Re: Client Certificates - re-opening discussion

Mike Belshe <mike@belshe.com> Fri, 18 September 2015 18:23 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 864FA1B2F15 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Fri, 18 Sep 2015 11:23:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.289
X-Spam-Level:
X-Spam-Status: No, score=-6.289 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 43GgVVBr_0ty for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Fri, 18 Sep 2015 11:23:18 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2B27C1B2EFD for <httpbisa-archive-bis2Juki@lists.ietf.org>; Fri, 18 Sep 2015 11:23:16 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.80) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1Zd0H1-0001zM-K4 for ietf-http-wg-dist@listhub.w3.org; Fri, 18 Sep 2015 18:20:39 +0000
Resent-Date: Fri, 18 Sep 2015 18:20:39 +0000
Resent-Message-Id: <E1Zd0H1-0001zM-K4@frink.w3.org>
Received: from maggie.w3.org ([128.30.52.39]) by frink.w3.org with esmtps (TLS1.2:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <mike@belshe.com>) id 1Zd0Gw-0001x7-4y for ietf-http-wg@listhub.w3.org; Fri, 18 Sep 2015 18:20:34 +0000
Received: from mail-yk0-f180.google.com ([209.85.160.180]) by maggie.w3.org with esmtps (TLS1.2:RSA_ARCFOUR_SHA1:128) (Exim 4.80) (envelope-from <mike@belshe.com>) id 1Zd0Gu-0008Rv-4S for ietf-http-wg@w3.org; Fri, 18 Sep 2015 18:20:33 +0000
Received: by ykft14 with SMTP id t14so54259258ykf.0 for <ietf-http-wg@w3.org>; Fri, 18 Sep 2015 11:20:05 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=ApzzOW5ikDOKSnAgl41k/p1EnY3xLkSrdMD7LBU9dBE=; b=GEiE36Xg1HhYfnla3AzPwvRb9pq2+bs/OryF8xIB4jQaya296WTrnq0ruByTxBcWUo 3Ge8yvwznJNzlOPg8OgrcfPwSiYb2pYOI0sQyeQ/zIUO+67uy2+PzECKSHcqtMTwPOKo lUFsfmuQVDAaQKynDnjOj77u4Jn2iDJmpvep3Sz+4UV/v+QzBO9hgcR3H8oo5c6/9c+P UQlfyNgFiitzxofKEMErrJ7nUemqF1L+9dSkNW6atijKb9AIYia3iCuXGKLsJTGEWuhW VL4TaL3qaYB722i/S5q0lhyoEGNuXfdYTqPU2kx3SuqgL0vkwAOzFZxRQuHQjMz7tf0J K95w==
X-Gm-Message-State: ALoCoQm3KqmHoV7uD8LLCB/RwH4Ff6f1YBMPa79iD4EMMz7yQUiOIGA7GmKCRHs3mzMiBkIFnken
MIME-Version: 1.0
X-Received: by 10.170.149.132 with SMTP id q126mr6006761ykc.18.1442600405392; Fri, 18 Sep 2015 11:20:05 -0700 (PDT)
Received: by 10.37.47.131 with HTTP; Fri, 18 Sep 2015 11:20:05 -0700 (PDT)
In-Reply-To: <2F3BD1CB-042D-48AB-8046-BB8506B8E035@mnot.net>
References: <63DECDF0-AB59-4AFD-8E48-8C2526FD6047@mnot.net> <42DDF1C6-F516-4F71-BAE0-C801AD13AA01@co-operating.systems> <2F3BD1CB-042D-48AB-8046-BB8506B8E035@mnot.net>
Date: Fri, 18 Sep 2015 11:20:05 -0700
Message-ID: <CABaLYCtZ_EAGKaW0ydcYoKSJjyv6=YXdLrry2LQyVTzcC_qt_w@mail.gmail.com>
From: Mike Belshe <mike@belshe.com>
To: Mark Nottingham <mnot@mnot.net>
Cc: Henry Story <henry.story@co-operating.systems>, HTTP Working Group <ietf-http-wg@w3.org>
Content-Type: multipart/alternative; boundary="001a11397180b7a1240520099497"
Received-SPF: none client-ip=209.85.160.180; envelope-from=mike@belshe.com; helo=mail-yk0-f180.google.com
X-W3C-Hub-Spam-Status: No, score=-5.7
X-W3C-Hub-Spam-Report: AWL=-1.137, BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, W3C_AA=-1, W3C_WL=-1
X-W3C-Scan-Sig: maggie.w3.org 1Zd0Gu-0008Rv-4S e1351ac7e5fb02c2ef9f3e9c36e4ef7d
X-Original-To: ietf-http-wg@w3.org
Subject: Re: Client Certificates - re-opening discussion
Archived-At: <http://www.w3.org/mid/CABaLYCtZ_EAGKaW0ydcYoKSJjyv6=YXdLrry2LQyVTzcC_qt_w@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/30219
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

In a strange twist of fate I find myself doing a lot of PKI work these
days, and I've considered a fair bit about how client-certs might help with
some of my application-level needs.

