Re: Client-Cert Header draft

David Benjamin <davidben@chromium.org> Fri, 17 April 2020 21:14 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C4A3F3A0743 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Fri, 17 Apr 2020 14:14:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.919
X-Spam-Level:
X-Spam-Status: No, score=-2.919 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.168, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.248, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=chromium.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gXtNo8cp82VV for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Fri, 17 Apr 2020 14:14:10 -0700 (PDT)
Received: from lyra.w3.org (lyra.w3.org [128.30.52.18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C50693A0776 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Fri, 17 Apr 2020 14:14:09 -0700 (PDT)
Received: from lists by lyra.w3.org with local (Exim 4.92) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1jPYHe-0004yB-Ql for ietf-http-wg-dist@listhub.w3.org; Fri, 17 Apr 2020 21:12:22 +0000
Resent-Date: Fri, 17 Apr 2020 21:12:22 +0000
Resent-Message-Id: <E1jPYHe-0004yB-Ql@lyra.w3.org>
Received: from titan.w3.org ([128.30.52.76]) by lyra.w3.org with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from <davidben@google.com>) id 1jPYHc-0004xM-4y for ietf-http-wg@listhub.w3.org; Fri, 17 Apr 2020 21:12:20 +0000
Received: from mail-pl1-x62e.google.com ([2607:f8b0:4864:20::62e]) by titan.w3.org with esmtps (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92) (envelope-from <davidben@google.com>) id 1jPYHX-0006yb-Ff for ietf-http-wg@w3.org; Fri, 17 Apr 2020 21:12:19 +0000
Received: by mail-pl1-x62e.google.com with SMTP id z6so1394847plk.10 for <ietf-http-wg@w3.org>; Fri, 17 Apr 2020 14:12:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=NpooTyy360reSIIMC6yhAN7AKX/uHGrnU5h9zd4+5Ak=; b=dQe2tkknOa0Cf0mlmHc3nGzxKai7FI8VKqRTgy4gH6KobaDLymYtRhOTwIhsLqdhEL RpHMC9zBarXK6lazTyzBrrarzTyDNb5hhaD1/28yCWmWFuia+keIe6DB1m3pRsfPe56e cE8GCIDREdI7DtHnogNsx2T8kLQ83+M7Nlyk0=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=NpooTyy360reSIIMC6yhAN7AKX/uHGrnU5h9zd4+5Ak=; b=rb1tFwjv4O4fe+MwNTj7B3RQB46zKvcn3Bw1k34g5ap4kaNaR0H4bNt9hhIARlIQsK HM728xPmWPxJkr1LyArVFlvPYewmA9dxJQIApuOR0GpoJscaUZF+JkRL7YmXgh5v9L3z sTFfyRPpsxLmFgnNr63VDHK7kb2V4fNP/pGnbnz+g2AtF0e62b/m7yN6tBKhHyYYWXE3 0wxVZ660+TtnCgkVunZDMmhC0QUW9e3GIiwARrC3dK9t0qyCzCC1rqn137okWxZxkIX3 KGYPJ29zNoijO1n/Fux39e9Iqk3bkshFkz86asz5vbP+vQ2RGiK3RB1qLGQO2bFfNUqq ebeg==
X-Gm-Message-State: AGi0PuaWaZRrCa1wzP8/lSyO2x6r2+7794V3x/JUVm7YTv+hjmXPLDzY 5JulbJim5SMNGUpIpmhrL1P+ZviblN0B34Rg8jRT
X-Google-Smtp-Source: APiQypIabloTbFhm168WkoPY7c9/724sKWGsOtve6n28l82a1w/OSqBj8c71GoAW7gOvTFXW9qXIrTr+YP0jZ8Us8Wc=
X-Received: by 2002:a17:90a:7d16:: with SMTP id g22mr6718657pjl.179.1587157923230; Fri, 17 Apr 2020 14:12:03 -0700 (PDT)
MIME-Version: 1.0
References: <CA+k3eCRQhuS9TyEVdF6ZAfLSyPngjDLvctUTc++2Ok+RJmw0qA@mail.gmail.com> <CH2PR22MB208612E57276557568F843E2DAD90@CH2PR22MB2086.namprd22.prod.outlook.com> <CALGR9oaEiWBa3gqH1YiiqaQSprQ7XDAem8+VgD+qJq8KZwUv-A@mail.gmail.com>
In-Reply-To: <CALGR9oaEiWBa3gqH1YiiqaQSprQ7XDAem8+VgD+qJq8KZwUv-A@mail.gmail.com>
From: David Benjamin <davidben@chromium.org>
Date: Fri, 17 Apr 2020 17:11:46 -0400
Message-ID: <CAF8qwaCeP-d4yhrRhdoqfjuPuEiXqeK1KZGXkdabM__LE-0vtQ@mail.gmail.com>
To: Lucas Pardue <lucaspardue.24.7@gmail.com>
Cc: Mike Bishop <mbishop@evequefou.be>, Brian Campbell <bcampbell@pingidentity.com>, HTTP Working Group <ietf-http-wg@w3.org>
Content-Type: multipart/alternative; boundary="00000000000037f53105a3830046"
Received-SPF: pass client-ip=2607:f8b0:4864:20::62e; envelope-from=davidben@google.com; helo=mail-pl1-x62e.google.com
X-W3C-Hub-Spam-Status: No, score=-11.2
X-W3C-Hub-Spam-Report: BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.25, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, USER_IN_DEF_SPF_WL=-7.5, W3C_AA=-1, W3C_WL=-1
X-W3C-Scan-Sig: titan.w3.org 1jPYHX-0006yb-Ff b8142c1afbce425ca11d4dcd87ab2020
X-Original-To: ietf-http-wg@w3.org
Subject: Re: Client-Cert Header draft
Archived-At: <https://www.w3.org/mid/CAF8qwaCeP-d4yhrRhdoqfjuPuEiXqeK1KZGXkdabM__LE-0vtQ@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/37516
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <https://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

This draft isn't sufficient to properly move the access checks out of the
TLS terminator. More care is needed here. There is a "distaste for client
certificates from some quarters" for a reason.

