Re: [mile] Benjamin Kaduk's Discuss on draft-ietf-mile-xmpp-grid-09: (with DISCUSS and COMMENT)

Peter Saint-Andre <stpeter@mozilla.com> Tue, 05 March 2019 02:56 UTC

Return-Path: <stpeter@mozilla.com>
X-Original-To: mile@ietfa.amsl.com
Delivered-To: mile@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B20F9130F0F for <mile@ietfa.amsl.com>; Mon, 4 Mar 2019 18:56:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mozilla.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8GUTlu77Yp_m for <mile@ietfa.amsl.com>; Mon, 4 Mar 2019 18:56:03 -0800 (PST)
Received: from mail-io1-xd2c.google.com (mail-io1-xd2c.google.com [IPv6:2607:f8b0:4864:20::d2c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3AB56131126 for <mile@ietf.org>; Mon, 4 Mar 2019 18:56:02 -0800 (PST)
Received: by mail-io1-xd2c.google.com with SMTP id k21so5765576ior.13 for <mile@ietf.org>; Mon, 04 Mar 2019 18:56:02 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mozilla.com; s=google; h=subject:to:cc:references:from:openpgp:autocrypt:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=hXo96WdEpTD+LMPuawVX+GUQuanxf2Rl1bOYCV9YhQ8=; b=cCkd9SkX1JcgSdrb/FbUxXwbWUNRFrBKqc2DDqLsWzhlwTwXS/Aeu14Yg+tPCV3p6R A5Rk19ESsKEAFYNdSCZ6t0th+19jtcWGIpsefhk86JiQ+iYhsfjF0cHiWkSqUPIy5+vD 0744l3TpR6OrLHP/s3p5pJq2AcwtM7MW9oiLM=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:openpgp:autocrypt :message-id:date:user-agent:mime-version:in-reply-to :content-language:content-transfer-encoding; bh=hXo96WdEpTD+LMPuawVX+GUQuanxf2Rl1bOYCV9YhQ8=; b=ku+r80L+luXMAmkrlS9dXslQb3WJxjlNUz2UhzyWx+U6iNd5OBsmDKzJFhBM1H4dvF /B2YT8yXL77or9ZtGXVFGM+asga9SsUBTnHVS18LYNwRRy8NykKFN43P/NbfuKEtGAvx XSe2f098sQxHAO24hLZxO2Y5ejBQXZuCtxXkAF0oWOos6ygIIM41bmK/dL2eq3ieyc8r 7w5PGa/AUlRliPdmHxcetVScLv1I3B6NSF0gtHMl3QnCbaCeu52ThPGppCVqLChqoCAM 3W9ZoSHHL2xCJTAlJjELXIUOBaIBIBF11RHpLeF/6hb2ectzUGELjgKbhxz9DDNYchX/ hoxQ==
X-Gm-Message-State: APjAAAUDZvVaE5LUpcBLTj0Zl62AYWlNbYJK33nIF3qUTpAKIV7PdxZA QUAPYRTjd1A48scdGhv2QKwtsw==
X-Google-Smtp-Source: APXvYqxd+6F1rpHWkfk2wo80gvCFPAZutT7OBeWfVKMz6pRBNqRqm+xiUr2wGZpJjWsj3ATJ/o48OQ==
X-Received: by 2002:a5d:9a08:: with SMTP id s8mr10052933iol.99.1551754561318; Mon, 04 Mar 2019 18:56:01 -0800 (PST)
Received: from dragon.local ([76.25.3.152]) by smtp.gmail.com with ESMTPSA id x17sm4174097ita.43.2019.03.04.18.55.59 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 04 Mar 2019 18:56:00 -0800 (PST)
