Re: explicitly authenticated proxy: new draft

Salvatore Loreto <salvatore.loreto@ericsson.com> Mon, 26 May 2014 10:44 UTC

Return-Path: <ietf-http-wg-request@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AF5F81A00DA for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Mon, 26 May 2014 03:44:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.553
X-Spam-Level:
X-Spam-Status: No, score=-7.553 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.651, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FXb6t9zumDWe for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Mon, 26 May 2014 03:44:16 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 36E281A00BF for <httpbisa-archive-bis2Juki@lists.ietf.org>; Mon, 26 May 2014 03:44:16 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.72) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1WosM5-0007Cz-Cy for ietf-http-wg-dist@listhub.w3.org; Mon, 26 May 2014 10:42:09 +0000
Resent-Date: Mon, 26 May 2014 10:42:09 +0000
Resent-Message-Id: <E1WosM5-0007Cz-Cy@frink.w3.org>
Received: from lisa.w3.org ([128.30.52.41]) by frink.w3.org with esmtp (Exim 4.72) (envelope-from <salvatore.loreto@ericsson.com>) id 1WosLw-0007CG-Kh for ietf-http-wg@listhub.w3.org; Mon, 26 May 2014 10:42:00 +0000
Received: from sessmg22.ericsson.net ([193.180.251.58]) by lisa.w3.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.72) (envelope-from <salvatore.loreto@ericsson.com>) id 1WosLv-000549-2w for ietf-http-wg@w3.org; Mon, 26 May 2014 10:42:00 +0000
X-AuditID: c1b4fb3a-f79746d000006fe2-19-53831a5ee4ff
Received: from ESESSHC021.ericsson.se (Unknown_Domain [153.88.253.124]) by sessmg22.ericsson.net (Symantec Mail Security) with SMTP id 14.B7.28642.E5A13835; Mon, 26 May 2014 12:41:34 +0200 (CEST)
Received: from ESESSMB109.ericsson.se ([169.254.9.10]) by ESESSHC021.ericsson.se ([153.88.183.81]) with mapi id 14.03.0174.001; Mon, 26 May 2014 12:41:33 +0200
From: Salvatore Loreto <salvatore.loreto@ericsson.com>
To: "Richard Wheeldon (rwheeldo)" <rwheeldo@cisco.com>
CC: "ietf-http-wg@w3.org" <ietf-http-wg@w3.org>
Thread-Topic: explicitly authenticated proxy: new draft
Thread-Index: AQHPaC4sDNA/yLd9lk+UTL7xpzf7tJtR2NmggADTZIA=
Date: Mon, 26 May 2014 10:41:32 +0000
Message-ID: <A74FEDC6-1081-4E32-BC7B-088FDD0B209D@ericsson.com>
References: <20140505064315.1441.11209.idtracker@ietfa.amsl.com> <91DEC006-177D-4624-8194-7B02BD221B92@ericsson.com> <0566CA5E9B906D40B6737DD47DA9FB8F1AF8DFE5@xmb-rcd-x04.cisco.com>
In-Reply-To: <0566CA5E9B906D40B6737DD47DA9FB8F1AF8DFE5@xmb-rcd-x04.cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [153.88.183.149]
Content-Type: text/plain; charset="us-ascii"
Content-ID: <C36E29C5299FCB41A01F300458DD66B5@ericsson.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFmpmkeLIzCtJLcpLzFFi42KZGfG3RjdOqjnY4P5cNYvDLbOYLHZeaGBz YPKY8nsjq8fReftZA5iiuGxSUnMyy1KL9O0SuDJOrJrIVNAnV/Hh3ybGBsatEl2MnBwSAiYS a1pns0PYYhIX7q1n62Lk4hASOMoosffWRbCEkMBiRoklt8tAbDYBM4nnD7cwg9giIPavE2A2 s4C+ROOVK0wgtjBQfO70g6xdjBxANeYSCzcnQZRbSWx7cgWsnEVAVeLb15dgNq+AvcTGc5OY IPbuZJT42DgVbA6ngK9E2+OzbCA2I9Bx30+tYYLYJS5x68l8JoijBSSW7DnPDGGLSrx8/I8V wlaSWHt4OwtEvY7Egt2f2EDuYRawlth9XwcirC2xbOFrqBsEJU7OfMIygVF8FpINs5B0z0Lo noWkexaS7gWMrKsYRYtTi4tz042M9FKLMpOLi/Pz9PJSSzYxAmPt4JbfVjsYDz53PMQowMGo xMP7IL0pWIg1say4MvcQozQHi5I470WN6mAhgfTEktTs1NSC1KL4otKc1OJDjEwcnFINjCor KyLf1Xyyyg764b37xF5r/ebmdbyKi6f0Nj36wNGfxvyO69H886GHMl7Zf5k9b06MnWkyQ/mn QMGsE3r+F5vunMn80XPr/f2wc2ZBUs92NTQzimq+vTBraef99xPXOGRsKOpa/uaob9/Uj7/3 zPG796frtPDq433uakW8Ob/3sDwJz1hnOVGJpTgj0VCLuag4EQBjbwFnlgIAAA==
Received-SPF: pass client-ip=193.180.251.58; envelope-from=salvatore.loreto@ericsson.com; helo=sessmg22.ericsson.net
X-W3C-Hub-Spam-Status: No, score=-3.1
X-W3C-Hub-Spam-Report: AWL=-3.117, SPF_PASS=-0.001
X-W3C-Scan-Sig: lisa.w3.org 1WosLv-000549-2w 23bffd4831e89231ce433c4717c308b8
X-Original-To: ietf-http-wg@w3.org
Subject: Re: explicitly authenticated proxy: new draft
Archived-At: <http://www.w3.org/mid/A74FEDC6-1081-4E32-BC7B-088FDD0B209D@ericsson.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/23821
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

