Re: [Id-event] [EXTERNAL] Re: AD review of draft-ietf-secevent-http-poll-06

Mike Jones <Michael.Jones@microsoft.com> Sat, 25 April 2020 02:11 UTC

Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: id-event@ietfa.amsl.com
Delivered-To: id-event@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 593863A05E2; Fri, 24 Apr 2020 19:11:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.101
X-Spam-Level:
X-Spam-Status: No, score=-2.101 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id b98pe5JTnkVG; Fri, 24 Apr 2020 19:11:40 -0700 (PDT)
Received: from NAM06-BL2-obe.outbound.protection.outlook.com (mail-eopbgr650092.outbound.protection.outlook.com [40.107.65.92]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9D7A03A05A7; Fri, 24 Apr 2020 19:11:40 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=d5rZol7EKhfQTvvMxmWJbFAawjkEy+ga5TPNuS28ulqA/VX4Gl57PHnlnTDmvVlKmqftWRggI50Tkd8rNeelQYUpbyRuFOcYTAuuBzIhoQKBFZzOyLCg123POr2mwBk3GuRDiIf1gmS2Wnpo5Fm/4a+LIP/GE7rri2wCi19EhpGYhFYG2ZSPeaALqxmGbY1kCL40rYJC2F7h0zGvTLujPdVuQV6tVGogSewAFeozVmzCYbWLnPig5LzkfLQ1Iy+NOVp/KvH7Utkbm+qe6O9MZWRP9UzJElRBZRqSobRT0Pt/GPuomjxkbdd2pVisIR3mMQRrGFxstbo4LgumygG+Hg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=mc5K7S4NcrM6pqflHVa75kWN961LdqWgOj5cxQ/k7G0=; b=PAilj1RvlC7Il7Ubs5Wtvli2ykhbZCB7ampweJf38WV8W+AHmsA3rCfTsQPi5FWOTwuyaBZ0IJ6eh/Ot8lkwGIoLnKdvJZKhYi8bSHQMKmBqQ1lAJ7+od0ceBht285CReQuEgSaZ/TPCnTuTbfEkm+WBlGbnNlcIIqM3M70KB8ofsZY91/pA8mwY5yzZVItReXDJyZsYIct2AWAdwBnWzicIKmrkMHXzokj6wwBZ8bXEVbxIsX9b5NfJsXB1e74+dz4LgSpXjqB+pYLkZ4RhOfxWUiESE9Y/JmdJk8JmwIe3ajxcCgxu3M0VEbKPuChQN9MmOZj1v2DnH26mWdb/zg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=mc5K7S4NcrM6pqflHVa75kWN961LdqWgOj5cxQ/k7G0=; b=UUaVqvFNT+kFUn64QZ2mFxp5vbsgrrmEoClplw1Mt+gWPy/CKaMahLJzdSL03XRfW8hhZzs3e3tD+7rvvz3B1tMuGI9d13pBQrkTLTW7J7mNj2i2xmxe2F4EsqoZxFecN/EgOqrXazsQuSEE15GlWpqgDxSXRCU5q8RK575yHYQ=
Received: from CH2PR00MB0678.namprd00.prod.outlook.com (2603:10b6:610:a9::23) by CH2PR00MB0678.namprd00.prod.outlook.com (2603:10b6:610:a9::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2983.0; Sat, 25 Apr 2020 02:11:38 +0000
Received: from CH2PR00MB0678.namprd00.prod.outlook.com ([fe80::9517:9630:ed53:8dd6]) by CH2PR00MB0678.namprd00.prod.outlook.com ([fe80::9517:9630:ed53:8dd6%6]) with mapi id 15.20.2982.000; Sat, 25 Apr 2020 02:11:38 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Benjamin Kaduk <kaduk@mit.edu>, "richanna@amazon.com" <richanna@amazon.com>
CC: "draft-ietf-secevent-http-poll.all@ietf.org" <draft-ietf-secevent-http-poll.all@ietf.org>, "id-event@ietf.org" <id-event@ietf.org>
Thread-Topic: [EXTERNAL] Re: [Id-event] AD review of draft-ietf-secevent-http-poll-06
Thread-Index: AdXd2n4v0sjGSvn6Sru3a8O/W+S93g8wVsAAAAKr+lA=
Date: Sat, 25 Apr 2020 02:11:38 +0000
Message-ID: <CH2PR00MB06785933CFBC710371F3FAEAF5D10@CH2PR00MB0678.namprd00.prod.outlook.com>
References: <DM6PR00MB0682195CCCE92C19A2585777F51C0@DM6PR00MB0682.namprd00.prod.outlook.com> <20200425005252.GC27494@kduck.mit.edu>
In-Reply-To: <20200425005252.GC27494@kduck.mit.edu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=7317f497-4c9b-42fb-b313-0000b4fafaf0; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=true; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=Internal; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2020-04-25T02:09:24Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47;
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Michael.Jones@microsoft.com;
