RE: Report on preliminary decision on TLS 1.3 and client auth
Mike Bishop <Michael.Bishop@microsoft.com> Mon, 26 October 2015 18:03 UTC
Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3E9881B504F for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Mon, 26 Oct 2015 11:03:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.012
X-Spam-Level:
X-Spam-Status: No, score=-7.012 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SKnYMPxkm24u for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Mon, 26 Oct 2015 11:03:34 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 99E841B504E for <httpbisa-archive-bis2Juki@lists.ietf.org>; Mon, 26 Oct 2015 11:03:34 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.80) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1Zqm54-0007Rp-2B for ietf-http-wg-dist@listhub.w3.org; Mon, 26 Oct 2015 18:01:14 +0000
Resent-Date: Mon, 26 Oct 2015 18:01:14 +0000
Resent-Message-Id: <E1Zqm54-0007Rp-2B@frink.w3.org>
Received: from lisa.w3.org ([128.30.52.41]) by frink.w3.org with esmtps (TLS1.2:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <Michael.Bishop@microsoft.com>) id 1Zqm4z-0007R3-Ao for ietf-http-wg@listhub.w3.org; Mon, 26 Oct 2015 18:01:09 +0000
Received: from mail-bn1bon0131.outbound.protection.outlook.com ([157.56.111.131] helo=na01-bn1-obe.outbound.protection.outlook.com) by lisa.w3.org with esmtps (TLS1.2:RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from <Michael.Bishop@microsoft.com>) id 1Zqm4w-0007IQ-JC for ietf-http-wg@w3.org; Mon, 26 Oct 2015 18:01:08 +0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:To:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=WEDvzfuOgN1kciBa/uUj6BHrWAXjqub4G/tXoPhB0xQ=; b=KLa5GB0rzkrxALpKCZ09zdXfst4pvFZCwPRtblSM8vYQIURI3YTsQC7wdA1c94mgy3oIiAJpf2dBZaHI/40HnutQmS6sKVewET8w/N3gE56dJTmqsNqqkVYNKXT6y5e19SOfSaRwN8nB2C+CnV1kmZ2tl3x5wU+NLWVajxsWsgQ=
Received: from CY1PR03MB1374.namprd03.prod.outlook.com (10.163.16.28) by CY1PR03MB1376.namprd03.prod.outlook.com (10.163.16.30) with Microsoft SMTP Server (TLS) id 15.1.306.13; Mon, 26 Oct 2015 18:00:38 +0000
Received: from CY1PR03MB1374.namprd03.prod.outlook.com ([10.163.16.28]) by CY1PR03MB1374.namprd03.prod.outlook.com ([10.163.16.28]) with mapi id 15.01.0306.003; Mon, 26 Oct 2015 18:00:38 +0000
From: Mike Bishop <Michael.Bishop@microsoft.com>
To: Yoav Nir <ynir.ietf@gmail.com>, Martin Thomson <martin.thomson@gmail.com>
CC: "Jason T. Greene" <jason.greene@redhat.com>, Ilari Liusvaara <ilariliusvaara@welho.com>, HTTP Working Group <ietf-http-wg@w3.org>
Thread-Topic: Report on preliminary decision on TLS 1.3 and client auth
Thread-Index: AQHQ9iREj/alLzU/z02s3MOmCNX3oJ5ziZaAgACKNACAAGZNgIAAXtaAgAizhgCAALZS4A==
Date: Mon, 26 Oct 2015 18:00:37 +0000
Message-ID: <CY1PR03MB13746A422A408890023C61D987230@CY1PR03MB1374.namprd03.prod.outlook.com>
References: <CABkgnnWREq6X+chcvookChGAZGxkJ6Zs_7FGwz7Mbn12XMxewQ@mail.gmail.com> <CABkgnnVeWXQ0KM+EuGrK6Nj6yuJKP6jGb51g2bN1+G_MHLcJig@mail.gmail.com> <20151020062455.GA476@LK-Perkele-V2.elisa-laajakaista.fi> <633F3373-BCB3-4985-ACE7-209F02A167B6@redhat.com> <CABkgnnVhYrodst7OMLGsyebLYXqF+S2qF+aaJiQx28xrAZ-a7w@mail.gmail.com> <A6CD7323-074D-49B0-934E-A64CE791CF39@gmail.com>
In-Reply-To: <A6CD7323-074D-49B0-934E-A64CE791CF39@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Michael.Bishop@microsoft.com;
x-originating-ip: [131.107.174.95]
