Re: HTTP Unprompted Authentication

Ben Schwartz <bemasc@google.com> Wed, 19 October 2022 14:02 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 338B8C14CE3B for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Wed, 19 Oct 2022 07:02:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.262
X-Spam-Level:
X-Spam-Status: No, score=-15.262 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.249, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5WwmRVqn77Jr for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Wed, 19 Oct 2022 07:02:06 -0700 (PDT)
Received: from lyra.w3.org (lyra.w3.org [128.30.52.18]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F3AF2C14CF14 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Wed, 19 Oct 2022 07:02:05 -0700 (PDT)
Received: from lists by lyra.w3.org with local (Exim 4.94.2) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1ol9bn-003uzp-Lr for ietf-http-wg-dist@listhub.w3.org; Wed, 19 Oct 2022 13:59:47 +0000
Resent-Date: Wed, 19 Oct 2022 13:59:47 +0000
Resent-Message-Id: <E1ol9bn-003uzp-Lr@lyra.w3.org>
Received: from titan.w3.org ([128.30.52.76]) by lyra.w3.org with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from <bemasc@google.com>) id 1ol9bl-003uyX-Qw for ietf-http-wg@listhub.w3.org; Wed, 19 Oct 2022 13:59:45 +0000
Received: from mail-vk1-xa2d.google.com ([2607:f8b0:4864:20::a2d]) by titan.w3.org with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.94.2) (envelope-from <bemasc@google.com>) id 1ol9bk-00FiIY-CX for ietf-http-wg@w3.org; Wed, 19 Oct 2022 13:59:45 +0000
Received: by mail-vk1-xa2d.google.com with SMTP id q83so8356977vkb.2 for <ietf-http-wg@w3.org>; Wed, 19 Oct 2022 06:59:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=fY0eLWETsPiAN5e2WFFm/1BiqzTuXFOdLdPjiv4ieHs=; b=ADpGPAaJoHYu+HOH4ipS0uNRqTIjMTOoCXE9aBVGs0UcLFqfTqK9l5PmJOgBN8LDTS rLND8dtwFJRjgDq9wYqr/enGiAzqHzPlhMY3FYYMPkVcRs2LgiZUsY/1vp9OfQQuApMt XvT11cl0zONxokOup/0a1/Wbeb9DpADBAJezHbOh25cZa7qPP37OL1jSekfH4uz4juel tH67X/SBFFvFwa6GjCGrUYpYOpmWbNjLUR6b3O8ReoM+nczb6V8XfjlBcsCA13BUTxyA W2uURWn3DN7NVGGRjTYp9TxJ8glLbHt1IidB33vJF6p/qWAN4hGo3/Ey5/sQhdq5Ocmr h+4A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=fY0eLWETsPiAN5e2WFFm/1BiqzTuXFOdLdPjiv4ieHs=; b=PZL4I1q4Le+/morH23V0XjPhRBzrooPFn+4CxpeZVuvhb4gOXvIF9TtB9+YAJcKW9T 47F14OZi0wDyJU3394XRXQYKfeCj2tMxnq/MqWHHfnufZBPEHF9b7ec4O9wJoUdmRexm Ki7Qq1Fi2sITFlG29++1N5iDRV5UoziJbhaQipfR3BUVa3ofATOY5+tmYixvk/JuAdZI aB+ZciYVT35dK8C717QYWXZzD2Vz6UiXRCWCFJM1XfFYqW1vhiDQBGjbL7/zDEiodY4l CKblTV+ver8LEPPsT4Nt+ASlhRpN4x1w3i3GJCno9bGCPYfb6f7FEZMFdGKII7nLsxiR dLZw==
X-Gm-Message-State: ACrzQf3FePjXpM5kwXQstWVFDgSFcTACk/4fDOK0CTvWzfACU7emj8wv bj/nfJ10VKFTRvNZVuuTcpTBeb24+L+7egjk4c+0aHHL5PA=
X-Google-Smtp-Source: AMsMyM4a/Cc6wKhKEj9T++CtyHLbnRCw83gOm++uc+eSnTiHo/875lnFUAokvSHlIV/d6+Nm52FMMxF36+xEBwj82Oo=
X-Received: by 2002:ac5:c3da:0:b0:3ab:cb63:9eac with SMTP id t26-20020ac5c3da000000b003abcb639eacmr3907346vkk.21.1666187973295; Wed, 19 Oct 2022 06:59:33 -0700 (PDT)
MIME-Version: 1.0
References: <CAHbrMsCWsLsaNXi4J+DbOvpvjxx8m11F0NpgEeZUY34n89hYtQ@mail.gmail.com> <CAPDSy+7-XDSSeqFx5FWkSbej6fAGvvMdDKExghgS0DO6BeGL=g@mail.gmail.com>
In-Reply-To: <CAPDSy+7-XDSSeqFx5FWkSbej6fAGvvMdDKExghgS0DO6BeGL=g@mail.gmail.com>
From: Ben Schwartz <bemasc@google.com>
Date: Wed, 19 Oct 2022 09:59:21 -0400
Message-ID: <CAHbrMsCTqiuqNHbuLJTY5E0u2obOYcVNcPUwt4Eg6=YggWLcZw@mail.gmail.com>
To: David Schinazi <dschinazi.ietf@gmail.com>
Cc: HTTP Working Group <ietf-http-wg@w3.org>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary="0000000000004e62b505eb639eba"
Received-SPF: pass client-ip=2607:f8b0:4864:20::a2d; envelope-from=bemasc@google.com; helo=mail-vk1-xa2d.google.com
X-W3C-Hub-DKIM-Status: validation passed: (address=bemasc@google.com domain=google.com), signature is good
X-W3C-Hub-Spam-Status: No, score=-21.6
X-W3C-Hub-Spam-Report: BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5, W3C_AA=-1, W3C_DB=-1, W3C_IRA=-1, W3C_WL=-1
X-W3C-Scan-Sig: titan.w3.org 1ol9bk-00FiIY-CX 22fb61c1c75c4419045ce63fefb1260e
X-Original-To: ietf-http-wg@w3.org
Subject: Re: HTTP Unprompted Authentication
Archived-At: <https://www.w3.org/mid/CAHbrMsCTqiuqNHbuLJTY5E0u2obOYcVNcPUwt4Eg6=YggWLcZw@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/40468
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <https://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

