyvDnr70gjDLNkqATIq8J2uq10jDPWCLl7g=
Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=y.oiwa@aist.go.jp;
Received: from [192.168.0.176] (219.67.14.212) by OSXPR01MB0581.jpnprd01.prod.outlook.com (10.167.146.143) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.629.8; Thu, 22 Sep 2016 12:45:52 +0000
To: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>, "http-auth@ietf.org" <http-auth@ietf.org>
References: <CAHbuEH5YL=WHfqf7xvUfU8gmmYoJ7ZwD0R=BUfoE1+PT5haqJQ@mail.gmail.com>
From: Yutaka OIWA <y.oiwa@aist.go.jp>
X-Enigmail-Draft-Status: N1110
Message-ID: <57E3D237.50001@aist.go.jp>
Date: Thu, 22 Sep 2016 21:44:39 +0900
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.5.0
MIME-Version: 1.0
In-Reply-To: <CAHbuEH5YL=WHfqf7xvUfU8gmmYoJ7ZwD0R=BUfoE1+PT5haqJQ@mail.gmail.com>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: 7bit
X-Originating-IP: [219.67.14.212]
X-ClientProxiedBy: OSXPR01CA0045.jpnprd01.prod.outlook.com (10.167.144.23) To OSXPR01MB0581.jpnprd01.prod.outlook.com (10.167.146.143)
X-MS-Office365-Filtering-Correlation-Id: 8cb5fb7c-7d51-4378-b85c-08d3e2e66340
X-Microsoft-Exchange-Diagnostics: 1; OSXPR01MB0581; 2:Mms+VFiPe/4yh+G/WY5kHMTXjiw5p0RrpHN+gFgHVdBst9diovZF2i14whe03GtcRQ3k+BnLqLcluZ3Ruf6qC69ovPTg/ON4FGQzsQ+o3mKlm0/1ZeB+rh8gHaxKLrOc0kyBrg24udTxGjrHQuBXNmUngmeAwRSvQMsvZTILsn4VOLJPbIUDatIU7bzstEmr; 3:mrCp9IdyXISu8TPvkVXVIONvLBk3AXk+oya9S0hmn1Nc7J0tONHUhtgGNx2Hh4qX6JCWBqWKBv4rTRHMmQkdGPpxHL3Qb7q+A5P1zl0CJQlOaopHSUlvYCKaJe4k/cgI
X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:OSXPR01MB0581;
X-Microsoft-Exchange-Diagnostics: 1; OSXPR01MB0581; 25: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
X-Microsoft-Exchange-Diagnostics: 1; OSXPR01MB0581; 31:QLBjZAr6ZMHnO1PsWKRvC9K50nne1bOLJQo548ibJ2XQSTDHm1zsF6hv6S3NbUbfgzo26cqNR+kOmD5XC36uWK903Mq6sDlzKxs/QapPs4ZXOOaOgkh899NEwZ2q8F/bHDSF6j9Xj9PL9ztVcB1x/lA8Vb0oMgUGgTH/PNUYoIx9/HLrlh61r98UZmnGmAUa0+d4NGDY0L51SeUeMZOwcOXzY+Q2atPhFs/pevcJBJE=; 20:SZf9thOxzW8X5xHqwCv5gJ48ttxKidqIKaWh1WL/Kqr7wFWMuQZPhGuNMfHYoNc5WTBN8yu01MQPyAto59Z4MNfgJuUjGoK64Qd9X/iHtl7vv5EX266VcKebbiFXD9oXpCv5YZJ7D9QRpq+SsacMIqSMFdRCvTnXzAQAOPfKIb1A2GrcHnoEnNKkEuS4qSsrrz/CDQthStT95VCaH6oB+Uxjv/6BilIGRGY6W50LaM7u++9vKoSTTpPXr2Fc3xYGkUaOVbjG0p5ILlhBi+tCfHoJj9YvDo5qwiwXQ4yeb2cg2QrcKWAryz+h4w6b0OFsHPqSXQnuL/dQU+BDtSTSoWvZRIS3cBVjajZGvnsxu0Ia/oNnZ6zIsJxjKZewY6S2/nSCwWyEqssV2KtMRuB0ICQgmm+7dggI+cHAXAJaBx8N1IoFRO3FoUEVFTDMCpRSNr/B7E6st9+CV4x+BzE4XYI+HWL3dhxSd8WEPoBTH0Q30A+auMVpbzpW9DQNfTYGPxLC6jxyGe9v4R7wqRNRWvgbyLStt+5afI5dP+SQHGsu+59GxMN6LYV5llKv5Ffdqgj9UK/kv1vBwZE3Ji1RO0Esqy1F605QCVWGnxVh4+0=
X-Microsoft-Antispam-PRVS: <OSXPR01MB05819D6C399DC610C45B3EBFA0C90@OSXPR01MB0581.jpnprd01.prod.outlook.com>
X-Exchange-Antispam-Report-Test: UriScan:(158342451672863)(192374486261705)(788757137089);
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6040176)(2401047)(8121501046)(5005006)(3002001)(10201501046)(6055026); SRVR:OSXPR01MB0581; BCL:0; PCL:0; RULEID:; SRVR:OSXPR01MB0581;