x-microsoft-exchange-diagnostics: 1; CY1PR03MB1376; 5:uJoLlYxLpI7Cm3NhRkyfc23yoYNjBu5LShu52NTA8KvkBPuFSGenEqURYJO3wgblFvqF3s/wIEqv7IfA7tfhpwacXMhJPvIB+uyryCSxX/NZ5oSv5+u1exYcepgjWMFBYB+yla2P+kCt5bLg7Wjn6A==; 24:jLH9SFVSIGoEER5vk0uqMK5s+qKLljU1KqNSxjfcNwa7PD54WZ8lLe1pacECVJZKE48M/w5AP0SggC6qVa3IYGfYQSov5epw911WwiWTFD0=; 20:ey60xxOaeWY9dBrAWZHUWUVYM5y9Vn8K1KXBWEoPn1LXlFwEINHVwKbX5LfGes2qwNDNm6A1eV2k9R+QuTdQOQ==
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:CY1PR03MB1376;
x-o365eop-header: O365_EOP: Allow for Unauthenticated Relay
x-o365ent-eop-header: Message processed by - O365_ENT: Allow from ranges (Engineering ONLY)
x-microsoft-antispam-prvs: <CY1PR03MB13769838E20BF0EB0D8E2DF087230@CY1PR03MB1376.namprd03.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(61425024)(601004)(2401047)(8121501046)(520078)(5005006)(3002001)(102215026)(61426024)(61427024); SRVR:CY1PR03MB1376; BCL:0; PCL:0; RULEID:; SRVR:CY1PR03MB1376;
x-forefront-prvs: 0741C77572
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(24454002)(199003)(377454003)(189002)(13464003)(86612001)(86362001)(40100003)(5002640100001)(2950100001)(101416001)(76176999)(93886004)(122556002)(50986999)(2900100001)(189998001)(5005710100001)(8990500004)(87936001)(5004730100002)(66066001)(54356999)(77096005)(10290500002)(10400500002)(5007970100001)(74316001)(5008740100001)(92566002)(19580405001)(10090500001)(106116001)(11100500001)(97736004)(102836002)(5001770100001)(81156007)(33656002)(106356001)(5001960100002)(105586002)(5003600100002)(99286002)(76576001)(19580395003); DIR:OUT; SFP:1102; SCL:1; SRVR:CY1PR03MB1376; H:CY1PR03MB1374.namprd03.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
spamdiagnosticoutput: 1:23
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Oct 2015 18:00:38.1648 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY1PR03MB1376
Received-SPF: pass client-ip=157.56.111.131; envelope-from=Michael.Bishop@microsoft.com; helo=na01-bn1-obe.outbound.protection.outlook.com
X-W3C-Hub-Spam-Status: No, score=-4.1
X-W3C-Hub-Spam-Report: AWL=-2.567, BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, W3C_NW=0.5
X-W3C-Scan-Sig: lisa.w3.org 1Zqm4w-0007IQ-JC 0b8aa916fd3c25e579ec0273451c7a63
X-Original-To: ietf-http-wg@w3.org
Subject: RE: Report on preliminary decision on TLS 1.3 and client auth
Archived-At: <http://www.w3.org/mid/CY1PR03MB13746A422A408890023C61D987230@CY1PR03MB1374.namprd03.prod.outlook.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/30404
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>
Yes, the new thing would be "just" a new authentication mechanism, but the existing apps call down to the HTTP layer requesting the client cert, which asks TLS to either return or obtain the client cert. As Martin has said, there's no opposition to a cert-based, or key-based, HTTP auth protocol being defined. That's definitely something beneficial to the Internet that people could move toward in the future. However, in the short term, we have applications which rely on the existing APIs and mechanisms -- the goal with this draft is simply as a compatibility measure. Currently, those applications cannot use HTTP/2 over TLS 1.2 without one of the various hacks; in TLS 1.3, it will be less hacky. You're arguing for a more idealized solution -- that's something I can get behind as a long-term direction, but we also have short-term issues that need a solution. One does not preclude the other. -----Original Message----- From: Yoav Nir [mailto:ynir.ietf@gmail.com] Sent: Monday, October 26, 2015 12:03 AM To: Martin Thomson <martin.thomson@gmail.com> Cc: