Re: Working Group Last Call: draft-ietf-httpbis-auth-info

Julian Reschke <julian.reschke@gmx.de> Wed, 11 February 2015 08:47 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ietf.org@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 202E31A03A1 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Wed, 11 Feb 2015 00:47:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.912
X-Spam-Level:
X-Spam-Status: No, score=-6.912 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Vmf-4nNfIWHw for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Wed, 11 Feb 2015 00:47:17 -0800 (PST)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3B9631A0382 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Wed, 11 Feb 2015 00:47:16 -0800 (PST)
Received: from lists by frink.w3.org with local (Exim 4.80) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1YLSu1-0002f8-1b for ietf-http-wg-dist@listhub.w3.org; Wed, 11 Feb 2015 08:44:09 +0000
Resent-Date: Wed, 11 Feb 2015 08:44:09 +0000
Resent-Message-Id: <E1YLSu1-0002f8-1b@frink.w3.org>
Received: from maggie.w3.org ([128.30.52.39]) by frink.w3.org with esmtp (Exim 4.80) (envelope-from <julian.reschke@gmx.de>) id 1YLStv-0002eI-Kh for ietf-http-wg@listhub.w3.org; Wed, 11 Feb 2015 08:44:03 +0000
Received: from mout.gmx.net ([212.227.17.20]) by maggie.w3.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.72) (envelope-from <julian.reschke@gmx.de>) id 1YLStu-00039V-6z for ietf-http-wg@w3.org; Wed, 11 Feb 2015 08:44:03 +0000
Received: from [192.168.2.175] ([93.217.119.132]) by mail.gmx.com (mrgmx102) with ESMTPSA (Nemesis) id 0M8pKi-1YTCed31oa-00C8RG; Wed, 11 Feb 2015 09:43:31 +0100
Message-ID: <54DB1630.3040306@gmx.de>
Date: Wed, 11 Feb 2015 09:43:28 +0100
From: Julian Reschke <julian.reschke@gmx.de>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.4.0
MIME-Version: 1.0
To: Amos Jeffries <squid3@treenet.co.nz>, ietf-http-wg@w3.org
References: <0E4872BF-EBCB-42C0-9BF9-8BC179C1BDDA@mnot.net> <54DAB257.5000203@treenet.co.nz>
In-Reply-To: <54DAB257.5000203@treenet.co.nz>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-Provags-ID: V03:K0:Pw3CokzLw6ZC24UUB33uRwfyIhYSU7cxeRazlP9RhfYxZOqWqwI fPFIFALgQQA2RtOQRzArdlc6Q36Ay7ikkijiBdJRfFABwyf10HjVtR38NHMQtZMo6UIXBkD Ku4MUhKtF7CvyIUglf42FmmZwlwu9dkliwp6IdAnw51UEt+vGaT2gNL/LR/MK0EO4X58mvx B+9djOk1E4A3EeF3/jngA==
X-UI-Out-Filterresults: notjunk:1;
Received-SPF: pass client-ip=212.227.17.20; envelope-from=julian.reschke@gmx.de; helo=mout.gmx.net
X-W3C-Hub-Spam-Status: No, score=-4.3
X-W3C-Hub-Spam-Report: AWL=-2.421, BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001
X-W3C-Scan-Sig: maggie.w3.org 1YLStu-00039V-6z 24914372086da32244788690b8843e83
X-Original-To: ietf-http-wg@w3.org
Subject: Re: Working Group Last Call: draft-ietf-httpbis-auth-info
Archived-At: <http://www.w3.org/mid/54DB1630.3040306@gmx.de>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/28818
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

On 2015-02-11 02:37, Amos Jeffries wrote:
> On 11/02/2015 11:59 a.m., Mark Nottingham wrote:
>> Everyone,
>>
>> Julian believes (with his editor hat on) that this is ready. As discussed, this is a simple document to pull the Authentication-Info and Proxy-Authentication-Info header fields out of 2617, so that they’re not associated with a particular authentication scheme (thereby avoiding lots of scheme-specific headers).
>>
>> Therefore, this is the announcement of WGLC for:
>>   https://tools.ietf.org/html/draft-ietf-httpbis-auth-info-02
>>
>> Please review the document carefully, and comment on this list.
>>
>
>
> Section 3 paragraph 3 says "
>   Intermediaries are not allowed to modify the field value in any way.
> "
>
> RFC 7235 uses wording in the form:
>    A proxy forwarding ... MUST NOT modify ...
>
> I believe the Authentication-Info should share both normative MUST NOT,
> and term "proxy" instead of intermediary. Since there are legitimate

Right now the spec doesn't use any RFC 2119 terms, so if we do this, 
we'd need to apply it in more places.

> cases where gateways and/or other intermediaries may need to change it
> per the relevant auth scheme.

Can you give an example?

In any case, I agree that this ought to be consistent with RFC7235.


> Section 4 uses the term "proxy authentication" referencing RFC 7235.
>
> In RFC 7235 there is no definition, and only a vague implied explanation
> of that term via explaining what the 407 status means.

That's a problem of RFC 7235. This spec would be the wrong place to 
address this.

I think proposed text for rfc7235bis would be great.

> I believe the text in section 4 should be re-written to match the
> per-header descriptions found in RFC 7235 sectio 4.3/4.3 paragraph 2.

Not sure how that would improve things.

> With mention specifically about how it differs from Authentication-Info
> by being hop-by-hop.

Hmm, why is it hop-by-hop?

> Under security considerations I believe it would be good to mention that
> recipients of the Authentication-Info header in any response should
> (ought to or SHOULD?) treat the transaction as if it were authenticated
> even if the RFC7235 headers are not present.

Why?

(Remember that the intent of the spec was simply to extract the 
definition from RFC 2617; so if we make additional changes they need to 
be, well, understood)

>   Some of the use-cases I see for this header include out-of-band
> authentication. If the server is treating the reply as authenticated it
> may inadvertently include private information in the payload or other
> headers.
>
>
>
> Also, Yutaka brought up the issue of association between selected scheme
> and Authentication-Info contents. I believe this document is the right
> place to reserve a parameter scheme= which takes the auth-scheme as its
> value for the purpose in the same way RFC 7235 reserves the realm=
> parameter for use across schemes.

That was already answered. There can only be one authentication 
happening at a single time (plus one proxy authentication).

Best regards, Julian