Re: [ppsp] Kathleen Moriarty's No Objection on draft-ietf-ppsp-base-tracker-protocol-11: (with COMMENT)

Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com> Wed, 16 December 2015 13:36 UTC

Return-Path: <kathleen.moriarty.ietf@gmail.com>
X-Original-To: ppsp@ietfa.amsl.com
Delivered-To: ppsp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C52A91B2D7A; Wed, 16 Dec 2015 05:36:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q64J2BMCHTeo; Wed, 16 Dec 2015 05:36:41 -0800 (PST)
Received: from mail-wm0-x236.google.com (mail-wm0-x236.google.com [IPv6:2a00:1450:400c:c09::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 938AA1A888B; Wed, 16 Dec 2015 05:36:41 -0800 (PST)
Received: by mail-wm0-x236.google.com with SMTP id l126so39796239wml.1; Wed, 16 Dec 2015 05:36:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=eG8S+4JSTKVRpF3BlwB4hq3nuM6Vu0BjWAEiUj0agt0=; b=pzbfpcYkIPpckqRRL4yIl1mIiuFrb7bPXCBVEpBCmBNPj8uFnm9JUHR5RTyQy0MFxA kyWi48ey3pSskBltAcOADn3qaT5EEI0wg3rqsFD2d7OkBXXLlK5t29D5ngqhJJapIwZL Nz0K0TULVEYUiSn8BYY9LJB3ZQOV7w9TnFwbMYwB3pUiHkb48PmOmlN0NTGxra5Ti+Vj 3n/FUve0xux607cJvb8kUYtjoVi0P7SOQ/iOlDl4gng/FMWMDQP13Ap1UpnvnT2RfbVE LN9ztLq1UgrO7qGYpacFxcnDk04E5kUG456XeZNB4/+OoZvM98Iidy7Vybuprps8e6Dv ms1A==
MIME-Version: 1.0
X-Received: by 10.194.179.71 with SMTP id de7mr50315695wjc.119.1450273000161; Wed, 16 Dec 2015 05:36:40 -0800 (PST)
Received: by 10.28.52.130 with HTTP; Wed, 16 Dec 2015 05:36:39 -0800 (PST)
In-Reply-To: <51E6A56BD6A85142B9D172C87FC3ABBB86E76198@nkgeml513-mbx.china.huawei.com>
References: <20151215022950.16440.50969.idtracker@ietfa.amsl.com> <51E6A56BD6A85142B9D172C87FC3ABBB86E76198@nkgeml513-mbx.china.huawei.com>
Date: Wed, 16 Dec 2015 08:36:39 -0500
Message-ID: <CAHbuEH4wTZia1Sye-Hhjf=UN1wXmOr81KtEF5atQcV_UKo0r_w@mail.gmail.com>
From: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
To: "Huangyihong (Rachel)" <rachel.huang@huawei.com>
Content-Type: text/plain; charset=UTF-8
Archived-At: <http://mailarchive.ietf.org/arch/msg/ppsp/jy-xRgTkjVQEcCwqj6B5dUrxDh8>
X-Mailman-Approved-At: Fri, 18 Dec 2015 19:52:55 -0800
Cc: "ppsp-chairs@ietf.org" <ppsp-chairs@ietf.org>, "ppsp@ietf.org" <ppsp@ietf.org>, The IESG <iesg@ietf.org>, "draft-ietf-ppsp-base-tracker-protocol@ietf.org" <draft-ietf-ppsp-base-tracker-protocol@ietf.org>
Subject: Re: [ppsp] Kathleen Moriarty's No Objection on draft-ietf-ppsp-base-tracker-protocol-11: (with COMMENT)
X-BeenThere: ppsp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: discussing to draw up peer to peer streaming protocol <ppsp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ppsp>, <mailto:ppsp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ppsp/>
List-Post: <mailto:ppsp@ietf.org>
List-Help: <mailto:ppsp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ppsp>, <mailto:ppsp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Dec 2015 13:36:43 -0000