To: Alexey Melnikov <aamelnikov@fastmail.fm>, Dave Cridland <dave@cridland.net>
Cc: Benjamin Kaduk <kaduk@mit.edu>, The IESG <iesg@ietf.org>, mile@ietf.org, mile-chairs@tools.ietf.org, draft-ietf-mile-xmpp-grid@ietf.org, mile-chairs@ietf.org
References: <154830236119.7369.16213460588216390150.idtracker@ietfa.amsl.com> <1548331471.370290.1642501848.3FF05D24@webmail.messagingengine.com> <CAKHUCzybcNRjNCBhnAFAx_NJDW_72Fa3PW11Vx2Q_JMhyvA_7A@mail.gmail.com> <1548335091.384684.1642540232.77D79804@webmail.messagingengine.com>
From: Peter Saint-Andre <stpeter@mozilla.com>
Openpgp: preference=signencrypt
Autocrypt: addr=stpeter@mozilla.com; prefer-encrypt=mutual; keydata= mQINBFonEf4BEADvZ+RGsJoOyZaw2rKedB9pBb2nNXVGgymNS9+FAL/9SsfcrKaGYSiWEz7P Lvc97hWH3LACFAHvnzoktv+4IWHjItvhdi9kUQ3Gcbahe55OcdZuSXXH3w5cHF0rKz9aYRpN jENqXM5dA8x4zIymJraqYvHlFsuuPB8rcRIV9SKsvcy14w9iRqu770NjXfE/aIsyRwwmTPiU FQ0fOSDPA/x2DLjed/GYHem90C5vF4Er9InMqH5KAMLnjIYZ9DbPx5c5EME4zW/d648HOvPB bm+roZs4JTHBhjlrTtzDDpMcxHq1e8YPvSdDLPvgFXDcTD4+ztkdO5rvDkbc61QFcLlidU8H 3KBiOVMA/5Rgl4lcWZzGfJBnwvSrKVPsxzpuCYDg01Y/7TH4AuVkv5Na6jKymJegjxEuJUNw CBzAhxOb0H9dXROkvxnRdYS9f0slcNDBrq/9h9dIBOqLhoIvhu+Bhz6L/NP5VunQWsEleGaO 3gxGh9PP/LMyjweDjPz74+7pbyOW0b5VnIDFcvCTJKP0sBJjRU/uqmQ25ckozuYrml0kqVGp EfxhSKVqCFoAS4Q7ux99yT4re2X1kmlHh3xntzmOaRpcZsS8mJEnVyhJZBMOhqE280m80ZbS CYghd2K0EIuRbexd+lfdjZ+t8ROMMdW5L51CJVigF0anyYTcAwARAQABtCdQZXRlciBTYWlu dC1BbmRyZSA8c3RwZXRlckBtb3ppbGxhLmNvbT6JAlQEEwEIAD4WIQQ1VSPTuPTvyWCdvvRl YYwYf2gUqQUCWicR/gIbIwUJCWYBgAULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgAAKCRBlYYwY f2gUqdaREAChG8qU1853mP0sv2Mersns8TLG1ztgoKHvMXFlMUpNz6Oi6CjjaMNFhP7eUY4T D43+yQs7f4qCkOAPWuuqO8FbNWQ+yUoVkqF8NUrrVkZUlZ1VZBMQHNlaEwwu1CGoHsLoRohP SiZ0hpmGTWB3V6cDDK4KN6nl610WJbzE9LeKY1AxtePdJi2KM281U0Fz8ntij1jWu0gF2xU4 Sez46JDogHLWKgd0srauhcCVzZjAhiWrXp1+ryzSWYaZO8Kh8SnF1f4o6jtYikMqkxUaI5nX wvD3kNX4AMSkCAZfG7Jcfj/SLDojTcREgO87g7B9bcOOsHN4lj3lHoFV0aXpgPmjfIvAjJHu fHkXZAQAH8w0u9bgJqRn703+A4NPfLopnjegyhlNi7fQ3cMQV1H7Oj7WrB/pCcprx+1u/6Uq oTtDwWh1U5uVthVAI0QojpNWR08zABDX19TlGtVoeygaQV3CAEolxTiYQtCfVavUzUplCZ/t 3v4YiRov+NylflJd+1akyOs1IAgARf444BnoH1fotkpfXNOpp9wUXXwsQcFRdP7vpMkSCkc0 sxPNTVX3ei0QImp4NsrFdaep7LV3zEb3wkAp6KE5Qno4hVVEypULbvB0G6twNZbeRfcs2Rjp jnPb2fofvg2WhAKB20dnRfIfK8OKTD/P+JDcauJANjmekLkCDQRaJxH+ARAApPwkbOTChAQu jMvteb/xcwuL5JZElmLxIqvJhqybV7JknM+3ATyN0CTYQFvPTgIrhpk4zSn0A6pEePdK8mKK 