Re: [Privacy-pass] Call for Adoption of Key Consistency and Discovery Draft

Christopher Wood <caw@heapingbits.net> Thu, 06 October 2022 19:03 UTC

Return-Path: <caw@heapingbits.net>
X-Original-To: privacy-pass@ietfa.amsl.com
Delivered-To: privacy-pass@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6EA4FC159495 for <privacy-pass@ietfa.amsl.com>; Thu, 6 Oct 2022 12:03:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.109
X-Spam-Level:
X-Spam-Status: No, score=-7.109 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=heapingbits.net header.b=kCz/MowZ; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=AofJk5DB
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id et4cePBH3ok6 for <privacy-pass@ietfa.amsl.com>; Thu, 6 Oct 2022 12:03:35 -0700 (PDT)
Received: from out3-smtp.messagingengine.com (out3-smtp.messagingengine.com [66.111.4.27]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9B01AC3A4B81 for <privacy-pass@ietf.org>; Thu, 6 Oct 2022 12:00:14 -0700 (PDT)
Received: from compute2.internal (compute2.nyi.internal [10.202.2.46]) by mailout.nyi.internal (Postfix) with ESMTP id 9BA965C019C for <privacy-pass@ietf.org>; Thu, 6 Oct 2022 15:00:13 -0400 (EDT)
Received: from imap41 ([10.202.2.91]) by compute2.internal (MEProxy); Thu, 06 Oct 2022 15:00:13 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=heapingbits.net; h=cc:content-transfer-encoding:content-type:date:date:from:from :in-reply-to:in-reply-to:message-id:mime-version:references :reply-to:sender:subject:subject:to:to; s=fm2; t=1665082813; x= 1665169213; bh=K/kjIf5smR5NT7bvJ9IM5ADCqOkgMhT3YZBrHuRRtEI=; b=k Cz/MowZIZ4atirAikjs1q8/TDoLrf+MtkDlpIUeuowmbpJNSXVvDYFk5ssq+DW3H CCdB0UsuKoWzqpIT4hZEtRqPVbd8RUIAMUbCusUfu85yok1O8MvkxnsJBKXuMzml +fJVcWyU5enN1BL3JGnb9dJChZnIzhCiNtzxms+QiFVjCF7NM+/lUg9ZCY8P85ce 1EJwhCEum3/5yuNqR3Ey0vHihG8xhuCG0suDRnbAEV4gmdcimldqqlv7JclJaVt3 xbDZRqreZkDgCJFpcY/cwvA9UOXsi6T1FkAi9uEPlmkU2EdLwWMz9tNxEM89ne3Z rHHXt1T8ttK90Pu1uLbVw==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-transfer-encoding:content-type :date:date:feedback-id:feedback-id:from:from:in-reply-to :in-reply-to:message-id:mime-version:references:reply-to:sender :subject:subject:to:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm2; t=1665082813; x=1665169213; bh=K /kjIf5smR5NT7bvJ9IM5ADCqOkgMhT3YZBrHuRRtEI=; b=AofJk5DBzcjafOsq4 M7I8YQ2p6TUI8ByOAPUqIqh9pI+F5MO51NG8h1o6lh97m39FwDRdYiQo1CLTZK6q DhNxELX2DRIQ909M9kxmqvF0G/c2t/pZRAP8PaCCV9U1SUdz7sf7ERw4OXmg5kX4 TtUNdI3HZS4ifn5//pKhKULkNwWV4zgNcYN4yjS6lTxGUpnR6TZz7Cbf/RXiWt96 1RlJ/oK+uJqPCe4ldKPfO907kmR+nxakJQvXC6hIyZwaWJo80+4BjEhrJYR8yq/s WUJEHuOM7o/uWG2FAnwZ3KDw+fwacyovk5B7GJihod+Qkg9a+ar7Wyj8c633lKl7 Ix5GA==
X-ME-Sender: <xms:vSU_Y2j-cUnBTRJDxmKW0gNVIHi4QW4kOPvV969yA2qIk1XWs-NBhQ> <xme:vSU_Y3De8K8glKhsXZ-zcYiYR8t2oeWnk-Sk6qzoIQtMH5aYnByRuGXhGOWhYkxzq K2LzdGANd1sk0Sx6e0>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvfedrfeeihedgudefvdcutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh necuuegrihhlohhuthemuceftddtnecuogfuuhhsphgvtghtffhomhgrihhnucdlgeelmd enucfjughrpefofgggkfgjfhffhffvufgtgfesthhqredtreerjeenucfhrhhomhepfdev hhhrihhsthhophhhvghrucghohhougdfuceotggrfieshhgvrghpihhnghgsihhtshdrnh gvtheqnecuggftrfgrthhtvghrnhepgfeugffgledtjefgleetiedvfffffeffhfefhfff keetkefftdevjeefheeitdevnecuffhomhgrihhnpehgihhthhhusgdrihhopdhgihhthh husgdrtghomhenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhr ohhmpegtrgifsehhvggrphhinhhgsghithhsrdhnvght
X-ME-Proxy: <xmx:vSU_Y-GtB3gMmwLUmN-juOjKVfYojHlrsvWY3wQeXFAS1bMVRoFPIA> <xmx:vSU_Y_SazK-f1oQo9qA2meejAhNT485rI3W5pi9MONOSuJd--padFg> <xmx:vSU_Yzz2iFpM00JfdrHS71_DvEg46Lja3a8qsxxYlQQMmOYWnYlZtA> <xmx:vSU_Yy_ODC4lUoo_aUjMMuH2seL7c0yC1obSzohFz4hASIPuZGCLSg>
Feedback-ID: i2f494406:Fastmail
Received: by mailuser.nyi.internal (Postfix, from userid 501) id 64E3F234007B; Thu, 6 Oct 2022 15:00:13 -0400 (EDT)
X-Mailer: MessagingEngine.com Webmail Interface
User-Agent: Cyrus-JMAP/3.7.0-alpha0-1015-gaf7d526680-fm-20220929.001-gaf7d5266
Mime-Version: 1.0
Message-Id: <4db8451b-8915-4686-adc4-9790ce55c130@app.fastmail.com>
In-Reply-To: <0AEA7E48-9D6A-4404-BB6B-E01416151567@apple.com>
References: <CAMOjQcH6n=DzX0Mh-ufLJ9srqxP+zt6kuQgrjYs4mic6K6Wg=g@mail.gmail.com> <04AE996B-E459-4868-948E-752BE730DA13@apple.com> <93b18dcf-e129-4ce8-9c3f-3ec70d4f59af@betaapp.fastmail.com> <0AEA7E48-9D6A-4404-BB6B-E01416151567@apple.com>
Date: Thu, 06 Oct 2022 14:59:51 -0400
From: Christopher Wood <caw@heapingbits.net>
To: privacy-pass@ietf.org
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/privacy-pass/KfXf3-mlirA0_jFolXHiEgV3-kk>
Subject: Re: [Privacy-pass] Call for Adoption of Key Consistency and Discovery Draft
X-BeenThere: privacy-pass@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Privacy Pass Protocol <privacy-pass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/privacy-pass>, <mailto:privacy-pass-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/privacy-pass/>
List-Post: <mailto:privacy-pass@ietf.org>
List-Help: <mailto:privacy-pass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/privacy-pass>, <mailto:privacy-pass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Oct 2022 19:03:40 -0000