x-originating-ip: [50.47.87.252]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 393f57ed-b277-4275-c80f-08d7e8bdfd08
x-ms-traffictypediagnostic: CH2PR00MB0678:
x-microsoft-antispam-prvs: <CH2PR00MB0678CACAE57ED8D528E94690F5D10@CH2PR00MB0678.namprd00.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0384275935
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: TCQnRMCliJ/EAuVDlppCb0l2jaD3ZSoqWs3xNVO7GhVOYg9yfAYvt2QJi+aWBflVUXDcp8y5cACPAEhMZ6FqNgdKwURC0FLfU8zH1xV9RXubwV1/k5ZVMLcsleoLlNKL2KOAfvexgnpv+5c3PzLyqr8cSQufrBEyxEy4HkEdE4q/5tVX2XGaqAdPOkRGjKim4v93BkWxk8+D4L83DLa4xcWNilXMqKEp8SybJd/309oAEAoVdKfYXV2Ui1e7JW0YEh3/WsVGAjOA/3lKJwAmr0m0Z7s7vLBpmmBr8ML8mL5xlsqvmkGaXzTkV2ouftaVfqoGj6/d2xICuMdPM7xJ1sWZo7jB6WtVtPpy1Jv5qfeGStD2qS5TAD70JDNsxSTngImIpSvEO66ZAJ4l3vqrRvKwtDeTqz35j1UBcVl+MFLY+2hRGd3Twq+fqhhu7TH9aFRPDSrjOUJYwHpUmT5zHmV4jak1OwSuDhJsNhrg20qLsmM9RSST1zLYtQd+J+YgtLkeW4hnSRQZuQZbN6ehxA==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CH2PR00MB0678.namprd00.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(39860400002)(396003)(376002)(136003)(346002)(366004)(82960400001)(8676002)(33656002)(7696005)(478600001)(82950400001)(5660300002)(4326008)(10290500003)(6506007)(52536014)(2906002)(53546011)(86362001)(66446008)(9686003)(26005)(8990500004)(71200400001)(186003)(110136005)(8936002)(55016002)(316002)(54906003)(76116006)(66946007)(64756008)(66556008)(66476007); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: rPEwmT1L6ytzgbSyTZ2fhVg04Ks8Quc5+fEE5r3G79URGuBUD/M2JC17s6KNXR5BAhS6+NaCpVOsqbFgzM/7hl0GeGHthmkn4SFhxQgbuLMh5SMIZSlF9lUJJRTiXmE+lPVnrA+r6F1vCMTJqvegj/r5jpNtVQpEIEIhknY6evGPEyrD2FNtIUicCXd8/auB/8eRlkDLL+i5ecJnlnv9DJxHliKyks7liUcu4LCjfBHUUvh/YXRJ43dTJk6mtQ+YFNecO89QjH1F/rLOXP9vFmKxgbmZk0jbavz9uHkoSEL3MP866pkwdcL86MNQ0+a+XCI5yIypsawou7x23uXOfwgah333YbBSXS1fb5lJzavNUhyPXowkxEY/lRFFntT2Z9G0yMqCR69+S6OaT3I0W6167ueLSGwz5xIJeBiQW8xY0etBUtK5GXcBeuVpKi+5FNAc5OKI7a2eTRtsiRbydNY6ZIRwA0R38JZdtIaaTUsb9X3PS8YKNv8IZWxI4WE5XJ8+yoCQHWRxMlf2J0aGb7Lrgm/PmFwC+OAUzBwDryaL64MX2WVGF0q/uSeponVtQSsQXGOhrBYivOf0pUeQLEz9wVL/MmqTaEbk9IjXfC2PItzMk1SEILKIcWNtt8JU4mv6oaFsl8hPiLrBrbOTgOyxPRONW4MsXqphw42rZRXXVCWn0f821SCg0vZqTj5JiaHMET974mVmiOp1xBXLFyTgXsDhra/scKyMd2a+Za41thkQMnRUcwXczfsalZBlUZLUBm4b+wK2l/vOHK8MajbQDMhyyc4aLDGKWXUphJU=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CH2PR00MB0678.namprd00.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 393f57ed-b277-4275-c80f-08d7e8bdfd08
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Apr 2020 02:11:38.7221 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: H5evOsT8rfifKjzN+XDVpwhceVfbnFbzU+97eRPIT7XzM2rsJ5ZRiA5XmE3EzAEdXbu88LUBS4G63UOpbsUHyA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH2PR00MB0678
Archived-At: <https://mailarchive.ietf.org/arch/msg/id-event/-ekp8cWkAtWG1s4AzQ4et17Ro5I>
Subject: Re: [Id-event] [EXTERNAL] Re: AD review of draft-ietf-secevent-http-poll-06
X-BeenThere: id-event@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "A mailing list to discuss the potential solution for a common identity event messaging format and distribution system." <id-event.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/id-event>, <mailto:id-event-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/id-event/>
List-Post: <mailto:id-event@ietf.org>
List-Help: <mailto:id-event-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/id-event>, <mailto:id-event-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 Apr 2020 02:11:42 -0000

