Re: [http-auth] Alexey Melnikov's No Objection on draft-ietf-httpauth-extension-08: (with COMMENT)

大岩寛 <y.oiwa@aist.go.jp> Sat, 03 September 2016 04:05 UTC

Return-Path: <y.oiwa@aist.go.jp>
X-Original-To: http-auth@ietfa.amsl.com
Delivered-To: http-auth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A3EB812D513; Fri, 2 Sep 2016 21:05:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level:
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=aist.go.jp
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RgTlaBsJsY8l; Fri, 2 Sep 2016 21:05:10 -0700 (PDT)
Received: from JPN01-OS2-obe.outbound.protection.outlook.com (mail-os2jpn01on0053.outbound.protection.outlook.com [104.47.92.53]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 50F7012B030; Fri, 2 Sep 2016 21:05:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=aist.go.jp; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=mcfOUsri2zY8qlzG5sSr0zVovlfzTonyx/xcWqGiTlc=; b=EyAqKJFjkLvgPswBKhtlKoIPcAQY+7ccUllGMG06uSgeSe/ge4R0+2ocQZQ36aU6yi9SzCGlshPNq/99KmtZYf7x2q5t2cWR3zR8YYsZyXwdneCz9SMBLlpK15HRU6Il/w1Ifi2lv/CzHdPsHfjPngqQNQTutXy+jXP8rKHqct4=
Received: from TY1PR01MB0588.jpnprd01.prod.outlook.com (10.167.157.18) by TY1PR01MB0585.jpnprd01.prod.outlook.com (10.167.157.15) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P384) id 15.1.599.9; Sat, 3 Sep 2016 04:05:06 +0000
Received: from TY1PR01MB0588.jpnprd01.prod.outlook.com ([10.167.157.18]) by TY1PR01MB0588.jpnprd01.prod.outlook.com ([10.167.157.18]) with mapi id 15.01.0599.016; Sat, 3 Sep 2016 04:05:06 +0000
From: =?utf-8?B?5aSn5bKp5a+b?= <y.oiwa@aist.go.jp>
To: Alexey Melnikov <aamelnikov@fastmail.fm>, The IESG <iesg@ietf.org>
Thread-Topic: Alexey Melnikov's No Objection on draft-ietf-httpauth-extension-08: (with COMMENT)
Thread-Index: AQHSBGAsLT+TABkFxEakoeSAg5YN3KBnIoFQ
Date: Sat, 3 Sep 2016 04:05:06 +0000
Message-ID: <TY1PR01MB058849D777444188BE2474A7A0E40@TY1PR01MB0588.jpnprd01.prod.outlook.com>
References: <147274142144.10095.917266239677089935.idtracker@ietfa.amsl.com>
In-Reply-To: <147274142144.10095.917266239677089935.idtracker@ietfa.amsl.com>
Accept-Language: ja-JP, en-US
Content-Language: ja-JP
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=y.oiwa@aist.go.jp;
x-originating-ip: [153.210.192.20]
x-ms-office365-filtering-correlation-id: 5b0cb44f-f3d4-42f3-758e-08d3d3af7d66
x-microsoft-exchange-diagnostics: 1; TY1PR01MB0585; 6:1DCc7roa45aY13znvxd1lCbuTqdIldPeiAPIq3JJf2ATbQ3EVUeddYfQSMxXVtqIOLfybMuMr3oLM6oAOMZ6ONc/2rvqOot6cproVTM6aI5m6oO+Rf5Ws0HIzeJ7Rg00AkJ4extGara6ytnfUdBPesWe9R4TI5Aa6Dk5zj0YBILQ77nN9cKtxSVzNDh9+X2idtu/DczwfeEJt1gGtDkemmEeVCeE81RSfKuwqN/dh+AsfBX5QHHln8Enq5mF5an0gAD0I4fp1M/9BMp8mTz9VH5151+9gA9NN5hPitlXM37fDnNayuV1GhWWZAZUc7VhMiPXPjJFjb9oM070ZTz1XA==; 5:9f7KRiMnhFdrgNQQMG1pcFOqDvdCvyPet0KNogZyyqgvaxKy3HavRIL3zTbMFUmtxnNFjscBIDV++OX++892Opf3PPFH1GvPKdq1ZQrGyn9wolINfuZ9xvtlJp+ysiWDln5OFYnSyrI2hsgf9K4WyQ==; 24:eErzdzabzl+jsTiq8WQV8e00DVZ8y4s+3xuZKUfqks5Fc6YrLDeO12HsY4b6NOh+t2VmaSMatnV86Pmmnz8rdUvhc5hEfa6MUIGelx6jUn4=; 7:iKQ9xZB9yTyZXMcoV2DyGKGhUitKZw/PjHKbUs2KV6b9a9bIGVrmLOfKq4VN1KHtkdDpzrfAzsWBGvqik8rBzNFje6ibAXsoTsVJSE34PmXBxyCHCPovpd5uqk0By24VBnbCkSHADJRUniQ5iQjQTQ42IcoMTZaqa7Urug4ucv776wqtgav4KwylDkfsP6tsQtHjVFHaohga25HU6bNktJeLv89FwWOM116nnEM48nWHgi9vew4A8RoJRWX/mDbk