However, just like HTTP's basic-auth, I wonder HTTP or TLS level
client-certs will just never be used?  My concern, of course, is that we
build something that has a user experience similar to HTTP's basic-auth.
It's so bad that nobody can use it and authentication gets pulled into web
pages (where ironically, it is less secure!).

Mark - you said there is "pain".  Is there a set of use cases to be solved
here?  Let me know if I missed them - I may be able to contribute.

My suspicion is that we really need crypto features moved up a level from
the protocol, as it will be very difficult to make satisfactory user
interfaces from the protocol level alone.  Perhaps for machine-to-machine
auth it would be okay.

Mike





On Fri, Sep 18, 2015 at 10:05 AM, Mark Nottingham <mnot@mnot.net> wrote:

> Hi Henry,
>
> Thanks, but this is a much more narrowly-scoped discussion -- how to make
> client certs as they currently operate work in HTTP/2. At most, I think
> we'd be talking about incrementally improving client certs (e.g.,
> clarifying / optimising the scope of their applicability -- and that really
> just is an example, not a statement of intent).
>
> Cheers,
>
>
> > On 18 Sep 2015, at 11:53 am, Henry Story
> <henry.story@co-operating.systems> wrote:
> >
> >
> >> On 17 Sep 2015, at 23:10, Mark Nottingham <mnot@mnot.net> wrote:
> >>
> >> Hi,
> >>
> >> We've talked about client certificates in HTTP/2 (and elsewhere) for a
> while, but the discussion has stalled.
> >>
> >> I've heard from numerous places that this is causing Pain. So, I'd like
> to devote a chunk of our time in Yokohama to discussing this.
> >>
> >> If you have a proposal or thoughts that might become a proposal in this
> area, please brush it off and be prepared. Of course, we can discuss
> on-list in the meantime.
> >>
> >> Cheers,
> >>
> >> --
> >> Mark Nottingham   https://www.mnot.net/
> >
> >
> > Apart from the proposals as the proposal by Martin Thomson
> > and the follow up work  referenced earlier in this thread
> > by Mike Bishop [1], I'd like to mention more HTTP centric
> > prototypes which would rely perhaps not so much on certificates,
> > but on linked public keys, that build on existing HTTP
> > mechanisms such as WWW-Authenticate, which if they pass security
> > scrutiny would fit nicely it seems to me with HTTP/2.0 .
> >
> > • Andrei Sambra's first sketch authentication protocol
> >   https://github.com/solid/solid-spec#webid-rsa
> >
> > • Manu Sporny's more fully fleshed out HTTP Message signature
> >   https://tools.ietf.org/html/draft-cavage-http-signatures-04
> >
> > These and the more TLS centric protocols require the user
> > agent to be able to use public/private keys generated by
> > the agent, and signed  or published by that origin, to
> > authenticate or sign documents across origins.
> >
> > This is where one often runs into the Same Origin Policy (SOP)
> > stone wall. There was an important discussion on
> > public-webappsec@w3.org [1] and public-web-security@w3.org
> > entitled
> >
> >   "A Somewhat Critical View of SOP (Same Origin Policy)" [2]
> >
> > that I think has helped clarify the distinction between Same Origin
> > Policy, Linkability, Privacy and User Control, and which I hope
> > has helped show that this policy cannot be applied without
> > care nor can it apply everywhere.
> >
> > The arguments developed there should be helpful in opening discussion
> > here and elswhere too I think. In a couple of e-mails  in that
> > thread, I went into great detail showing how SOP, linkability and User
> > Control and privacy apply in very different ways to 4 technologies:
> > Cookies, FIDO, JS Crypto API and client certificates [3]. This shows
> > that the concepts don't overlap, two being technical and the two
> > legal/philosophical, each technology enabling some aspect of the
> > other, and not always the way one would expect.
> >
> > Having made those conceptual distinctions I think the path to
> > acceptance of solutions proposed by this group will be much eased.
> >
> > Looking forward to following and testing work developed here,
> >
> > All the best,
> >
> >       Henry
> >
> >
> > [1] • starting:
> https://lists.w3.org/Archives/Public/ietf-http-wg/2015AprJun/0558.html
> >    • most recent by Mike Bishop
> >
> https://lists.w3.org/Archives/Public/ietf-http-wg/2015JulSep/0310.html
> > [2] https://lists.w3.org/Archives/Public/public-webappsec/2015Sep/
> > [3]
> https://lists.w3.org/Archives/Public/public-webappsec/2015Sep/0101.html
> >  which is in part summarised with respect to FIDO in a much shorter
> >  email
> >
> https://lists.w3.org/Archives/Public/public-webappsec/2015Sep/0119.html
> >
>
> --
> Mark Nottingham   https://www.mnot.net/
>
>
>
>
>
>