Jason T. Greene <jason.greene@redhat.com>; Ilari Liusvaara <ilariliusvaara@welho.com>; HTTP Working Group <ietf-http-wg@w3.org> Subject: Re: Report on preliminary decision on TLS 1.3 and client auth > On 20 Oct 2015, at 9:10 PM, Martin Thomson <martin.thomson@gmail.com> wrote: > > On 20 October 2015 at 05:31, Jason T. Greene <jason.greene@redhat.com> wrote: >> Wouldn't the semantics be a hell of a lot cleaner, and implementations a lot simpler, if we just pushed this to an HTTP cert auth protocol? > > Yes, yes it would. A better authentication mechanism might be better > still. But that would be a new protocol. We have plenty of evidence > to suggest that a new protocol would not be acceptable. As I said, we > are already at plan B. An HTTP cert auth protocol is just an HTTP authentication method, much like Basic, Digest or the experimental ones we’re standardizing in http-auth. The framework is already there in all clients and servers. It has the advantage that you don’t have to skip between protocol layers - it’s all in HTTP. This way the client is in control of which streams are authenticated and which are not, so Imari’s security hole could go away. Practically you probably don’t want to sign each request, so applications are likely to set a cookie (or tokbind) after a single authentication and use that to continue the authentication to other resources, but that’s the way they do it with other forms of authentication anyway. Yoav
- Report on preliminary decision on TLS 1.3 and cli… Martin Thomson
- Re: Report on preliminary decision on TLS 1.3 and… Amos Jeffries
- Re: Report on preliminary decision on TLS 1.3 and… Martin Thomson
- Re: Report on preliminary decision on TLS 1.3 and… Amos Jeffries
- Re: Report on preliminary decision on TLS 1.3 and… Martin Thomson
- Re: Report on preliminary decision on TLS 1.3 and… Ilari Liusvaara
- Re: Report on preliminary decision on TLS 1.3 and… Poul-Henning Kamp
- Re: Report on preliminary decision on TLS 1.3 and… Yoav Nir
- Re: Report on preliminary decision on TLS 1.3 and… Poul-Henning Kamp
- Re: Report on preliminary decision on TLS 1.3 and… Martin Thomson
- Re: Report on preliminary decision on TLS 1.3 and… Poul-Henning Kamp
- Re: Report on preliminary decision on TLS 1.3 and… Kyle Rose
- Re: Report on preliminary decision on TLS 1.3 and… Martin Thomson
- Re: Report on preliminary decision on TLS 1.3 and… Willy Tarreau
- Re: Report on preliminary decision on TLS 1.3 and… Poul-Henning Kamp
- Re: Report on preliminary decision on TLS 1.3 and… Ilari Liusvaara
- Re: Report on preliminary decision on TLS 1.3 and… Willy Tarreau
- Re: Report on preliminary decision on TLS 1.3 and… Willy Tarreau
- Difffent ways to authenticate (Was: Re: Report on… Ilari Liusvaara
- Re: Report on preliminary decision on TLS 1.3 and… Martin Thomson
- Re: Report on preliminary decision on TLS 1.3 and… Ilari Liusvaara
- Re: Report on preliminary decision on TLS 1.3 and… Jason T. Greene
- Re: Report on preliminary decision on TLS 1.3 and… Martin Thomson
- Re: Report on preliminary decision on TLS 1.3 and… Martin Thomson
- Re: Report on preliminary decision on TLS 1.3 and… Kyle Rose
- Re: Report on preliminary decision on TLS 1.3 and… Martin Thomson
- Re: Report on preliminary decision on TLS 1.3 and… Kyle Rose
- Re: Report on preliminary decision on TLS 1.3 and… Yoav Nir
- RE: Report on preliminary decision on TLS 1.3 and… Mike Bishop
- Re: Report on preliminary decision on TLS 1.3 and… Yoav Nir