Re: Call for Adoption: draft-richanna-http-message-signatures

Rob Sayre <sayrer@gmail.com> Fri, 10 January 2020 05:09 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6F81C12012A for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Thu, 9 Jan 2020 21:09:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.749
X-Spam-Level:
X-Spam-Status: No, score=-2.749 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.25, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hrquudz3oV1D for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Thu, 9 Jan 2020 21:09:08 -0800 (PST)
Received: from frink.w3.org (frink.w3.org [IPv6:2603:400a:ffff:804:801e:34:0:38]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3A728120077 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Thu, 9 Jan 2020 21:09:07 -0800 (PST)
Received: from lists by frink.w3.org with local (Exim 4.89) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1ipmUs-0003zF-BH for ietf-http-wg-dist@listhub.w3.org; Fri, 10 Jan 2020 05:06:10 +0000
Resent-Date: Fri, 10 Jan 2020 05:06:10 +0000
Resent-Message-Id: <E1ipmUs-0003zF-BH@frink.w3.org>
Received: from mimas.w3.org ([2603:400a:ffff:804:801e:34:0:4f]) by frink.w3.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from <sayrer@gmail.com>) id 1ipmUr-0003yU-1v for ietf-http-wg@listhub.w3.org; Fri, 10 Jan 2020 05:06:09 +0000
Received: from mail-io1-xd2f.google.com ([2607:f8b0:4864:20::d2f]) by mimas.w3.org with esmtps (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92) (envelope-from <sayrer@gmail.com>) id 1ipmUo-0005mp-7A for ietf-http-wg@w3.org; Fri, 10 Jan 2020 05:06:08 +0000
Received: by mail-io1-xd2f.google.com with SMTP id h8so713384iob.2 for <ietf-http-wg@w3.org>; Thu, 09 Jan 2020 21:06:05 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=ygR8tEWF4RRjab4sKmv1Ell5xx7xx/Rh6mQLwlHrVVs=; b=UVlUqUuIbf4ekWKfZ2fXihVDeIadE7/BdW/prJP3CE+RCFDq3bS/Z0TEPQaAfn7JOt 8ryA6+lc9bl4btz0JWbN9ESwm7cs3nRz7e46yyeTjqYNEOqxA2NB1wUr+cclva0WcKk0 AS9rLDmAHFaB45+KD0TGu4wmaN89KbXV+4i1itQhLresiBSPJ1yNC5BgQzd7Ihy/5NkL 5aLprfJl7nAdY53OEMOIB2Ip+0N4f3MBSPU8v/J+YH6zjFBNlymE9/l726+diykATcV3 6o/p+EydqMKttTa0uIckOeDvBIbFV+6p78WWAQlF0q9JMhzA8pxS6TRsW/Y5lBkTO2nC