Re: [http-state] draft-salgueiro-secure-state-management

Adam Barth <ietf@adambarth.com> Fri, 19 February 2010 21:30 UTC

Return-Path: <ietf@adambarth.com>
X-Original-To: http-state@core3.amsl.com
Delivered-To: http-state@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 16C793A7D86 for <http-state@core3.amsl.com>; Fri, 19 Feb 2010 13:30:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.868
X-Spam-Level:
X-Spam-Status: No, score=-1.868 tagged_above=-999 required=5 tests=[AWL=0.109, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6OVFQt5pzZip for <http-state@core3.amsl.com>; Fri, 19 Feb 2010 13:30:20 -0800 (PST)
Received: from mail-yx0-f173.google.com (mail-yx0-f173.google.com [209.85.210.173]) by core3.amsl.com (Postfix) with ESMTP id EE2CC3A7B77 for <http-state@ietf.org>; Fri, 19 Feb 2010 13:30:19 -0800 (PST)
Received: by yxe3 with SMTP id 3so575207yxe.32 for <http-state@ietf.org>; Fri, 19 Feb 2010 13:32:04 -0800 (PST)
Received: by 10.151.17.33 with SMTP id u33mr2571825ybi.298.1266615119796; Fri, 19 Feb 2010 13:31:59 -0800 (PST)
Received: from mail-yx0-f173.google.com (mail-yx0-f173.google.com [209.85.210.173]) by mx.google.com with ESMTPS id 4sm245900yxd.16.2010.02.19.13.31.57 (version=SSLv3 cipher=RC4-MD5); Fri, 19 Feb 2010 13:31:59 -0800 (PST)
Received: by yxe3 with SMTP id 3so575051yxe.32 for <http-state@ietf.org>; Fri, 19 Feb 2010 13:31:56 -0800 (PST)
MIME-Version: 1.0
Received: by 10.231.146.211 with SMTP id i19mr137726ibv.22.1266615116238; Fri, 19 Feb 2010 13:31:56 -0800 (PST)
In-Reply-To: <E022D1C0-F0DF-4BF3-B309-317B38314788@cisco.com>
References: <E022D1C0-F0DF-4BF3-B309-317B38314788@cisco.com>
From: Adam Barth <ietf@adambarth.com>
Date: Fri, 19 Feb 2010 13:31:36 -0800
Message-ID: <5c4444771002191331s496ceccaje9dcf79dbe951774@mail.gmail.com>
To: Gonzalo Salgueiro <gsalguei@cisco.com>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
Cc: http-state@ietf.org
Subject: Re: [http-state] draft-salgueiro-secure-state-management
X-BeenThere: http-state@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discuss HTTP State Management Mechanism <http-state.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/http-state>, <mailto:http-state-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/http-state>
List-Post: <mailto:http-state@ietf.org>
List-Help: <mailto:http-state-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/http-state>, <mailto:http-state-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Feb 2010 21:30:21 -0000

Thanks for the interesting read.

This working group is current in "phase one," which is to create a
specification for the de facto cookie protocol in use today.  In phase
two, we'll be considering way of improving HTTP state management.
This document looks like useful input for phase two.

The document isn't entirely clear about what security problem with the
current cookie protocol you're trying to solve.  It would be helpful
if you included a threat model and an explanation of your security
goals.  You argue against using TLS for all HTTP traffic on the basis
of requiring a different IP for each host name.  This problem will be
solved in the intermediate term by the SNI extension, which will
undoubtably beat any improved state management protocol to market.

The document preserves some of the syntax from the cookie protocol.
I'd advise dumping the current syntax entirely.

The document seems quite concerned about passive network attackers,
but doesn't seem that concerned abou the other security issues with
cookies.  You might consult the Security Considerations section of
http://tools.ietf.org/html/draft-ietf-httpstate-cookie for a survey of
security problems a new protocol might improve.  (Note that this
section will be improved markedly in the next version of the draft,
which you can see here
http://github.com/abarth/http-state/blob/master/drafts/cookie.xml).

Adam


On Thu, Feb 18, 2010 at 3:45 PM, Gonzalo Salgueiro <gsalguei@cisco.com> wrote:
> Folks -
>
> I have posted the following draft:
>
> http://tools.ietf.org/html/draft-salgueiro-secure-state-management
>
> This draft provides a simple method for providing a reasonable level of security when exchanging state management information through HTTP in situations where TLS is not employed.
>
> We would appreciate receiving any comments you have and input on whether you think this might be a complementary addition to the work the WG is already undertaking.
>
> Thanks,
>
> Gonzalo
>
>
>
> This email may contain confidential and privileged material for the sole use of the intended recipient. Any review, use, distribution or disclosure by others is strictly prohibited. If you are not the intended recipient (or authorized to receive for the recipient), please contact the sender by reply email and delete all copies of this message.
>
> For corporate legal information go to:
> http://www.cisco.com/web/about/doing_business/legal/cri/index.html
>
>