Re: [jose] Proposed Text - MUST understand

Russ Housley <housley@vigilsec.com> Sun, 24 February 2013 22:17 UTC

Return-Path: <housley@vigilsec.com>
X-Original-To: jose@ietfa.amsl.com
Delivered-To: jose@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C0E0421F8DD9 for <jose@ietfa.amsl.com>; Sun, 24 Feb 2013 14:17:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HcccGAWCHt9d for <jose@ietfa.amsl.com>; Sun, 24 Feb 2013 14:17:52 -0800 (PST)
Received: from odin.smetech.net (mail.smetech.net [208.254.26.82]) by ietfa.amsl.com (Postfix) with ESMTP id 21F0821F88DB for <jose@ietf.org>; Sun, 24 Feb 2013 14:17:52 -0800 (PST)
Received: from localhost (unknown [208.254.26.81]) by odin.smetech.net (Postfix) with ESMTP id 2A02F9A401B; Sun, 24 Feb 2013 17:17:53 -0500 (EST)
X-Virus-Scanned: amavisd-new at smetech.net
Received: from odin.smetech.net ([208.254.26.82]) by localhost (ronin.smetech.net [208.254.26.81]) (amavisd-new, port 10024) with ESMTP id ALJAIOgq43qO; Sun, 24 Feb 2013 17:17:50 -0500 (EST)
Received: from [192.168.2.105] (pool-96-255-37-162.washdc.fios.verizon.net [96.255.37.162]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by odin.smetech.net (Postfix) with ESMTP id 490CB9A4001; Sun, 24 Feb 2013 17:17:52 -0500 (EST)
Mime-Version: 1.0 (Apple Message framework v1085)
Content-Type: text/plain; charset="us-ascii"
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <003901ce12ce$23306460$69912d20$@augustcellars.com>
Date: Sun, 24 Feb 2013 17:17:49 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <ED49B299-B099-4A13-9D4A-2A703A3A54EB@vigilsec.com>
References: <003901ce12ce$23306460$69912d20$@augustcellars.com>
To: Jim Schaad <ietf@augustcellars.com>
X-Mailer: Apple Mail (2.1085)
Cc: jose@ietf.org
Subject: Re: [jose] Proposed Text - MUST understand
X-BeenThere: jose@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Javascript Object Signing and Encryption <jose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/jose>, <mailto:jose-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/jose>
List-Post: <mailto:jose@ietf.org>
List-Help: <mailto:jose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/jose>, <mailto:jose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 24 Feb 2013 22:17:54 -0000

How is an IETF application different than any other application?

The Datatracker, rfcdiff, and xml2rfc will probably never need to use jose, so I know that is not the intended meaning.  ;-)

Russ


On Feb 24, 2013, at 3:32 PM, Jim Schaad wrote:

> I am going to venture some proposed text to try and advance the discussion
> about the MUST understand all fields in the current document.  I acknowledge
> that the text is written from the point of view that I espouse, however I
> think that perhaps it does give a sufficient amount of credence to the point
> of view of other that it might provide a good starting point for
> discussions.
> 
> This text is written standalone and as such I have not yet tried to
> incorporate it into the different documents and in the different locations.
> It is possible that the text will need to be somewhat repurposed when it
> appears in each of the different documents.
> 
> *************************************************************
> 
> Applications which use this specification SHOULD ensure that all of the
> fields in the header are used in either in making the trust decision or
> determining how to use the content.  IETF applications MUST have  default
> position of requiring that all fields in the header are known to and used by
> the application.  IETF applications which allow for fields in the header to
> be ignored MUST include a justification of why this decision was made and
> looking at the security trade-offs of the decision.
> 
> The reason why the default position is that applications need to understand
> and process all of the headers can be seen in the following example.  <Jones
> et al provide a non-trivial example that demonstrates the security problem
> associated with ignoring header fields.>
> 
> ******************************************************************