WW0Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=ygR8tEWF4RRjab4sKmv1Ell5xx7xx/Rh6mQLwlHrVVs=; b=NR2HYcX0UETsUK0EPjj2oPrE+++Pg6+Thtq3OvLTpp/y/PjrJ7vHB5vuOS89AF9ovO aONxgJt7JuujPZAavDSfuYGkPiwyiwF+az2noRtDir22h0lrsTNc31uOwxzG3ustD27E 0omJNRH0IPj8L/wraxd78oU6XDkXT2nC7SJ343JTPMZIBDza+r8GZqMOuGpOEIRgXagK nWAoekTDXY7RhYpoflmi9bXjg6eTQljAjNPuJPJ/wsovjKt68yTmbcfHb4JLMjLE2tUE unWmjQDqsTwysNEGRcxv9SC0iR3bsAhzz9Jugl7KvsNGfttecm7N2Mmn2I/9DUliqeQ8 hlnA==
X-Gm-Message-State: APjAAAXrztdy+Zi60wKK8C6sQHrPVIBeryrkDo2CBai4rRf9BFWZ5oTk mwSTI+RjMpUPG/iOEYgy3ARVxttrRk9xc9MTR2wSuIstsirP1g==
X-Google-Smtp-Source: APXvYqzWRWFsaOzjkFJIwWZv5kV8PgL0veOQo3Kp5vh3K0IRCKYtojxSSW9JltO7C9MYNHkPcvTOhg8MzVh9zlNgQwM=
X-Received: by 2002:a6b:fc0c:: with SMTP id r12mr833016ioh.189.1578632764339; Thu, 09 Jan 2020 21:06:04 -0800 (PST)
MIME-Version: 1.0
References: <76565D7E-C7F5-4D5D-BE3A-6E686E096B14@mnot.net> <1bf9b1fb-10d0-4948-a7e6-a913e54b7828@www.fastmail.com> <279D48F9-FE36-474B-B2F9-48C4E3713229@mit.edu> <1AB9E384-A73A-4420-9F60-43FE53F62AE5@amazon.com> <78077793-5ef1-41b8-aad0-534a894259a0@www.fastmail.com>
In-Reply-To: <78077793-5ef1-41b8-aad0-534a894259a0@www.fastmail.com>
From: Rob Sayre <sayrer@gmail.com>
Date: Thu, 09 Jan 2020 21:05:53 -0800
Message-ID: <CAChr6SyxhqpJQQy3iWt_y9eC2uTdUwQdJ5VEzXoU4ZF0dM1C2w@mail.gmail.com>
To: Martin Thomson <mt@lowentropy.net>
Cc: "Richard Backman, Annabelle" <richanna@amazon.com>, Justin Richer <jricher@mit.edu>, "ietf-http-wg@w3.org" <ietf-http-wg@w3.org>
Content-Type: multipart/alternative; boundary="000000000000263ca1059bc21595"
Received-SPF: pass client-ip=2607:f8b0:4864:20::d2f; envelope-from=sayrer@gmail.com; helo=mail-io1-xd2f.google.com
X-W3C-Hub-Spam-Status: No, score=-4.1
X-W3C-Hub-Spam-Report: BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, W3C_AA=-1, W3C_WL=-1
X-W3C-Scan-Sig: mimas.w3.org 1ipmUo-0005mp-7A 580dc92e67b352d03c43f61c5db56d70
X-Original-To: ietf-http-wg@w3.org
Subject: Re: Call for Adoption: draft-richanna-http-message-signatures
Archived-At: <https://www.w3.org/mid/CAChr6SyxhqpJQQy3iWt_y9eC2uTdUwQdJ5VEzXoU4ZF0dM1C2w@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/37247
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <https://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

