Re: [Last-Call] [Ohai] Artart last call review of draft-ietf-ohai-ohttp-05

Martin Thomson <mt@lowentropy.net> Sun, 04 December 2022 22:46 UTC

Return-Path: <mt@lowentropy.net>
X-Original-To: last-call@ietfa.amsl.com
Delivered-To: last-call@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4E56EC14F727; Sun, 4 Dec 2022 14:46:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=lowentropy.net header.b=Vu5RnbHK; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=F/pm6r39
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IFpC6L6JYRqH; Sun, 4 Dec 2022 14:46:33 -0800 (PST)
Received: from wout4-smtp.messagingengine.com (wout4-smtp.messagingengine.com [64.147.123.20]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7DC5BC14F719; Sun, 4 Dec 2022 14:46:30 -0800 (PST)
Received: from compute6.internal (compute6.nyi.internal [10.202.2.47]) by mailout.west.internal (Postfix) with ESMTP id 1777432007E8; Sun, 4 Dec 2022 17:46:29 -0500 (EST)
Received: from imap41 ([10.202.2.91]) by compute6.internal (MEProxy); Sun, 04 Dec 2022 17:46:29 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lowentropy.net; h=cc:cc:content-transfer-encoding:content-type:date:date:from :from:in-reply-to:in-reply-to:message-id:mime-version:references :reply-to:sender:subject:subject:to:to; s=fm2; t=1670193988; x= 1670280388; bh=7siE2coOGpZMS40Hr8LMGqCeXjkjD4UDSn0DZn8FazU=; b=V u5RnbHKoxTIdDP2WZXZVZNXDpVLrdEL0Y6UY0x0tEl050IDd8nLhaMVd4nnjqlqN GhvxX9EKNgPUeODsOl22PqkaVATrnPdqpSqBhSGBhmfclbqqH6TUajWtxDNTGZq/ 8lSmIMoH1qXlEQYuT01q5iuhNpHNvWrsh4h4YvbaN51UDcnUblw0C1qdOna4m9VI BlXgc4Gxb2gX64p9rRnla9xiu6lD2Z6kVq90wx82jJJZq6GeozKpO05NJhoHRhHR ynQRqFy90CUPDCLUva8+bCuxzDyqr4Gh6A45Zc0AHtBwKmPz1p+ThUMIIKCcjfXi P3ZWUuz18w/4CsHtjAcYw==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:cc:content-transfer-encoding :content-type:date:date:feedback-id:feedback-id:from:from :in-reply-to:in-reply-to:message-id:mime-version:references :reply-to:sender:subject:subject:to:to:x-me-proxy:x-me-proxy :x-me-sender:x-me-sender:x-sasl-enc; s=fm1; t=1670193988; x= 1670280388; bh=7siE2coOGpZMS40Hr8LMGqCeXjkjD4UDSn0DZn8FazU=; b=F /pm6r393AGZ3iMTXh1GK5eXWzMVQv+OnyIaAQmVH06IK6UhFbMZt7jmPIrFNRNKK pL27huEtSfQzAgEtr/Fj8rhnkGLJ8Um6Fxp/iICaWEymyQ339QqSi+ep2kD5/SBn 9E+/j70pfyVrDVEbXOYaX3BCggjcSexra6t5HsDZhCKmOo8SWVoDqpbdHPva4c9K spfh6/Qb2zMjIfGX3xBtxZPlDnBnz7Xcd91P9Dn0jnOjl/1rMR5wL8FugPGHiI16 khQ13tXPXfZmjowldo06MeeJNSCSKF8aEs6LFl5Ze7NixJFZhtu9/JdTfPQqAgEp KorCqZGe2U5NonnIEHQwg==
X-ME-Sender: <xms:RCONYxcd1q2LO3FGi99d6Qql7voQE9z15x6-s6VIePy9hhaGHEtAOg> <xme:RCONY_Mod21Rxg1Qy_Azo1WSpowaHdJ3n74SlgO4U0pSLWHJMVPW8hZSfTQmVd-g5 81Qv5EOG4guJtB2CWE>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvhedrudefgddtvdcutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecunecujfgurhepofgfggfkjghffffhvfevufgtgfesth hqredtreerjeenucfhrhhomhepfdforghrthhinhcuvfhhohhmshhonhdfuceomhhtsehl ohifvghnthhrohhphidrnhgvtheqnecuggftrfgrthhtvghrnhepieeuueeiteeijeeigf egudetgfetfffhffduieffffefffelveeiteetudfftdejnecuffhomhgrihhnpehgihht hhhusgdrtghomhenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfh hrohhmpehmtheslhhofigvnhhtrhhophihrdhnvght
X-ME-Proxy: <xmx:RCONY6gZ6xuygPYzsg6291bL91qEgixYvH_mf6JepJR-J386WLYArA> <xmx:RCONY69I6rcQkb_ORhVTdYXptZ78QOlcCtDg4IYfguvww8EWcmJvgg> <xmx:RCONY9vwpcub4_3wN2DOzyfc34XkxYDhw3H45suLGQxDHO_V4OP5_g> <xmx:RCONY24ebuLF8CAdgpgH3JjtHEVlhWP20Dd3r9Wt0sL28ziYxZFVmw>
Feedback-ID: ic129442d:Fastmail
Received: by mailuser.nyi.internal (Postfix, from userid 501) id 102BE234007B; Sun, 4 Dec 2022 17:46:28 -0500 (EST)
X-Mailer: MessagingEngine.com Webmail Interface
User-Agent: Cyrus-JMAP/3.7.0-alpha0-1115-g8b801eadce-fm-20221102.001-g8b801ead
Mime-Version: 1.0
Message-Id: <144cbb3e-00c9-475f-9ca5-715e365cbd54@betaapp.fastmail.com>
In-Reply-To: <166975427461.15718.10748282060608790716@ietfa.amsl.com>
References: <166975427461.15718.10748282060608790716@ietfa.amsl.com>
Date: Mon, 05 Dec 2022 09:46:08 +1100
From: Martin Thomson <mt@lowentropy.net>
To: Sean Turner <sean+ietf@sn3rd.com>, art@ietf.org
Cc: draft-ietf-ohai-ohttp.all@ietf.org, last-call@ietf.org, ohai@ietf.org
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/last-call/CR-Tw2EwxR1p2f1VM15W6J0OG2g>
Subject: Re: [Last-Call] [Ohai] Artart last call review of draft-ietf-ohai-ohttp-05
X-BeenThere: last-call@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF Last Calls <last-call.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/last-call>, <mailto:last-call-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/last-call/>
List-Post: <mailto:last-call@ietf.org>
List-Help: <mailto:last-call-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/last-call>, <mailto:last-call-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 04 Dec 2022 22:46:39 -0000