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:TY1PR01MB0585;
x-microsoft-antispam-prvs: <TY1PR01MB0585EB33CE506AACB636A138A0E40@TY1PR01MB0585.jpnprd01.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(158342451672863);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040176)(2401047)(8121501046)(5005006)(10201501046)(3002001)(6055026); SRVR:TY1PR01MB0585; BCL:0; PCL:0; RULEID:; SRVR:TY1PR01MB0585;
x-forefront-prvs: 00540983E2
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(6009001)(7916002)(199003)(189002)(45984002)(2950100001)(81166006)(10400500002)(92566002)(2906002)(7846002)(74316002)(8666005)(5002640100001)(68736007)(97736004)(5001770100001)(189998001)(4326007)(105586002)(33656002)(7736002)(8676002)(122556002)(76576001)(106356001)(7696003)(2900100001)(8936002)(3660700001)(85182001)(3280700002)(77096005)(81156014)(106116001)(66066001)(87936001)(101416001)(76176999)(9686002)(54356999)(345774005)(19580405001)(102836003)(3846002)(6116002)(305945005)(11100500001)(5660300001)(86362001)(230783001)(586003)(19580395003)(74482002)(50986999)(7059030); DIR:OUT; SFP:1101; SCL:1; SRVR:TY1PR01MB0585; H:TY1PR01MB0588.jpnprd01.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
received-spf: None (protection.outlook.com: aist.go.jp does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: aist.go.jp
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Sep 2016 04:05:06.4334 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 18a7fec8-652f-409b-8369-272d9ce80620
X-MS-Exchange-Transport-CrossTenantHeadersStamped: TY1PR01MB0585
Archived-At: <https://mailarchive.ietf.org/arch/msg/http-auth/zey85t7-QyxHmQGIaNDBSXMh6oM>
Cc: "http-auth@ietf.org" <http-auth@ietf.org>, "httpauth-chairs@ietf.org" <httpauth-chairs@ietf.org>, "draft-ietf-httpauth-extension@ietf.org" <draft-ietf-httpauth-extension@ietf.org>
Subject: Re: [http-auth] Alexey Melnikov's No Objection on draft-ietf-httpauth-extension-08: (with COMMENT)
X-BeenThere: http-auth@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: HTTP authentication methods <http-auth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/http-auth>, <mailto:http-auth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/http-auth/>
List-Post: <mailto:http-auth@ietf.org>
List-Help: <mailto:http-auth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/http-auth>, <mailto:http-auth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 03 Sep 2016 04:05:12 -0000

