Re: [Privacy-pass] Francesca Palombini's Discuss on draft-ietf-privacypass-auth-scheme-12: (with DISCUSS)

Tommy Pauly <tpauly@apple.com> Wed, 06 September 2023 16:49 UTC

Return-Path: <tpauly@apple.com>
X-Original-To: privacy-pass@ietfa.amsl.com
Delivered-To: privacy-pass@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4BD59C151063 for <privacy-pass@ietfa.amsl.com>; Wed, 6 Sep 2023 09:49:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.407
X-Spam-Level:
X-Spam-Status: No, score=-4.407 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=apple.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L6_307uTSAiI for <privacy-pass@ietfa.amsl.com>; Wed, 6 Sep 2023 09:49:39 -0700 (PDT)
Received: from rn-mailsvcp-mx-lapp02.apple.com (rn-mailsvcp-mx-lapp02.apple.com [17.179.253.23]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B8CE1C151555 for <privacy-pass@ietf.org>; Wed, 6 Sep 2023 09:49:39 -0700 (PDT)
Received: from rn-mailsvcp-mta-lapp01.rno.apple.com (rn-mailsvcp-mta-lapp01.rno.apple.com [10.225.203.149]) by rn-mailsvcp-mx-lapp02.rno.apple.com (Oracle Communications Messaging Server 8.1.0.23.20230328 64bit (built Mar 28 2023)) with ESMTPS id <0S0K0111MPER6930@rn-mailsvcp-mx-lapp02.rno.apple.com> for privacy-pass@ietf.org; Wed, 06 Sep 2023 09:49:39 -0700 (PDT)
X-Proofpoint-ORIG-GUID: yh3TUQ12H78RNG14ntewuhUMiS-CMRhG
X-Proofpoint-GUID: yh3TUQ12H78RNG14ntewuhUMiS-CMRhG
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.601, 18.0.957 definitions=2023-09-06_06:2023-09-05, 2023-09-06 signatures=0
X-Proofpoint-Spam-Details: rule=interactive_user_notspam policy=interactive_user score=0 suspectscore=0 mlxscore=0 phishscore=0 malwarescore=0 spamscore=0 adultscore=0 bulkscore=0 mlxlogscore=999 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2308100000 definitions=main-2309060144
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apple.com; h=from : message-id : content-type : mime-version : subject : date : in-reply-to : cc : to : references; s=20180706; bh=XmyUu0PBqibfQNb8VCymyCFFJil7zyOnsEn3k9hwZf0=; b=QlfA6pjIp0O9+6tFPLmPcnrUHWS3HjYnieSTFxjTx7ami11hMbECCjtldHzRwS3yT6OG TVi28uo841KUb+e23YMX1VdFiF+Adoff0E0o7b9/Z3IvZ7zxPC7Ku3jnTesuD9SD+u8r ZoGUykUbd1WH7DD3Gw9l3D5oHWb7LNOQVDippbVWzVVcf1Auhjqdd1URbHexnBXPHjin nH6C5+ixLlXIONPSdF7gyyp5Bidgx16YnRzN3Rg2HnvXUkY98qKG6SM50//86ZVkKe9U onqiu8GI1YleIz328vZj9PKvBf64qsEBIXp5RZ5rZcNxjUkTq0gaSAwOYbfcT3Ki0dFl rA==
Received: from rn-mailsvcp-mmp-lapp01.rno.apple.com (rn-mailsvcp-mmp-lapp01.rno.apple.com [17.179.253.14]) by rn-mailsvcp-mta-lapp01.rno.apple.com (Oracle Communications Messaging Server 8.1.0.23.20230328 64bit (built Mar 28 2023)) with ESMTPS id <0S0K00G2EPELTA80@rn-mailsvcp-mta-lapp01.rno.apple.com>; Wed, 06 Sep 2023 09:49:33 -0700 (PDT)