On Tue, Oct 18, 2022 at 5:49 PM David Schinazi <dschinazi.ietf@gmail.com>
wrote:

> Hi Ben,
>
> I don't think confidential HTTP resources are a solved problem. The
> unguessable path approach you describe is similar to a shared secret (à la
> symmetric cryptography) but there is no equivalent for
> asymmetric cryptography.
>

I would appreciate some explanation of why asymmetric cryptography is
helpful in Unprompted Authentication.

Normally, asymmetric signatures are used to prevent the verifier, or an
onlooker, from impersonating the signer.  However, that consideration does
not apply here, because the exchange is already confidential (thanks to
"https") between the verifier (the origin) and the signer (the client) so
there are no (untrusted) onlookers, and there is only one potential
verifier (the origin itself).

Another possible threat would be an onlooker on the "bootstrap" path. e.g.
the email exchange in which the client learned about this confidential
resource.  However, such an onlooker has already learned about the
existence of the resource, thus defeating the confidentiality protection,
so it must be excluded from the threat model.

If client keys are reused across multiple origins, this could justify the
use of asymmetric cryptography, but that would be a bad idea anyway for
linkability reasons.

If I were trying to make the strongest case for Unprompted Authentication,
it would be that "unguessable" URLs tend to leak in browser history,
whereas other authorization credentials are more easily protected.  This
could justify the new HTTP header, but it doesn't imply any use of
asymmetric crypto.


> While I think your draft is interesting and worth discussing, I think the
> technology overlap isn't big enough to warrant discussing the two drafts
> together - they're separate proposals with different goals.
>

They're definitely separate, and use unrelated technology.  I do think the
ultimate goals overlap considerably.

>