Re: [precis] Stephen Farrell's Discuss on draft-ietf-precis-saslprepbis-17: (with DISCUSS and COMMENT)

Stephen Farrell <stephen.farrell@cs.tcd.ie> Wed, 27 May 2015 13:14 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: precis@ietfa.amsl.com
Delivered-To: precis@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C273C1A88E8; Wed, 27 May 2015 06:14:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level:
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KO6a-FABtfoV; Wed, 27 May 2015 06:14:08 -0700 (PDT)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B3B961A8877; Wed, 27 May 2015 06:14:07 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id DFB64BEE7; Wed, 27 May 2015 14:14:04 +0100 (IST)
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6gLEFeFWvV3J; Wed, 27 May 2015 14:14:04 +0100 (IST)
Received: from [134.226.36.180] (stephen-think.dsg.cs.tcd.ie [134.226.36.180]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id A0701BECF; Wed, 27 May 2015 14:14:04 +0100 (IST)
Message-ID: <5565C31C.3020309@cs.tcd.ie>
Date: Wed, 27 May 2015 14:14:04 +0100
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Alexey Melnikov <alexey.melnikov@isode.com>, The IESG <iesg@ietf.org>
References: <20150527125619.24017.77007.idtracker@ietfa.amsl.com> <5565C153.1030708@isode.com>
In-Reply-To: <5565C153.1030708@isode.com>
OpenPGP: id=D66EA7906F0B897FB2E97D582F3C8736805F8DA2; url=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/precis/4yYv8klwciIeLfCqviTaYN_6YDI>
Cc: draft-ietf-precis-saslprepbis@ietf.org, precis@ietf.org, draft-ietf-precis-saslprepbis.ad@ietf.org, precis-chairs@ietf.org, draft-ietf-precis-saslprepbis.shepherd@ietf.org
Subject: Re: [precis] Stephen Farrell's Discuss on draft-ietf-precis-saslprepbis-17: (with DISCUSS and COMMENT)
X-BeenThere: precis@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Preparation and Comparison of Internationalized Strings <precis.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/precis>, <mailto:precis-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/precis/>
List-Post: <mailto:precis@ietf.org>
List-Help: <mailto:precis-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/precis>, <mailto:precis-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 May 2015 13:14:13 -0000

Hiya,

On 27/05/15 14:06, Alexey Melnikov wrote:
> Hi Stephen,
> 
> On 27/05/2015 13:56, Stephen Farrell wrote:
>  [...]
>> ----------------------------------------------------------------------
>> DISCUSS:
>> ----------------------------------------------------------------------
>>
>>
>> 4.1: zero length password - I think you're wrong on that
>> one but it is arguable. If RFC4013 also prohibited zero
>> length passwords (I couldn't tell at a quick glance)
> Yes, zero length password was always prohibited by RFC 4013. If you look
> at various RFCs that reference SASLPrep, they say "if the password is
> invalid or zero length after applying SASLPrep normalization, then
> reject it" (or similar words).

That wins. I'll clear the discuss and make this a comment.

>> or if
>> the WG did debate this and having done so decided to
>> prohibit zero length passwords then I will clear the
>> discuss immediately. But if not, I'd like to chat about
>> it...
>>
>> There are situations where an empty password is ok (say
>> when I'm not "protecting" something but just want to know
>> what user's profile to use, e.g. for weather) and that is
>> supported in many systems (that hence won't be able to
>> exactly adopt this) and insisting on a non-empty password
>> could be more damaging than allowing a zero-length
>> password, whenever a user re-uses a password for something
>> for which no password is really needed (and which hence is
>> less likely to be well protected) and where that password
>> is also used to protect something of significantly higher
>> value. The zero-length password is also not an interesting
>> subset of the set of stupid passwords really so doesn't
>> deserve to be called out as such (and you say that in the
>> draft when you talk about length-1 passwords.) So I think
>> allowing zero length passwords is better overall, and more
>> consistent with implementations.
> The main reason for disallowing it was because with SASLPrep (or
> Precis), a non empty sequence of characters can result in empty password
> after canonicalization, which seems misleading/dangerous if allowed.
>> ----------------------------------------------------------------------
>> COMMENT:
>> ----------------------------------------------------------------------
>>
>>
>> - Unsurprisingly, the diff between this and RFC4013 isn't
>> useful, so I read from scratch. If I'm commenting on
>> something that was already true of 4013, just tell me and
>> that'll be fine.
>>
>> - intro: given the unsolved i18n issues and the fact that
>> passwords are crap (security wise) would it be fair to ask
>> that you add a sentence here to encourage folks to not use
>> passwords at all but some better form of authentication,
>> when that's possible? (Which is sadly not nearly common
>> enough for user authentication.)
> Can you suggest specific text? It is a bit hard to agree/disagree in
> abstract.

Will do in the updated comment.

Cheers,
S.


> 
>