5/aHyd7pr7rLEi1sI/X3UE8ld/E83MExksKrYbs0UX1wSQwYXU6g64KicnuP2Abqg+8wrQ18 1nPcZci9jJI75XVPnTdUpZD5aaQWGp7IJ06NTbiOk30I50ORfulgKoe4m3UfsMALFxIx3pJk oy76xC2tjxYGf+4Uq1M0iK3Wy655GrcwXq/5ieODNUcAZzvK5hsUVRodBq0Lq3g1ivQF4ba7 RQayDzlW6XgoeU49xnCr9XdZYnTnj4iaPmr2NtY6AacBwRz+bJsyugeSyGgHsnVGyUSMk8YN wZHvUykMjH21LLzIUX5NFlcumLUXDOECELCJwewui4W81sI5Sq/WDJet+iJwwylUX22TSulG VwDS+j66TLZpk1hEwPanGLwFBSosafqSNBMDVWegKWvZZVyoNHIaaQbrTIoAwuAGvdVncSQz ttC6KkaFlAtlZt3+eUFWlMUOQ9jxQKTWymyliWKrx+S6O1cr4hwVRbg7RQkpfA8E2Loa13oO vRSQy/M2YBRZzRecTKY6nslJo6FWTftpGO7cNcvbmQ6I++5cBG1B1eNy2RFGJUzGh1vlYo51 pdfSg0U1oPHBPCHNvPYCJ7UAEQEAAYkCPAQYAQgAJhYhBDVVI9O49O/JYJ2+9GVhjBh/aBSp BQJaJxH+AhsMBQkJZgGAAAoJEGVhjBh/aBSpAw0P/1tEcEaZUO1uLenNtqysi3mQ6qAHYALR Df3p2z/RBKRVx0DJlzDfDvJ2R/GRwoo+vyCviecuG2RNKmJbf1vSm/QTtbQMUjwut9mx6KCY CyKwniqdhaMBmjCfV2DB2MxxZLYMtDfx/2mY7vzAci7AkjC+RkSUByMEOkyscUydKC/ETdf9 tvI8GhTY/8Q7JSylS3lQA5pMUHiIf+KpSmqKZeBPkGc7nSKM1w1UKUvFAsyyVsiG6A/hWrTr 7tTQAl7YfjtOGE8n4IKGktvrT99bbh9wdWKZ5FdHUN9hx2Q8VP8+0lR1CH2laVFbEwCOv1vM W4cgQDLxwwpo1iOTdHBVtQDxlQ9hPMKVlB1KP9KjchxuiLc24wLmCjP3pDMml4LQxOYB34Eq cgPZ3uHvJZG309sb2wTMTWaXobWNI++ZrsRD5GTmuzF3kkx3krtrq6HI5NSaemxK6MTDTjDN Rj/OwTl0yU35eJXuuryB20GFOSUsxiw00I2hMGQ1Cy9L/+IW6Dvotd8O3LmKh2tFArzXaKLx /rZyGNurS/Go5YjHp8wdJOs7Ka2p1U31js24PMWO6hf6hIiY2WRUsnE6xZNhvBTgKOY6u0KT V6hTevFqEw7OAZDCWUoE2Ob2/oHGZCCMW5SLAMgp7eihF0kGf2S2CmpIFYXGb61hAD8SqSY7 Fn7V
Message-ID: <0d5796cd-78e7-d0c2-0ce5-9fa9ab7755ce@mozilla.com>
Date: Mon, 04 Mar 2019 19:55:59 -0700
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:60.0) Gecko/20100101 Thunderbird/60.5.1
MIME-Version: 1.0
In-Reply-To: <1548335091.384684.1642540232.77D79804@webmail.messagingengine.com>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/mile/e2n26Wx1I13VHXlRtp87wx6Vo9Y>
Subject: Re: [mile] Benjamin Kaduk's Discuss on draft-ietf-mile-xmpp-grid-09: (with DISCUSS and COMMENT)
X-BeenThere: mile@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Managed Incident Lightweight Exchange, IODEF extensions and RID exchanges" <mile.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mile>, <mailto:mile-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mile/>
List-Post: <mailto:mile@ietf.org>
List-Help: <mailto:mile-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mile>, <mailto:mile-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Mar 2019 02:56:05 -0000