Received: from process_milters-daemon.rn-mailsvcp-mmp-lapp01.rno.apple.com by rn-mailsvcp-mmp-lapp01.rno.apple.com (Oracle Communications Messaging Server 8.1.0.23.20230328 64bit (built Mar 28 2023)) id <0S0K00700P8Y1N00@rn-mailsvcp-mmp-lapp01.rno.apple.com>; Wed, 06 Sep 2023 09:49:33 -0700 (PDT)
X-Va-A:
X-Va-T-CD: e4148c516a19be786fc917ec997ed768
X-Va-E-CD: be4ebb1cf91374174c9c5b32c1482cf2
X-Va-R-CD: 3e0c77c9f597cedf47106e879ef4988f
X-Va-ID: fe0b8a8a-8820-433b-ac8d-f148a878483a
X-Va-CD: 0
X-V-A:
X-V-T-CD: e4148c516a19be786fc917ec997ed768
X-V-E-CD: be4ebb1cf91374174c9c5b32c1482cf2
X-V-R-CD: 3e0c77c9f597cedf47106e879ef4988f
X-V-ID: 64168180-eeca-4b70-8198-389012e4f712
X-V-CD: 0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.601, 18.0.957 definitions=2023-09-06_06:2023-09-05, 2023-09-06 signatures=0
Received: from smtpclient.apple ([17.11.162.131]) by rn-mailsvcp-mmp-lapp01.rno.apple.com (Oracle Communications Messaging Server 8.1.0.23.20230328 64bit (built Mar 28 2023)) with ESMTPSA id <0S0K005C2PEK3000@rn-mailsvcp-mmp-lapp01.rno.apple.com>; Wed, 06 Sep 2023 09:49:32 -0700 (PDT)
From: Tommy Pauly <tpauly@apple.com>
Message-id: <08925049-A30B-482D-A915-88686668949D@apple.com>
Content-type: multipart/alternative; boundary="Apple-Mail=_22A01BC2-3C01-4F16-9761-FCC7E7E4CF10"
MIME-version: 1.0 (Mac OS X Mail 16.0 \(3773.100.6\))
Date: Wed, 06 Sep 2023 09:49:22 -0700
In-reply-to: <169339102955.43666.8940565436478379561@ietfa.amsl.com>
Cc: The IESG <iesg@ietf.org>, draft-ietf-privacypass-auth-scheme@ietf.org, privacypass-chairs@ietf.org, privacy-pass@ietf.org, ietf@bemasc.net, mt@lowentropy.net
To: Francesca Palombini <francesca.palombini@ericsson.com>
References: <169339102955.43666.8940565436478379561@ietfa.amsl.com>
X-Mailer: Apple Mail (2.3773.100.6)
Archived-At: <https://mailarchive.ietf.org/arch/msg/privacy-pass/EtauirQr1nPNWPHBDmN4TsCaYOM>
Subject: Re: [Privacy-pass] Francesca Palombini's Discuss on draft-ietf-privacypass-auth-scheme-12: (with DISCUSS)
X-BeenThere: privacy-pass@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Privacy Pass Protocol <privacy-pass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/privacy-pass>, <mailto:privacy-pass-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/privacy-pass/>
List-Post: <mailto:privacy-pass@ietf.org>
List-Help: <mailto:privacy-pass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/privacy-pass>, <mailto:privacy-pass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Sep 2023 16:49:44 -0000