Hi,

I support this work.

Martin raised the issue of "à la carte selection of what to sign" as well
as related concerns around intermediaries:

"The interaction between signing and intermediation is a topic that
requires some attention... For instance, what if an intermediary adds a
cache-control directive when that header field was signed previously?"

That is the strength of proposals along these lines. The endpoints decide
which fields to sign, and the amount of intermediary mangling to be
tolerated. In some cases, they will sign everything and tolerate no
mangling or additions. Another example: a strict and complete signing
approach would not tolerate an edge server adding an "X-Forwarded-For"
header, but this proposal allows for it.

thanks,
Rob


On Thu, Jan 9, 2020 at 5:50 PM Martin Thomson <mt@lowentropy.net> wrote:

> Thanks Annabelle,
>
> I want to acknowledge how much this is engaging with the process with the
> right intentions.  Having existing deployments when you enter a process
> like this is always a mixed bag; you get great experience to draw from, but
> also suffer from some inertia.  We'll just have to work that out as we go.
>
> I'd say that addressing the question of flexibility is my first concern as
> much of the rest of this is driven by that.  We'll need to lean on your
> experience and contacts with real deployments for that.
>
> On Fri, Jan 10, 2020, at 12:40, Richard Backman, Annabelle wrote:
> > (Full disclosure: I am the editor of the proposed draft)
> >
> > Martin raises several important points that will need to be addressed.
> > In my opinion, this should happen within the HTTP working group, so
> > that the right people can be involved in the conversation, and
> > consensus-driven decisions can be made with full understanding of the
> > greater context of HTTP's past, present, and future. It is true that a
> > variety of groups are attempting to solve message signing and adjacent
> > problems within particular contexts, but I think a general purpose
> > solution from this working group would help drive consistency rather
> > than simply be the N+1'th standard.
> >
> > One quick note on scope/intent: this document is intended to provide a
> > general purpose mechanism that can be leveraged and profiled by other
> > specifications, developed here or in other working groups, or even
> > outside the IETF (e.g., the OpenID Foundation or W3C). It does not
> > describe how to use signatures for X or Y purpose, how to negotiate,
> > distribute, or identify keys, or how to indicate what information from
> > the request the sender must sign in order to be "secure." The answers
> > to these questions vary from use case to use case, and are therefore
> > left to profiling documents to define, as appropriate for their context.
> >
> > –
> > Annabelle Richard Backman
> > AWS Identity
> >
> >
> > On 1/9/20, 1:53 PM, "Justin Richer" <jricher@mit.edu> wrote:
> >
> >     Thank you for all of your points below, they’re thoughtful and
> > well-considered. Just a couple points that I would like to respond too.
> >
> >     To be clear, changing syntax and breaking with existing deployments
> > of the Cavage series is absolutely on the table. Communicating with the
> > existing implementation community and providing guidance forward from
> > the Cavage series to this new work is something that the editors are
> > keenly aware of. If that means using structured headers or something
> > like that, then that’s something we need to decide in the WG. This is
> > where the expertise for that is.
> >
> >     The editors are also deeply familiar with JOSE and the differences
> > from that are, and will continue to be, in our minds going forward. We
> > have some ideas about how we can re-use the JWS algorithms (and maybe
> > even its registry), and we intend to involve many members of the SEC
> > area in this work. That said, I really think the canonicalization of
> > the HTTP request is going to be far and away the hardest part of this
> > work, and that was the general thought at the SECDISPATCH talk with a
> > room full of security experts. JWS made life easy by not doing any
> > canonicalization at all, but that comes at the cost of message rigidity
> > that can’t be counted on at the HTTP layer.
> >
> >      — Justin
> >
> >     > On Jan 9, 2020, at 1:13 AM, Martin Thomson <mt@lowentropy.net>
> > wrote:
> >     >
> >     > I think that if we were going to do this we would need to find a
> > way to better scope the work.  The draft you suggest we adopt does a
> > lot and some of that overlaps with existing work from other IETF groups
> > that are probably better suited to the definition.
> >     >
> >     > I see here canonicalization of (subsets of) HTTP messages,
> > something that probably belongs here.  We might also want to engage
> > with the question of what is signed.  More on both these subjects below.
> >     >
> >     > But this also defines a bespoke signing format, something the
> > IETF has done many times before.  I would prefer that we lean on JWS,
> > COSE, or even CMS when it comes to defining signatures.  In a brief
> > review of the document, I wasn't able to convince myself that the
> > current draft was free from some very simple problems in signature
> > construction.  An analysis of this is a surprisingly difficult thing to
> > do well and we would do well to rely on the work of others here to the
> > greatest extent possible.
> >     >
> >     > Yes, that might change the syntax in ways that are incompatible