X-Microsoft-Exchange-Diagnostics: 1; OSXPR01MB0581; 4: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
X-Forefront-PRVS: 0073BFEF03
X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(4630300001)(6049001)(6009001)(7916002)(24454002)(189002)(15594002)(45984002)(199003)(42186005)(19580405001)(19580395003)(31430400001)(107886002)(230783001)(117156001)(83506001)(230700001)(86362001)(7846002)(2501003)(189998001)(92566002)(66066001)(65956001)(65806001)(74482002)(7736002)(50466002)(5660300001)(77096005)(305945005)(64126003)(97736004)(4001350100001)(65816999)(5001770100001)(33656002)(76176999)(50986999)(54356999)(23746002)(47776003)(2950100001)(101416001)(81166006)(3846002)(6116002)(36756003)(586003)(68736007)(551544002)(345774005)(8676002)(81156014)(106356001)(105586002)(2906002); DIR:OUT; SFP:1101; SCL:1; SRVR:OSXPR01MB0581; H:[192.168.0.176]; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
Received-SPF: None (protection.outlook.com: aist.go.jp does not designate permitted sender hosts)
X-Microsoft-Exchange-Diagnostics: 1; OSXPR01MB0581; 23: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
X-Microsoft-Exchange-Diagnostics: 1; OSXPR01MB0581; 6:ePZkH6Ajeh08pfeBRs469onWNRvLghsxul/vPSBUpcq2bT7+/c7OZXv+LMCfkm072c7dWZytjHnej2t1Z1SFgOThhht9TZxnTQ9DviNGrr0l0C6YduDSBBjNOq6x5lVTuxEh23OqrezeqTrE3sku+y71AHEGsNE8NhtBlWoGhZvoeTMB5aUUCekWVVbXPA3nv6BIsmNrACx1FccA5SryrQ3WC0wFVm2G4FCO019CsICRrSzbof4KJbUtmu7PylGZU83e7HHdTzWZHpISeKZADB5lCJrDWyW4lJBqrIM5OxV+GVNSmCZznFOlsO4v4FLcrwX3yjtb3fmfGhR9jMp+5A==; 5:IeGUF0kluGs7iC2jn41s+l09ZciVff81URozeUgWhFeRFcERqMZEboiMeSMND1YFrUBTpt6OVMJW3TjUlAoYTIs0Wy0ym/Lyo3TGcunio5s/HIa/Z/Pe62dHrUro5Olg9PfYRxzyBUuUZujCL7FyIQ==; 24:G080gbjxnCpmzqDL2riIIaGgXAJ5UI69iQmMO0zvKl1z6NnAUlnFe3MU5Xgs/Db7uzl/OrJkFEJa7ZWXxcfm+aS3UBYKRj2bCJ1h1Slqx6o=; 7:QoOVxlUJwLlaqJdT7F1TlfA/DHUzilsxYM2KEVBKyxrrHri2PcWFkeOQBgTYObbwuQsEYb8h5zAT7dwY4iB1e+ODhrotHkYt4YESHySE3XXVHl8HJTtz9aEPhzVf3+W5HLLDGAbdDWQOgdpOibel0Xb5FtDKTFbblopQ6R56MFPEkffI3Z4vvAWtkKsLPU+JfuIaYAIU1bI/xLBEuVJv+MULXJizYB5/scaLqAcmbc6nbcWuzWpBXhNAP63BanWVWmsSgFT5r7QkcvkBEU7DQHKz2iHVkiSpdpTUCtjFfMtzu/44oP3fKUff3Ey3wHQf
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-OriginatorOrg: aist.go.jp
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Sep 2016 12:45:52.4082 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-Transport-CrossTenantHeadersStamped: OSXPR01MB0581
Archived-At: <https://mailarchive.ietf.org/arch/msg/http-auth/hdDrUSioYDLJ1jTWDCsCizE_eQ8>
Subject: Re: [http-auth] AD review of draft-ietf-httpauth-mutual-08
X-BeenThere: http-auth@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: HTTP authentication methods <http-auth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/http-auth>, <mailto:http-auth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/http-auth/>
List-Post: <mailto:http-auth@ietf.org>
List-Help: <mailto:http-auth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/http-auth>, <mailto:http-auth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Sep 2016 12:52:29 -0000

