Re: Report on preliminary decision on TLS 1.3 and client auth

Amos Jeffries <squid3@treenet.co.nz> Thu, 24 September 2015 03:59 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0E33F1B2D99 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Wed, 23 Sep 2015 20:59:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.912
X-Spam-Level:
X-Spam-Status: No, score=-6.912 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6K-de3i87i_l for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Wed, 23 Sep 2015 20:59:57 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AB34C1B2FB0 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Wed, 23 Sep 2015 20:59:53 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.80) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1Zexer-0000rH-Pk for ietf-http-wg-dist@listhub.w3.org; Thu, 24 Sep 2015 03:57:21 +0000
Resent-Date: Thu, 24 Sep 2015 03:57:21 +0000
Resent-Message-Id: <E1Zexer-0000rH-Pk@frink.w3.org>
Received: from maggie.w3.org ([128.30.52.39]) by frink.w3.org with esmtps (TLS1.2:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <squid3@treenet.co.nz>) id 1Zexem-0000qV-LV for ietf-http-wg@listhub.w3.org; Thu, 24 Sep 2015 03:57:16 +0000
Received: from 121-99-228-82.static.orcon.net.nz ([121.99.228.82] helo=treenet.co.nz) by maggie.w3.org with esmtp (Exim 4.80) (envelope-from <squid3@treenet.co.nz>) id 1Zexek-0008KT-Vl for ietf-http-wg@w3.org; Thu, 24 Sep 2015 03:57:16 +0000
Received: from [192.168.20.251] (unknown [121.98.42.176]) by treenet.co.nz (Postfix) with ESMTP id 0F1C3E6EA9; Thu, 24 Sep 2015 15:56:41 +1200 (NZST)
To: Martin Thomson <martin.thomson@gmail.com>
References: <CABkgnnWREq6X+chcvookChGAZGxkJ6Zs_7FGwz7Mbn12XMxewQ@mail.gmail.com> <5603599F.8090303@treenet.co.nz> <CABkgnnVq9FDeGf_=JF0m0AkgfO1G3DVV2QN_aPrbYnFtfRLFrw@mail.gmail.com>
Cc: HTTP Working Group <ietf-http-wg@w3.org>
From: Amos Jeffries <squid3@treenet.co.nz>
X-Enigmail-Draft-Status: N1110
Message-ID: <5603745A.7020509@treenet.co.nz>
Date: Thu, 24 Sep 2015 15:56:10 +1200
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.2.0
MIME-Version: 1.0
In-Reply-To: <CABkgnnVq9FDeGf_=JF0m0AkgfO1G3DVV2QN_aPrbYnFtfRLFrw@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Received-SPF: pass client-ip=121.99.228.82; envelope-from=squid3@treenet.co.nz; helo=treenet.co.nz
X-W3C-Hub-Spam-Status: No, score=-4.8
X-W3C-Hub-Spam-Report: AWL=-0.153, BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, TVD_RCVD_IP=0.001, W3C_AA=-1, W3C_WL=-1
X-W3C-Scan-Sig: maggie.w3.org 1Zexek-0008KT-Vl 5e432b8528cb59f8692b5eb0c5a48063
X-Original-To: ietf-http-wg@w3.org
Subject: Re: Report on preliminary decision on TLS 1.3 and client auth
Archived-At: <http://www.w3.org/mid/5603745A.7020509@treenet.co.nz>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/30269
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

On 24/09/2015 3:41 p.m., Martin Thomson wrote:
> On 23 September 2015 at 19:02, Amos Jeffries wrote:
>>
>> Option 2 risks the same mess if the AUTH frame is defined end-to-end.
>> But a per-hop frame would work nicely as long as it is clear to server
>> implementers that intermediaries may be the source of the certificate.
>> Not some "user".
> 
> This would naturally be hop-by-hop, by virtue of extensions being
> hop-by-hop and by virtue of the setting that enables it also being
> hop-by-hop.
> 
>> An option 3 might be to use a SETTINGS instead of dedicated AUTH frame.
>> So that the per-hop nature is made extra clear. That would also be more
>> backward compatible with older h2 implementations and work in with
>> clearing dynamic compression contexts at the same time as authenticating.
> 
> SETTINGS wouldn't allow the server to correlate the CertificateRequest
> with a specific request/response exchange.

Ah. Sorry I seem to have misunderstood yoru meaning of "provides the
proof that a server needs to regard the entire session to be authentic"
to mean the cert was connection-wide.

If it is stream-specific in terms of HTTP/2 streams rather than TLS
streams, then the frame as in option 2 should be okay. Option 1 still
has major issues with www-auth vs proxy-auth.

> 
> Also, while I think of it, we should probably forbid the use of this
> on server-initiated streams (i.e., with server push).  That could
> cause problems.
> 

I can see that as being a SHOULD NOT, or forbid on PUSH_PROMISE
specifically. But using a more general definitio like "server initiated"
may cause conflicts with the bi-directional h2 extension.

Amos