> > with deployments, but I don't think that we should take this work on if
> > we aren't allowing for that possibility.  To give a simpler example,
> > using structured headers would be a breaking change, but also a very
> > worthwhile one in my view.
> >     >
> >     > I remain unconvinced that à la carte selection of what to sign is
> > a good strategy in general.  In two ways.  Firstly, an endpoint that
> > validates a signature needs to be careful not to consume unsigned
> > information.  There are likely strategies that can minimize exposure to
> > that risk, but anything we develop would need to consider that.
> > Secondly, this loose sort of definition means that the format is only
> > ever reliably available in very narrow application domains where it is
> > feasible to perform the necessary analysis on what can and cannot be
> > signed.  For application domains like that, specific profiles with
> > little or no flexibility are possible.  Profiles are likely to be more
> > secure as a result of being able to perform a more bounded and thorough
> > analysis.  Profiles are also more concise.
> >     >
> >     > Similarly, this takes an attitude toward canonicalization for
> > signing that differs from that taken in JWS (and web packaging, for
> > something closer to home).  I suspect that we can't avoid
> > canonicalization here due to the nature of the protocol, but it is a
> > significant complicating factor.  For instance, the draft here doesn't
> > really address the potential for character encoding issues.
> >     >
> >     > The interaction between signing and intermediation is a topic
> > that requires some attention.  This was very much an afterthought in
> > the token binding work and it produced a bunch of problems.  For
> > instance, what if an intermediary adds a cache-control directive when
> > that header field was signed previously?  Or what if endpoints and
> > intermediaries disagree about what can or cannot be modified?
> >     >
> >     > ACME takes a very different approach to signing.  Lessons from
> > that work are probably worth considering, such as the way that the
> > protocol adds anti-replay mechanisms independent of, but interlocking
> > with, the signature mechanism.  Understanding if anti-replay is in
> > scope would be good.
> >     >
> >     > In the end, I concede that there are people out there with a need
> > in this area and that we should probably do this work, but it is a
> > non-trivial enterprise.
> >     >
> >     > Yes, you can read this as me preferring a different approach,
> > maybe one closer to what ACME ended up with, but it shouldn't mean that
> > we shouldn't take on this work.  I acknowledge that the existence of a
> > willing constituency of customers for this greatly outweighs many of
> > these concerns.  I am willing to review the work and hope that the
> > above is construed as constructive input to future iterations.
> >     >
> >     > Procedural question: If we do this, what would we say about the
> > interactions with the web packaging work?  That also aims to sign HTTP
> > $somethings using a bespoke format, but the proposals there take a very
> > different approach.  I would rather avoid another XKCD 927 here.
> >     >
> >     > On Thu, Jan 9, 2020, at 15:33, Mark Nottingham wrote:
> >     >> Hello everyone,
> >     >>
> >     >> We've discussed mechanisms for signing HTTP messages for some
> > time. At
> >     >> IETF106, this draft was presented in the SECDISPATCH Working
> > Group:
> >     >>
> > https://tools.ietf.org/html/draft-richanna-http-message-signatures-00
> >     >>
> >     >> See also the presentation given there:
> >     >>
> >     >>
> >
> https://datatracker.ietf.org/meeting/106/materials/slides-106-secdispatch-http-signing
> >     >>
> >     >> In discussion there (and with the relevant ADs), it was felt
> > that the
> >     >> most obvious place for this work to land in the IETF would be in
> > this
> >     >> WG. So, while this specific draft has not been discussed
> > extensively
> >     >> here, we have expressed interest in this topic for quite some
> > time, and
> >     >> it seems appropriate to see if we're willing to take it on.
> >     >>
> >     >> To that end, this is a Call for Adoption of
> >     >> draft-richanna-http-message-signatures-00. Since there hasn't
> > been
> >     >> extensive discussion yet, we're looking for more confirmation
> > than just
> >     >> absence of objection; we'd like folks to read the document and
> > state
> >     >> explicitly whether they support it as a starting point for a
> > work item.
> >     >>
> >     >> As with all of our drafts, it will only be a starting point;
> > we're not
> >     >> looking for consensus to publish this draft as-is, just
> > confirmation
> >     >> that this is an area we want to start work in.
> >     >>
> >     >> In particular, if folks could state whether they're willing to
> >     >> contribute to discussion and review drafts, that would be
> > helpful.
> >     >>
> >     >> To give time to read and consider the draft, this CfA will be
> > for a
> >     >> longer than usual period; we'll make a decision no earlier than
> > 31
> >     >> January.
> >     >>
> >     >> Cheers,
> >     >>
> >     >> P.S. As a reminder, this isn't a call to start discussing
> > specific
> >     >> issues in the draft; we'll have plenty of time for that later.
> >     >>
> >     >> --
> >     >> Mark Nottingham   https://www.mnot.net/
> >     >>
> >     >>
> >     >>
> >     >
> >
> >
> >
> >
> >
>
>