Hi Francesca,

We’ve been going through the various issues from Martin (and we’ve merged many of the smaller / editorial changes).

I did want to highlight a PR I just opened to address the main issues that your DISCUSS is based on:

https://github.com/ietf-wg-privacypass/base-drafts/pull/474

Specifically, this removes the web-specific considerations, and replaces the “user interaction” section with sections on “client behavior” and “origin behavior”. The pieces of the old text that still apply generally have been recontextualized and reorganized.

Thanks!
Tommy

> On Aug 30, 2023, at 3:23 AM, Francesca Palombini via Datatracker <noreply@ietf.org> wrote:
> 
> Francesca Palombini has entered the following ballot position for
> draft-ietf-privacypass-auth-scheme-12: Discuss
> 
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
> 
> 
> Please refer to https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
> for more information about how to handle DISCUSS and COMMENT positions.
> 
> 
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-privacypass-auth-scheme/
> 
> 
> 
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
> 
> Thank you for the work on this document.
> 
> Many thanks to Martin Thomson for his in-depth HTTPDIR review:
> https://lists.w3.org/Archives/Public/ietf-http-wg/2023JulSep/0156.html. Martin
> brings up a number of very valid comments
> (https://github.com/ietf-wg-privacypass/base-drafts/issues/created_by/martinthomson)
> some of which I think should be easily addressed. Some of these however seem
> more important and I am looking forward to the authors replies.
> 
> Posting Martin's review below (and CC'ing him in), for archiving purposes.
> 
> --
> This document describes a new authentication scheme for HTTP that enables
> authorization via Privacy Pass.
> 
> I've been tracking this work at a high level, but I've never reviewed this
> document in any detail until now.  After taking a closer look, I've found quite
> a few problems.
> 
> https://github.com/ietf-wg-privacypass/base-drafts/issues lists 23 new issues.
> https://github.com/ietf-wg-privacypass/base-drafts/pull/459 suggests some
> editorial fixes on top of those.
> 
> A number of those issues are significant enough to suggest that the document is
> not ready.  I expect that most will be easily handled, but there are a couple
> of trickier ones.
> 
> https://github.com/ietf-wg-privacypass/base-drafts/issues/448 is serious enough
> to draw special attention to.  In short, Section 3 of the document is very
> problematic as it makes a lot of assumptions about a particular deployment
> environment.  Some of those assumptions are -- I think -- bad.  It looks like
> the intent of this section is to describe how this mechanism might be deployed
> safely to the Web.  This raises a number of concerns:
> 
> 1. This is an IETF document.  The W3C is probably in a better position to come
> to conclusions about what is (or isn't) appropriate for deployment to the Web.
> 
> 2. The bounds on user agent behaviour are not specified in sufficient detail.
> There is definitely a case to be made for this to be deployed to the web as
> envisaged, with different implementations making their own choices.  But if the
> intent is to describe the nature of the risks involved in deployment to the
> Web, then there is not enough detail to guide the successful implementation and
> deployment of this feature.
> 
> 3. There are a number of implicit assumptions throughout that are not
> adequately explained.  For instance, there is discussion of use of this
> mechanism across origins or sites, despite that violating established Web
> norms.  There is discussion of that cross-site transfer occurring without user
> involvement, which is a oft-used safeguard against such privacy leaks.  But the
> necessary preconditions for that transfer are not articulated.  There are
> potentially scenarios where this sort of transfer could be safe, but there are
> great many where it is absolutely not.  The document seems to be assuming that
> the token carries a very particular signal along with it, namely that the
> client acts on behalf of an entity that the attester (and transitively, the
> issuer) believe not to be abusive.
> 
> I've suggested in the issue that this section needs considerable revision.
> There are general requirements on the use of the protocol that are currently
> buried in amoungst Web-specific requirements.  Those will need to be teased
> out.  It's possible that the accompanying architecture document could cover
> this material, but I'm not seeing it there.
> 
> Then there are the Web-specific requirements that really belong in a
> Web-specific document, which is probably something that the W3C is in a better
> position to produce than the IETF.  Here, the precise set of safeguards will
> probably be some mixture of client-specific policy and widely-agreed policy, so
> getting that mix right will need careful consideration.
> 
> Despite all this, I'm generally supportive of this protocol.  It is a design
> that should work well in a great many contexts, but getting this right for the
> Web requires more than this document provides.
> 
> 
> 
> 
> 
> -- 
> Privacy-pass mailing list
> Privacy-pass@ietf.org
> https://www.ietf.org/mailman/listinfo/privacy-pass