Re: [openpgp] Enigmail XSA issue with WKD and HTTP authentication

Daniel Kahn Gillmor <dkg@fifthhorseman.net> Fri, 14 December 2018 23:13 UTC

Return-Path: <dkg@fifthhorseman.net>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EAD54131354 for <openpgp@ietfa.amsl.com>; Fri, 14 Dec 2018 15:13:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.889
X-Spam-Level:
X-Spam-Status: No, score=-1.889 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pX9TAg62JF97 for <openpgp@ietfa.amsl.com>; Fri, 14 Dec 2018 15:13:28 -0800 (PST)
Received: from che.mayfirst.org (che.mayfirst.org [IPv6:2001:470:1:116::7]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2BE9B131342 for <openpgp@ietf.org>; Fri, 14 Dec 2018 15:13:28 -0800 (PST)
Received: from fifthhorseman.net (unknown [38.109.115.130]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by che.mayfirst.org (Postfix) with ESMTPSA id 098BCF99D; Fri, 14 Dec 2018 18:13:26 -0500 (EST)
Received: by fifthhorseman.net (Postfix, from userid 1000) id 569802055A; Fri, 14 Dec 2018 17:59:52 -0500 (EST)
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
To: Werner Koch <wk@gnupg.org>, Hanno Böck <hanno@hboeck.de>
Cc: openpgp@ietf.org
In-Reply-To: <877egcfpl5.fsf@wheatstone.g10code.de>
References: <20181207154441.41b02dc3@computer> <877egcfpl5.fsf@wheatstone.g10code.de>
Date: Fri, 14 Dec 2018 17:59:52 -0500
Message-ID: <871s6j3eaf.fsf@fifthhorseman.net>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/Mace4pKvbJCHk25wwanluIUniak>
Subject: Re: [openpgp] Enigmail XSA issue with WKD and HTTP authentication
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Dec 2018 23:13:30 -0000

On Fri 2018-12-14 10:02:46 +0100, Werner Koch wrote:
> On Fri,  7 Dec 2018 15:44, hanno@hboeck.de said:
>
>> I think it would be good if the WKD draft would be updated to clarify
>> that a client should never answer to any 401 authentication requests
>> from the server.
>
> Is this okay:
>
>   A client MUST not accept a HTTP authentication challenge (HTTP code
>   401) because the information in the Web Key Directory is public and
>   needs no authentication.  Allowing an authentication challenge has the
>   problem to easily confuse a user with a password prompt and tricking
>   him into falsely entering the passphrase used to protect his private
>   key or to login to his mail provider.

The explanation and justification part here is very clear, and i agree
it should be included.  But is "accept an HTTP authentication challenge"
the same thing as "make an HTTP authentication prompt visible to the
user" ?

how about something more like "a WKD client MUST treat an HTTP response
code 401 the same way it treats a 404…"

   --dkg