Thanks Ben.  I think the DDOS text can be dropped from Poll.  I'll do that early next week.

				Thanks again,
				-- Mike

-----Original Message-----
From: Benjamin Kaduk <kaduk@mit.edu> 
Sent: Friday, April 24, 2020 5:53 PM
To: Mike Jones <Michael.Jones@microsoft.com>
Cc: draft-ietf-secevent-http-poll.all@ietf.org; id-event@ietf.org
Subject: [EXTERNAL] Re: [Id-event] AD review of draft-ietf-secevent-http-poll-06

Hi Mike,

Thanks for the updates, and I continue to be sorry for the long response times.

Poll is in quite good shape (well, I guess it's mostly just that -push is taking the brunt of the work for harmonizing the differences in text); just a couple more changes to make and we should be good to start the IETF LCs in parallel.  I'll again trim the resolved bits.

In Section 3 we have a note about DoS protections embedded in a larger block of text:

   Authorization for the eligibility to provide actionable SETs can be
   determined by using the identity of the SET Issuer, validating the
   polling endpoint URL, perhaps using TLS, or via other employed
   authentication methods.  Among other benefits, authentication can
   help prevent denial-of-service attacks.  Because SETs are not
   commands, SET Recipients are free to ignore SETs that are not of
   interest after acknowledging their receipt.

I am not 100% sure, but I think this may have been text that originates before the split of documents, and in push got extracted and made into a separate section.  Does it still make sense here?  The DoS risk would typically be for a server getting lots of inbound connections, but there's not quite as clear a case for (client) authentication helping with that for poll, since the client is not sending huge amounts of stuff that would need to be dropped.  Am I misunderstanding the intent here, or should the sentence just get dropped?

On Fri, Feb 07, 2020 at 05:18:04PM +0000, Mike Jones wrote:
> draft-ietf-secevent-http-poll-07<https://tools.ietf.org/html/draft-ietf-secevent-http-poll-07> was published to address these review comments.  (-08<https://tools.ietf.org/html/draft-ietf-secevent-http-poll-08> addressed additional editorial nits.)  Descriptions of the changes made for these comments are inline, prefixed by "Mike>".
> 
> 
> 
> -----Original Message-----
> From: Id-event <id-event-bounces@ietf.org> On Behalf Of Benjamin Kaduk
> Sent: Tuesday, December 10, 2019 4:37 PM
> To: draft-ietf-secevent-http-poll.all@ietf.org
> Cc: id-event@ietf.org
> Subject: [Id-event] AD review of draft-ietf-secevent-http-poll-06
> 
> 
> Section 3
> 
> 
> Since poll has the TLS server as the SET Transmitter, we could potentially pull in RFC 6125 and talk about validating DNS-IDs to authenticate the Transmitter.  Given that the name to be authenticated would be part of the information conveyed out-of-band, though, it's not entirely clear how much value there would be in doing so.
> 
> 
> Mike> As in Push, this section was formerly poorly worded, and has largely been rewritten.

As for -push, I'd really like to be able to say something about the other half of the name comparison.  In this case would it be something like "discovery of SET Transmitters (and the names used to authenticate them) is out of scope for this document"?

Thanks for the updates,

Ben