On 1/24/19 6:04 AM, Alexey Melnikov wrote:
> Hi Dave,
> 
> On Thu, Jan 24, 2019, at 12:43 PM, Dave Cridland wrote:
>> On Thu, 24 Jan 2019 at 12:04, Alexey Melnikov <aamelnikov@fastmail.fm
>> <mailto:aamelnikov@fastmail.fm>> wrote:
>>
>>     Hi Benjamin,
>>     > I also think this document does not adequately justify
>>     restricting to just
>>     > the EXTERNAL and SCRAM families of SASL mechanisms;
>>
>>     I want to push back on this. The document is adding new
>>     requirement on top of what RFC 6120 requires, this is effectively
>>     new mandatory to implement SASL mechanisms for use XMPP with
>>     grids. Ideally this would be a single SASL mechanism, but I think
>>     one password based and one X.509 based is a good compromise here.
>>
>>
>> So I see Benjamin's point here. The document does introduce a new MTI
>> SASL mechanism cohort of EXTERNAL, SCRAM-SHA1, and SCRAM-SHA-256. This
>> is fine, but one has to wonder why we don't do this universally
> I think any effort to update RFC 6120 needs to proceed independently: it
> can't hold this document hostage.
> 
>> - I might try to address this. (RFC 6120 has an MTI of SCRAM-SHA1,
>> EXTERNAL, and PLAIN+TLS for comparison).
>>
>> But as Benjamin says, it also mandates their exclusive usage. From §8.3.1:
>>
>>    completing the TLS handshake.  The XMPP-Grid Controller MUST
>>    authenticate the XMPP-Grid Platform either using the SASL EXTERNAL
>>    mechanism [RFC4422] or using the SASL SCRAM mechanism (with the
>>    SCRAM-SHA-256-PLUS variant being preferred over the SCRAM-SHA-256
>>    variant and SHA-256 variants [RFC7677] being preferred over SHA-1
>>    varients [RFC5802]).  XMPP-Grid Platforms and XMPP-Grid Controllers
>>
>> (Also, typo in "varients").
>>
>> There are, indeed, other SASL mechanisms which could be used to good
>> effect here - and indeed weaker ones that might be appropriate in some
>> circumstances. But, as written, the document prohibits these.
> 
> I suspect prohibition of others is not intentional. So what is the best
> way of addressing this? Change the MUST to the SHOULD and possibly
> change "MUST authenticate" to "SHOULD support"?

Ben already proposed some text:

  I think we could move away from the "MUST authenticate [...] using"
  language to a combination of "MUST authenticate using a mechanism that
  provides strong authentication, transport encryption, ...", and "in
  order to establish a common baseline for XMPP-Grid usage, participants
  MUST implement [EXTERNAL and SCRAM]".

Something like that seems sensible.

Peter