On Thu, Oct 6, 2022, at 12:02 PM, Tommy Pauly wrote:
>> On Oct 5, 2022, at 8:09 PM, Martin Thomson <mt@lowentropy.net> wrote:
>> 
>> On Thu, Oct 6, 2022, at 13:14, Tommy Pauly wrote:
>>> My suggestion is that the general technique of double checking like 
>>> draft-schwartz-ohai-consistency-doublecheck does — in that case once 
>>> with a GET request to a reverse proxy and once with a CONNECT request 
>>> to a forward proxy, followed by a GET — could be described in the main 
>>> key consistency document. I think really it boils down to “do a lookup 
>>> with two different proxies, or do one lookup directly and another 
>>> lookup with a proxy”.
>> 
>> Don't we already do that?
>> 
>> https://chris-wood.github.io/key-consistency/draft-wood-key-consistency.html#name-shared-proxy-with-key-confi
>
> Yes, it does. I think it could reasonably give some non-normative 
> examples of specifics (mentioning that you could do a GET and a 
> CONNECT/CONNECT-UDP/etc) for HTTP-style proxies, and not require a 
> separate document to spell out the protocol details, or mandate the use 
> of specific methods and versions.
>
> I wonder if it also would be worth mentioning mixing Direct Discovery 
> and Proxy Discovery — if you are OK to reveal your IP to the server, 
> then you could have one check through the proxy and one check without, 
> and it might have similar properties (if I’m not missing anything).

Agreed -- This seems like a fine variant to add (and describe):

   https://github.com/chris-wood/key-consistency/issues/24

Best,
Chris