Re: [Id-event] Push Delivery: working group last call

"Morteza Ansari (moransar)" <moransar@cisco.com> Wed, 06 February 2019 22:13 UTC

Return-Path: <moransar@cisco.com>
X-Original-To: id-event@ietfa.amsl.com
Delivered-To: id-event@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EAACE130EE0 for <id-event@ietfa.amsl.com>; Wed, 6 Feb 2019 14:13:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -19.053
X-Spam-Level:
X-Spam-Status: No, score=-19.053 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-4.553, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MELlqT9DZiHJ for <id-event@ietfa.amsl.com>; Wed, 6 Feb 2019 14:13:33 -0800 (PST)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 95A6C130E62 for <id-event@ietf.org>; Wed, 6 Feb 2019 14:13:33 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=30890; q=dns/txt; s=iport; t=1549491213; x=1550700813; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=VzDcHmlIRyV30tb9Is2YQSz/ECJ++sc43rLWvvSjPR0=; b=YR0GcIhc7DXvAkkmuBAXxqkxIWBk3kEB6O0IWeSbCvmXxla8aUIin2Sh 52bwUCaVBkaS+d0cUBmbIYv4vKphYMWdGQ+iQCsXHiC/NPV3QsWS/22jV LpaiRIng9z3G9w5LdDLcVM8QYxoxIlrElgmm/URETiUFW5tcacuEO9C41 I=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AFAACrWltc/51dJa1bAQkZAQEBAQEBAQEBAQEBBwEBAQEBAYFSAwEBAQEBCwGBDU0pZ4EDJwqDeZQGgWgliSeOaBSBZwsBARgBCoRJAheDAyI1CA0BAwEBAgEBAm0cDIVKAQEBAwEBASEERAMEBxACAQYCEQMBAgEnAwICAh8GCxQJCAIEAQ0FgldLAYEdTAMNCA+RbpthfDOEQ0GDAg2CGQWMQxeBQD+BEScME4JMgldHAQECAQGBJQ0BQQkWglMxgiYCi3+EGZI9MwkChzWDXgyDZ4M7GYFshUWLHYoshTSBKIprAhEUgSchAzMqgSxwFTsqAYJBgicYgQABCIdWhT9BMQEBjC0rgQGBHwEB
X-IronPort-AV: E=Sophos;i="5.58,341,1544486400"; d="scan'208,217";a="428894301"
Received: from rcdn-core-6.cisco.com ([173.37.93.157]) by rcdn-iport-9.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 06 Feb 2019 22:13:31 +0000
Received: from XCH-RCD-002.cisco.com (xch-rcd-002.cisco.com [173.37.102.12]) by rcdn-core-6.cisco.com (8.15.2/8.15.2) with ESMTPS id x16MDV40013255 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 6 Feb 2019 22:13:31 GMT
Received: from xch-rcd-004.cisco.com (173.37.102.14) by XCH-RCD-002.cisco.com (173.37.102.12) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Wed, 6 Feb 2019 16:13:30 -0600
Received: from xch-rcd-004.cisco.com ([173.37.102.14]) by XCH-RCD-004.cisco.com ([173.37.102.14]) with mapi id 15.00.1395.000; Wed, 6 Feb 2019 16:13:30 -0600
From: "Morteza Ansari (moransar)" <moransar@cisco.com>
To: Marius Scurtescu <marius.scurtescu@coinbase.com>, Yaron Sheffer <yaronf.ietf@gmail.com>
CC: "Richard Backman, Annabelle" <richanna@amazon.com>, Dick Hardt <dick.hardt@gmail.com>, SecEvent <id-event@ietf.org>, Anthony Nadalin <tonynad@microsoft.com>, Mike Jones <Michael.Jones@microsoft.com>, Marius Scurtescu <marius.scurtescu@gmail.com>, Phil Hunt <phil.hunt@oracle.com>
Thread-Topic: [Id-event] Push Delivery: working group last call
Thread-Index: AQHUtBA4wF2co0bIgEiGjOyqDf61eKXAq58AgAAnNgCAAAyqAIAPj9KAgALZZ4A=
Date: Wed, 06 Feb 2019 22:13:30 +0000
Message-ID: <30D1CCD4-3173-4DA5-9A60-EB879D75B743@cisco.com>
References: <CAD9ie-t0eteREXoE6HD4ZUKw7G-P=WAtM1ksPuQEu_5oU=hPuA@mail.gmail.com> <c619b0bb-9322-55a5-8a26-566d2230518a@gmail.com> <4C82F80F-74ED-4EA0-AE47-0A4D8DB40A43@amazon.com> <933153f4-e3a2-73ba-3165-6f1ebd28f4d7@gmail.com> <CABpvcNuL=MFahqFi0dXm5TEeNXedKL3AUsbws6EkA0p=s4Y82g@mail.gmail.com>
In-Reply-To: <CABpvcNuL=MFahqFi0dXm5TEeNXedKL3AUsbws6EkA0p=s4Y82g@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.15.0.190117
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.123.180]
Content-Type: multipart/alternative; boundary="_000_30D1CCD431734DA59A60EB879D75B743ciscocom_"
MIME-Version: 1.0
X-Outbound-SMTP-Client: 173.37.102.12, xch-rcd-002.cisco.com
X-Outbound-Node: rcdn-core-6.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/id-event/PXbAZTax4zvyRGExVnkrjFi6NcI>
Subject: Re: [Id-event] Push Delivery: working group last call
X-BeenThere: id-event@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "A mailing list to discuss the potential solution for a common identity event messaging format and distribution system." <id-event.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/id-event>, <mailto:id-event-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/id-event/>
List-Post: <mailto:id-event@ietf.org>
List-Help: <mailto:id-event-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/id-event>, <mailto:id-event-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2019 22:13:36 -0000