Hi Rachael,

On Wed, Dec 16, 2015 at 2:12 AM, Huangyihong (Rachel)
<rachel.huang@huawei.com>; wrote:
> Hi Kathleen,
>
> Thank you for all the valuable comments. Please see my replies inline.
>
> BR,
> Rachel
>
>
>> -----Original Message-----
>> From: ppsp [mailto:ppsp-bounces@ietf.org] On Behalf Of Kathleen Moriarty
>> Sent: Tuesday, December 15, 2015 10:30 AM
>> To: The IESG
>> Cc: ppsp-chairs@ietf.org; ppsp@ietf.org;
>> draft-ietf-ppsp-base-tracker-protocol@ietf.org
>> Subject: [ppsp] Kathleen Moriarty's No Objection on
>> draft-ietf-ppsp-base-tracker-protocol-11: (with COMMENT)
>>
>> Kathleen Moriarty has entered the following ballot position for
>> draft-ietf-ppsp-base-tracker-protocol-11: No Objection
>>
>> When responding, please keep the subject line intact and reply to all email
>> addresses included in the To and CC lines. (Feel free to cut this introductory
>> paragraph, however.)
>>
>>
>> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
>> for more information about IESG DISCUSS and COMMENT positions.
>>
>>
>> The document, along with other ballot positions, can be found here:
>> https://datatracker.ietf.org/doc/draft-ietf-ppsp-base-tracker-protocol/
>>
>>
>>
>> ----------------------------------------------------------------------
>> COMMENT:
>> ----------------------------------------------------------------------
>>
>> 1. Section 5.2.7
>> Please make mention and reference to security provisions for SNMP and Syslog.
>> RFC5424 is just for syslog, so a pointer for SNMP security considerations should
>> be added in this section as well.  They use a boilerplate for the text and add
>> considerations specific to a draft.
>> Benoit - do you have a good reference for them to use?  A more generic SNMP
>> draft might not be up-to-date with the latest boilerplate text.  If that's the
>> case, the recent changes are small and could be stated with a pointer to an
>> RFC with the older boilerplate text.
>>
>> - Thanks for adding an SNMP reference.  I would think there is a better, more
>> recent one that could be used.  Moving to a comment for your AD to help you
>> with and not hold up on this one.
>
> [Rachel]: Will referring to [RFC5590] be better?
>
>>
>>
>> 2. Are there any considerations for the statistics collected, can they be used in
>> a malicious way?  I would think so and that this would be an important
>> security consideration.  Mentioning possible issues would be helpful to the
>> reader.
>>
>> - Thanks for adding in text about this one!
>>
>> 3. Section 6
>> Reference to RFC2616 isn't enough for the security considerations of HTTP
>> since that's a really old RFC.  If you want authentication options, you could
>> point to the HTTPAuth documents, which include updated versions of HTTP
>> basic (RFC7616) and digest (RFC7617).  While there are still lots of security
>> issues with these options, the RFCs spell out what the actual considerations
>> are, which are helpful to the reader.  This raises the need for TLS 1.2 as well to
>> provide session protection for the session (passive and active attacks) as well
>> as for the authentication used.
>>
>> You mention HTTPAuth's digest in 6.1, but there's no reference.  This is a little
>> better, so I am moving this to a comment from discuss.
>
> [Rachel]: Yes. I propose following changes for the last paragraph of 6.1:
>
> OLD
> "
>    OAuth 2.0 Authorization [RFC6749] SHOULD be also considered when
>    digest authentication and HTTPS client certificates are required.
> "
> NEW
> "
>    When peer (Client) authentication is desired at the tracker, HTTP Digest Authentication [RFC7616] MUST be supported.
> "

I think what you had is better as it allowed for certificate based
authentication as well.  HTTP Digest has it's problems, which are
cited in RFC7616.  A MUST for that isn't a good idea.  Just include
the reference for RFC7616 with the older text.

Thank you,
Kathleen

>
>>
>> 4. Section 6.1
>> Why isn't TLS a must here to protect the session data?
>> If you are relying on OAuth Bearer tokens, they offer no security protection
>> without TLS, so to rely on this, I'd say TLS really should be a MUST.  The
>> authentication types to get a bearer token (at least in RFC documentation and
>> in the registry) are all pretty weak and require TLS protection to have any level
>> of security.
>>
>> With the TLS MUST, we are recommending TLS 1.2 as the minimum in drafts.
>> It would be good to see a mention of TLS 1.2 as a minimum recommendation
>> and a reference to the BCP for TLS 1.2 configurations RFC7525 (it even includes
>> cipher suite recommendations).
>>
>> - Thanks for adding in the MUST for TLS and the reference to RFC7525.
>>
>> 5. Privacy
>> I would have expected some discussion on the protection of the 2 ID types and
>> the tracker capabilities and that session encryption (TLS) ought to be used
>> when this is a consideration.  Is there a reason this isn't covered?  If it's not
>> a concern, I'd like to understand why.
>>
>> -Thanks for adding in a privacy section!
>>
>>
>> _______________________________________________
>> ppsp mailing list
>> ppsp@ietf.org
>> https://www.ietf.org/mailman/listinfo/ppsp



-- 

Best regards,
Kathleen