Dear Kathleen,

I'm sorry I've updated the draft according to your mail,
but not responded to the mail itself.
# and I found a few typo to submit the draft revision very soon.

On 2016/08/12 11:18, Kathleen Moriarty wrote:
> Hello,
> 
> Thank you for your work on draft-ietf-httpauth-mutual-08.  I will try
> to get through my AD review of the accompanying draft tomorrow.
> 
> I read through the draft and have the following questions.
> 
> 
> -----
> Section 2.1, in the following text:
> 
>  o  Authenticated key exchange messages: used by both peers to perform
>       authentication and the sharing of a cryptographic secret.
> 
>       *  req-KEX-C1 message: a message sent from the client.
> 
>       *  401-KEX-S1 message: a message sent from the server in response
>          to a req-KEX-C1 message.
> 
> 1. What does the response mean?  Is there a pass/fail message in the
> response or is this just an ack that the message was received by the
> server to the client?

401-KEX-S1 will be almost unconditionally sent as a response,
as authentication is on-going, not finished yet.
There may be a "no-go" for fatal error case (e.g. parameter mismatch), however.

> Then in the following:
>       *  200-VFY-S message: a client-authentication successful response
>          used by the server, which also simultaneously asserts to the
>          client that the server is authentic.
> 
> 2. Maybe this will be clear as I read further through the draft, but
> that seems like a lot to assert at once.  This note is a placeholder
> for me in case I do't feel like there is an adequate answer when I get
> deeper into the draft.

We tried to make it more clear in the revised draft.

> Second bullet on page 7:
> 
>  o  At this point (5), both peers calculate a shared "session secret"
>       using the exchanged values in the key exchange messages.  Only
>       when both the server and the client have used secret credentials
>       generated from the same password will the session secret values
>       match.  This session secret will be used for access authentication
>       of every individual normal after this point.
> 
> 3. I think a word may be missing in the last sentence, can you
> rephrase it?  I'm not able to parse it.

This seems to be typo, and we fixed.

> -----
> In another bullet on page 7:
> 
>  o  If the authentication verification value from the client was
>       correct, it means that the client definitely owns the credential
>       based on the expected password (i.e., the client authentication
>       succeeded).  The server will respond with a successful message
>       (200-VFY-S) (7).  Contrary to the usual one-way authentication
>       (e.g., HTTP Basic authentication or POP APOP authentication
>       [RFC1939]), this message also contains a server-side
>       authentication verification value.
> 
>       When the client's verification value is incorrect (e.g., because
>       the user-supplied password was incorrect), the server will respond
>       with the 401-INIT message (the same one as used in (2)) instead.
> 
> 4. This last section should specify that the extensive-token
> indicating an authentication failure must be included.  I would also
> recommend that this information be logged and have that stated in this
> draft.  Since we are pushing for protocols to be encrypted, the use of
> sniffers to detect errors will continue to fall off and people will
> need to rely on logs more.  I think it would be more helpful to have
> an accurate log that responds saying the authentication failed
> (user/password if you don't want to say which).  Encouraging richer
> logs will be more helpful going forward.
> -----

Thank you very much for the suggestion. We incorporated the idea.

> In Section 7, just to make sure I am reading this correctly:
> 
> The valid tokens for the validation parameter and corresponding
>    values of vh are as follows:
> 
>    host:          host-name validation: The value vh will be the ASCII
>                   string in the following format:
>                   "<scheme>://<host>:<port>", where <scheme>, <host>,
>                   and <port> are the URI components corresponding to the
>                   currently accessing resource.
> 
> 5. By "currently accessing resource", you mean the source system,
> correct?  It might be better to rephrase that so it is clear since
> this is important to developers.
> -----

We rephrased it as "server-side resource".
It's actually "the URL" being accessed, in short and informally.
If there is better phrasing, we'll look for it further.