In general, connection-level authentication does not play well with HTTP.
Server identities are generally public, so there is no complex policy
around when to release them. Client identities are generally user
identities and thus sensitive, with local policies, usually involving user
prompts and selections. That interacts badly with client certificates. It
just barely works today, but moving individual components without thought
as to the overall picture will break it.

In particular, client HTTP stacks necessarily cache client certificate
decisions. Without caching, the user is potentially prompted on every HTTP
request, but a user session involves many HTTP requests. Additionally, the
decision is inherently cached by way of connection reuse and session
resumption optimizations. Short of forcing a full TLS handshake on every
HTTP request, clients could not prompt on every HTTP request if they wanted
to. That means the HTTP stacks need an explicit signal, or no amount of
reloads will allow the user to select a different identity.

Currently, the only signal for a bad client certificate is a fatal TLS
alert. If the access checks are moved, bad client certificate signals will
come out of the origin server, which cannot generate those. This draft may
need to define a suitable HTTP 4xx code to correspond with TLS client
certificate authentication. Of course, existing clients won't know to
process that, but perhaps the origin server should translate to a TLS
alert? But then the response is never delivered, which may be differently
odd. Then one must consider the interaction with HTTP/2, which multiplexes
streams and potentially multiple origins together.

There may be further problems here that I haven't thought through. The
suggestion of this enabling finer-grained access control worries me.

On Fri, Apr 17, 2020 at 3:29 PM Lucas Pardue <lucaspardue.24.7@gmail.com>
wrote:

> +1 to everything Mike said
>
> On Fri, 17 Apr 2020, 20:24 Mike Bishop, <mbishop@evequefou.be> wrote:
>
>> Despite the distaste for client certificates from some quarters, they are
>> still both used and useful.  I’m certainly interested in seeing this
>> progress.
>>
>>
>>
>> In today’s situation, the intermediary checks that the cert matches the
>> rules it has been given to authenticate clients, and only forwards the
>> requests from valid clients.  Arguably, the origin is offloading less trust
>> in this draft’s model – the intermediary is responsible for validating that
>> the client possesses the claimed certificate, but might leave the origin to
>> decide what scope of access the certificate actually grants.  That allows
>> finer-grained access control, but also allows greater ability to send
>> requests back to the origin.  It also opens the door for intermediaries
>> which don’t support this header to accidentally forward requests containing
>> it.  Requiring intermediaries to drop it doesn’t get you much, since only
>> those intermediaries aware of the spec will comply by dropping the header.
>> To help address these, I’d like to see this mix in something that the
>> intermediary holds and the client doesn’t, such as an exporter from its TLS
>> connection to the server.
>>
>>
>>
>> But all that is refinement – the core concept here is beneficial, and I’d
>> like to see more engagement here.
>>
>>
>>
>> *From:* Brian Campbell <bcampbell@pingidentity.com>
>> *Sent:* Wednesday, April 15, 2020 5:01 PM
>> *To:* HTTP Working Group <ietf-http-wg@w3.org>
>> *Subject:* Client-Cert Header draft
>>
>>
>>
>> Hello HTTP Working Group,
>>
>>
>>
>> I've somewhat inadvertently found myself working on this draft
>> https://datatracker.ietf.org/doc/draft-bdc-something-something-certificate/,
>> which aspires to define a "Client-Cert" HTTP header field that allows a TLS
>> terminating reverse proxy to convey information about the client
>> certificate of a mutually-authenticated TLS connection to an origin server
>> in a common and predictable manner.
>>
>>
>>
>> I presented the concept
>> <https://datatracker.ietf.org/meeting/107/materials/slides-107-secdispatch-client-cert-http-header-00>
>> at the recent virtual IETF 107 secdispatch meeting
>> <https://datatracker.ietf.org/meeting/107/materials/minutes-107-secdispatch-00>
>> and the outcome from that was basically that there seems to be some
>> interest in pursuing the work and the suggestion that the conversation be
>> taken to the HTTPbis WG (and also keep TLS WG involved - presumably if the
>> work progresses). And that's what brings me here. I also hope to get a
>> little bit of time at one of the upcoming virtual interims to
>> present/discuss the draft.
>>
>>
>>
>> Thanks,
>>
>> Brian
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>> *CONFIDENTIALITY NOTICE: This email may contain confidential and
>> privileged material for the sole use of the intended recipient(s). Any
>> review, use, distribution or disclosure by others is strictly prohibited..
>> If you have received this communication in error, please notify the sender
>> immediately by e-mail and delete the message and any file attachments from
>> your computer. Thank you.*
>>
>