Hi Richard

thanks for reading the draft and providing your comments

On May 26, 2014, at 6:21 AM, Richard Wheeldon (rwheeldo) <rwheeldo@cisco.com> wrote:

> Sorry for taking so long to get round to this. I've finally read through it. Whilst I fully appreciate the effort in trying to address the proxy cases, I'm a little bit concerned that by limiting it in scope to HTTP-only URLs we're still leaving the elephant in the room of organization-based HTTPS Inspection == MITM attack largely unaddressed.

that has been intentionally left out, as it is a subject that touch several protocols not only HTTP
and would require at least IMO some not trivial changes in the Web Architecture as well as in the
https:// URI semantic


> Also, I'd like to see an alteration such that either end-point could accept or reject connections based on TLS properties of the other - which is currently (and still in your draft) impossible.

While I understand the importance of involving both the ends in the scenario like the organisation-based HTTPS Inspection
you have in mind,

I do not think it is necessary in the scenario where the http:// URI traffic is transported over TLS, for several reasons.
The first one is that the http:// URI semantic does not mandate end-to-end security/privacy/confidentiality 
so if a WebSite decide to distribute a resource as http:// it implicitly provides consent for that resource to pass true
intermediaries and eventually to be cached 

> However, addressing these might put this in the scope of the TLS WG rather than the HTTP one but that's not my call to make.


> 
> It's a bit of a minor point, but I also find the use of "h2c" in a TLS negotiation ugly. Assuming that the c in h2c implies clear text, using it for an encrypted channel seems to be asking for confusion,

my reading is that h2c implies transport of http:// uri traffic that is a slightly different interpretation.
However I am fully aware that different people have different opinion and that the Opportunistic Encryption proposal suggest to use h2
for http:// uri traffic transported over opportunistic unauthenticated TLS

br
Salvatore

> 
> Richard
> 
> -----Original Message-----
> From: Salvatore Loreto [mailto:salvatore.loreto@ericsson.com] 
> Sent: 05 May 2014 07:50
> To: ietf-http-wg@w3.org
> Subject: explicitly authenticated proxy: new draft
> 
> 
> we have produced a new draft that proposes the definition of an Explicitly Authenticated Proxy as intermediary of normally unprotected "http://" URI scheme requests and responses of HTTP2 traffic.
> 
> The Explicitly Authenticated Proxy is defined as a message forwarding agent that  is selected, with explicit user's consent, and configured by the user agent to receive exclusively "http" URI scheme requests and attempt to satisfy those requests on behalf of the user agent.  
> A client is connected to an Explicitly Authenticated Proxy through an authenticated TLS secured connection.
> 
> The document describes also a method for a user agent to automatically discover and authenticate, and for an user to provide consent for an Explicitly Authenticated Proxy. 
> This enables proxies communication to be encrypted and authenticated, explicitly acknowledged by the user agent and visible to the server end point.
> 
> 
> URL:            http://www.ietf.org/internet-drafts/draft-loreto-httpbis-explicitly-auth-proxy-00.txt
> Status:         https://datatracker.ietf.org/doc/draft-loreto-httpbis-explicitly-auth-proxy/
> Htmlized:       http://tools.ietf.org/html/draft-loreto-httpbis-explicitly-auth-proxy-00
> 
> 
> comments, suggestions and feedback are welcome
> 
> br
> Salvatore
> 
>