> 6. In Section 8, it is the reason parameter of the INIT that lets you
> know if t is 'valid', correct?
>    Authentication-initializing messages with the
>    Optional-WWW-Authenticate header are used only where the 401-INIT
>    response is valid.  It will not replace other 401-type messages such
>    as 401-STALE and 401-KEX-S1.
> 
> I think it would be helpful to explicitly state what is a valid
> response unless that is defined already and I missed it?  I think it
> depends on the token or extensive token set in the reason parameter of
> the INIT message.

We clarified that the reason will be "initial" (modulo future extensions).

> ----
> 7. In section 10.1, if you change "normal responses" to "normal
> response", it is easier to fix the grammar in the following sentences:
> 
>    This also
>    holds true for the reception of "normal responses" (responses which
>    do not contain Mutual authentication-related headers) from HTTP
>    servers.
> change to:
>    This also
>    holds true for the reception of a "normal response" (responses which
>    do not contain Mutual authentication-related headers) from HTTP
>    servers.
> 
> from:
>       Any kinds of "normal responses" MUST only be accepted for the very
>       first request in the sequence.  Any "normal responses" returned
>       for the second or later requests in the sequence SHALL be
>       considered invalid.
> change to:
>       Any kind of "normal response" MUST only be accepted for the very
>       first request in the sequence.  Any "normal response" returned
>       for the second or later request in the sequence SHALL be
>       considered invalid.

> 8. Section 10.1, please consider rewording the following sentences to
> make it easier to read:
>    o  In the same principle, any responses which refer to or request
>       changing to an authentication realm different from the client's
>       request MUST only be accepted for the very first request in the
>       sequence.  Any kind of responses referring to different realms
>       which are returned for the second or later requests in the
>       sequence SHALL be considered invalid.
> -----
> 9. In section 17.2, it might be helpful to include a reference to the
> TLS 1.2 BCP, RFC7525.  The bullet might say something like, when TLS
> 1.2 is used, follow best practices in RFC7525.
> -----

For 7-9: Thank you very much. We did.

> 10. Section 17.3 is the first place I see a clear motivation for this
> protocol.  It might help to have this stated in the introduction.
> Although the points about password attacks in section 17.2 leave me
> questioning how much of an improvement this really is.  How much
> analysis was done on this new method? I know the drafts have been
> around for a while.  I'd have to take another pass at the documents to
> dig deeper, but would like to know if this analysis was done.  Can you
> make the statement that this is more secure?  The motivation for HOBA
> was clear - getting rid of the use of passwords.
> 
> Passwords are not sent in the clear, but this isn't stated in a
> motivation section.  It just is part of the protocol and mentioned at
> the end of section 17.5.  It might be helpful to include this in the
> introduction as well in a motivation paragraph.  The abstract saying
> that, "server truly knows the user's
> encrypted password" isn't the same as saying that the password is
> encrypted on the wire and doesn't rely on transport encryption.

Thank you very much for the precious suggestion. I added some texts
to the introduction section.
For security, simply said, no off-line attack will ever be possible
using data retrieved from eavesdropped/man-in-the-middle traffics.
We discussed some detail on on-line attacks in this section,
but it's much harder than off-line attacks for attackers,
and much easier for servers to detect and perform countermeasures.
(Of course, it's a gift from the PAKE.)

> -----
> 11. Section 17.3.  I'm not clear on this sentence in the last paragraph:
>    Of course, in such cases, the user interfaces for asking passwords
>    for this authentication shall be clearly identifiable against
>    imitation by other insecure password input fields (such as forms).
> Common attacks of this nature would be to direct users to a form that
> isn't the real form.  Is it the mutual authentication that helps here?
>  If so, explain how.  How is it clearly identifiable against
> imitation?

What we considered and implemented is a authentication interface
in browser-chrome (around the address bar), not within the main content area.
It's common for browsers to have some "secure UI area" not possible to
circumvent from the web content itself, whose examples includes address bar,
and padlock icons, as well as the "the other area" controlled by the
web page contents.  We intended to use the former area for secure authentication.
However, we did not want to include any "instructions" on the user interfaces
of web browsers (fearing that it will become "out-of-scope" of the draft), so
we used some "abstract" requirement here.
If you have more suggestion on "the extent we should say for user interfaces",
it's really appreciated.

-- 
Yutaka OIWA, Ph.D.        Leader, Cyber Physical Architecture Research Group
                                   Information Technology Research Institute
     National Institute of Advanced Industrial Science and Technology (AIST)
                       Mail addresses: <y.oiwa@aist.go.jp>, <yutaka@oiwa.jp>
OpenPGP: id[440546B5] fp[7C9F 723A 7559 3246 229D  3139 8677 9BD2 4405 46B5]