The document looks pretty good. A few minor comments in addition to Yaron’s notes:

Section 5.4: Why not recommend signing and encrypting the SET’s in the security consideration (use stronger language than “optionally”)?

Section 6.0: While the recommendation of using hash value is great for privacy, wouldn’t it seriously impact interoperability without stronger language and semantics for when it is a hash vs. actual value? Feels we are punting on this and making it implementor’s problem to figure out.

Section 7.1.1: Shouldn’t the error code syntax also allow at least “_” character since we use it in our codes?


Cheers,
Morteza

From: Marius Scurtescu <marius.scurtescu@coinbase.com>
Date: Monday, February 4, 2019 at 10:43 AM
To: Yaron Sheffer <yaronf.ietf@gmail.com>
Cc: "Richard Backman, Annabelle" <richanna@amazon.com>, Dick Hardt <dick.hardt@gmail.com>, SecEvent <id-event@ietf.org>, Anthony Nadalin <tonynad@microsoft.com>, Mike Jones <Michael.Jones@microsoft.com>, Marius Scurtescu <marius.scurtescu@gmail.com>, Morteza Ansari <moransar@cisco.com>, Phil Hunt <phil.hunt@oracle.com>
Subject: Re: [Id-event] Push Delivery: working group last call

I support the publication of this document, with the changes suggested by Yaron Shefer and Annabelle Richard Backman.

On Fri, Jan 25, 2019 at 1:04 PM Yaron Sheffer <yaronf.ietf@gmail.com<mailto:yaronf.ietf@gmail.com>> wrote:
Thanks for the quick response! A few comments inline.

On 25/01/2019 22:18, Richard Backman, Annabelle wrote:
> Thanks for the feedback! Responses inline.
>
> --
>
> Annabelle Richard Backman
>
> AWS Identity
>
> On 1/25/19, 9:59 AM, "Id-event on behalf of Yaron Sheffer"
> <id-event-bounces@ietf.org<mailto:id-event-bounces@ietf.org> on behalf of yaronf.ietf@gmail.com<mailto:yaronf.ietf@gmail.com>> wrote:
>
>      The document looks good. Here's a bunch o' comments.
>
>      * Intro: receipt->recipient
>
> [richanna]👍[/richanna]
>
>      * "The transmitter and recipient are known to one another." But
> then we
>
>      require the *issuer* to be authenticated by the Recipient. We need to
>
>      clarify the relationship between Issuer (defined in the base spec) and
>
>      Transmitter. BTW, Issuer should be capitalized.
>
> [richanna]
>
> The intent of that sentence is to indicate that the spec assumes the
> Transmitter already knows who it needs to transmit the SET to, and the
> Recipient knows who it expects to receive SETs from, and that discovery
> of either is out of scope.
>
> You’re absolutely right. Section 2 is missing a validation step: “The
> SET Recipient is willing to accept the SET, when transmitted by the SET
> Transmitter.” Also, we can add text to the definition of SET Transmitter
> to clarify that it need not be the Issuer of the SET.
>
> [/richanna]
>
>      * "a decryption failure that may be due to misconfigured keys" -
> this is
>
>      a strange reason for retransmission, because it would normally
> require a
>
>      very slow manual operation, which could easily overwhelm the
> Transmitter.
>
> [richanna]
>
> I had in mind issues or delays with key propagation after a rotation,
> premature rejection of an outgoing key due to clock skew, intermittent
> failure when retrieving a Transmitter’s public key, etc. These are
> issues that may (depending on root cause) work themselves out after a
> few minutes, though I suppose they are not properly “misconfigured
> keys.” This example is probably just muddying the waters without
> contributing much to the text.
>
> [/richanna]
>
>      * "Transmitting a SET": if the normal response has an empty body,
> why do
>
>      we send "Accept: application/json"? The Accept header is not
> mandatory,
>
>      https://tools.ietf.org/html/rfc7231#section-5.3.2
>
> [richanna]
>
> Error responses will contain a JSON-formatted body, which the
> Transmitter MUST be prepared to accept.
>
> [/richanna]