Thank you very much for your comments.

> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
> 
> I agree with Stephen that this document must include the registration template
> as per Section 4.2.1 of BCP 90 (RFC 3864).

Yes, I'll do it.

> In Section 2.2:
> 
>     bare-token        = 1*(%x30-39 / %x41-5A / %x61-7A / "-" / "_")
> 
> Did you intent to allow leading "-" (and possibly "_") above?
> As you are using "-<bare-token>.<domain-name>" for private extensions, I think
> the ABNF is not right. I think you meant:
> 
>     lead-token-char   = (%x30-39 / %x41-5A / %x61-7A / "_")
>     bare-token        = lead-token-char *(%x30-39 / %x41-5A / %x61-7A /
> "-" / "_")

Thank you for notifying it.  We'll remove - and _ from the initial character.

> In Section 3, last paragraph:
> 
>    Support of this header is OPTIONAL; clients MAY also implement this
>    extension only for some selected authentication schemes.  New
>    authentication schemes can make support of the optional
>    authentication mandatory by its specification, though.
> 
> I don't think this paragraph is needed, as this is granted, because support
> for any extension like specified in this document is optional. So I suggest
> deleting it.

Of course, Experimental thing is always optional, as a starting point.
But if we have two or more OPTIONALs, we need to clarify whether these are
"one-by-one" or "all-or-nothing".
What we wanted to assure here is that
 - It's optional support may vary between schemes.
   For example, an implementation MAY choose to support it in Digest but not in Basic.
   Also, implementation MAY choose only to support "username" and not "logout-timeout".
   In this point, it's "one-by-one" OPTIONAL.

 - We have another "experimental" draft which normatively refers this draft and
   requires implementation of this extension.
   It's a kind of "all-or-nothing" (more precisely, "A implies B").
   It does not contradict with the "experimental status" of this draft.

These need a little more clarification than just saying "OPTIONAL" or "Experimental".
If you have some solution to resolve it nicely, it's really appreciated.

> Section 3.1:
> 
>    I am still not convinced that Optional-WWW-Authenticate is needed,
>    but the section provides a reasonable overview of the current situation.
> 
> 
> In Section 4:
> 
>    Support of this header is OPTIONAL, and clients MAY choose any subset
>    of these parameters to be supported.  The set of supported parameters
>    MAY also be authentication scheme-dependent.  However, some
>    authentication schemes can require mandatory/recommended support for
>    some or all of the features provided in this header.
> 
> As above, I don't think this paragraph is needed.
> 
> 4.4.  No-auth parameter
> 
>    This parameter SHOULD NOT be used along with the
>    location-when-unauthenticated parameter.
> 
> Why is this only a SHOULD NOT (or to rephrase it: what are possible conditions
> for violating this)?
These are contradicting requests for the same scope and
using them together is meaningless.  So below,

>    If both were supplied,
>    clients MAY choose which one is to be honored.
> 
> I would rather you pick one behaviour in order to improve interoperability.

we'll change these two clauses together to define precedence order between them.

> In 4.5:
> 
>    When the user requests termination of an authentication period, and
>    if the client currently displays a page supplied by a response with
>    this parameter, the client will be redirected to the specified
>    location by a new GET request (as if it received a 303 response).
> 
> Is this value advisory? Should the client go to this page automatically or would
> the server redirect it? If the latter, why does this need to be told to the
> client?

We'll clarify it.  It's client's role to go to that page. 
In client-initiated logging-out, the server cannot initiate redirect
unless the client takes some action first.

> 
>    The log-out operation (e.g. erasing memories of user name,
>    authentication credential and all related one-time credentials such
>    as nonce or keys) SHOULD occur before processing a redirection.

> 4.6.  Logout-timeout parameter
> 
>    The parameter "logout-timeout", when contained in a successfully-
>    authenticated response, means that any authentication credentials and
>    state related to the current protection space are to be discarded if
>    a time specified in this header (in seconds) has passed since from
>    the time this header was received.  The value MUST be an integer.  As
>    a special case, the value 0 means that the client is requested to
>    immediately log-out from the current authentication space and revert
>    to an unauthenticated status.
> 
> It sounds like this is not just a request, but the client will be logged out.
> If this is correct, then you should reword this, for example:
> 
>    As a special case, the value 0 means that the server is logging the client
>    out immediately from the current authentication space and that the client
>    is now returns to unauthenticated state.
> 
Thank you very much.  We'll fix in this direction.

-- 
Yutaka OIWA, Ph.D.       Leader, Cyber Physical Architecture Research Group
                                  Information Technology Research Institute
    National Institute of Advanced Industrial Science and Technology (AIST)
                      Mail addresses: <y.oiwa@aist.go.jp>jp>, <yutaka@oiwa.jp>
OpenPGP: id[440546B5] fp[7C9F 723A 7559 3246 229D  3139 8677 9BD2 4405 46B5]