Hey Sean,

Sorry for the delay; been busy.

On Wed, Nov 30, 2022, at 07:37, Sean Turner via Datatracker wrote:
> 1. Is “intercept” the right word in the following text from s3:
>
>   In order to ensure that Clients do not encapsulate
>   messages that other entities can intercept, the key configuration
>   MUST be authenticated and have integrity protection.
>
> I do not usually think of authentication and integrity as a mitigation against
> interception. Maybe it’s that it just can’t be encrypted it must use AEAD? Or,
> maybe I missed something.

This is correct, I believe.

Authentication and integrity protection here apply to the public keys that the gateway advertises.  If an attacker is able to substitute these keys, then the client would encrypt toward a public key the attacker controls.  The attacker is then be able to decrypt messages from any client that used their falsified keys.

Note that clients might also rely on similar configuration for discovering the relay, so in a likely scenario the attacker can substitute both the gateway key and relay URL to ensure that the client delivers messages directly that they can decrypt.

> 2. The text in s6.5 about the Client and Oblivious Relay not automatically
> attempting a retry makes me wonder if this protocol is applicable only to
> HTTP/2 and HTTP/3, but I know that’s not intended (see HTTP/1.1 examples)? How
> is a pre-HTTP/2 client supposed to know no processing occurred?

That is a good question.  Easiest to answer this way: https://github.com/ietf-wg-ohai/oblivious-http/pull/222 ("HTTP/1.1 [HTTP/1.1] provides no equivalent signal.")