YS: I still think the Accept header is redundant (in particular because
if you cannot understand JSON, you cannot use this protocol at all), but
I can live with it.

>
>      * "Failure Response": why is responding with the right HTTP status
> code
>
>      a MAY? What else do we expect them to do?
>
> [richanna]
>
> As I understand it, HTTP Servers have some discretion with regards to
> which status codes they respond with in certain situations. The “right
> HTTP status code” can be subjective, and may change over time as new
> status codes are defined for specific cases. SET Transmitters need to be
> prepared to receive standard HTTP status codes, but I don’t see a reason
> to impose more requirements on the SET Recipient in this area than HTTP
> itself does.
>
> [/richanna]
>

YS: I agree with everything you say, but still, this would be more
correct: "the SET Recipient SHOULD respond with an appropriate HTTP
Status Code", even if the "appropriate" code is very fuzzy. Or else,
let's remove the RFC 2119 word: "the Recipient responds".

>      * "the SET Transmitter is not permitted to transmit SETs issued by the
>
>      issuer specified in the SET" - I suggest to change the text to
> indicate
>
>      this is from the point of view of the Recipient: "the Recipient is not
>
>      willing to accept SETs issued by the specified issuer from this
>
>      particular SET Transmitter".
>
> [richanna]👍[/richanna]
>
>      * Error codes: what if the Recipient expects the SET to be protected
>
>      (e.g. signed) but it is not? Is this "authentication_failed"?
>
> [richanna]
>
> SET signatures authenticate the Issuer, not the Transmitter, so
> `authentication_failed` would be inappropriate. The Recipient should
> return `access_denied` as it is unwilling to accept this SET from this
> Transmitter. Now I’m actually wondering if there is a difference between
> `invalid_request` and `access_denied` that is meaningful at runtime.
> I’ll start a thread on this.
>
> [/richanna]
>
>      * "MUST support TLS 1.2" - we should allow for a future where TLS
>
>      1.3-only is acceptable. So, "MUST support TLS 1.2 or later".
>
> [richanna]👍[/richanna]
>
>      * IANA: the Expert Review policy requires a designated expert,
>
>      obviously. Since this is the only SecEvent registry that needs it so
>
>      far, I'd rather go for the simpler FCFS policy.
>
> [richanna]
>
> 👍, though I think we should add text to the effect of “Error Codes are
> intended to be interpreted by automated systems, and therefore SHOULD
> identify classes of errors in response to which an automated system
> could take some distinct action.”
>
> [/richanna]

YS: guidance is always good.

>
>      Thanks,
>
>                  Yaron
>
>      On 24/01/2019 20:11, Dick Hardt wrote:
>
>      > Dear SecEvent participants,
>
>      >
>
>      > This is to start a 2-week working group last call
>
>      > on draft-ietf-secevent-http-push-04
>
>      >
>
>      > https://datatracker.ietf.org/doc/draft-ietf-secevent-http-push/
>
>      >
>
>      > until Feb 8, 2019.
>
>      >
>
>      > Please send any comments to the list. In addition, if you have no
>
>      > comments but support publication of this document as-is, please
>
>      > make your voice heard.
>
>      >
>
>      > Thanks,
>
>      >
>
>      >       Dick and Yaron
>
>      _______________________________________________
>
>      Id-event mailing list
>
>      Id-event@ietf.org<mailto:Id-event@ietf.org>
>
>      https://www.ietf.org/mailman/listinfo/id-event
>

_______________________________________________
Id-event mailing list
Id-event@ietf.org<mailto:Id-event@ietf.org>
https://www.ietf.org/mailman/listinfo/id-event