Re: [regext] Benjamin Kaduk's No Objection on draft-ietf-regext-rdap-object-tag-04: (with COMMENT)

Benjamin Kaduk <kaduk@mit.edu> Tue, 31 July 2018 13:51 UTC

Return-Path: <kaduk@mit.edu>
X-Original-To: regext@ietfa.amsl.com
Delivered-To: regext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A115E130E03; Tue, 31 Jul 2018 06:51:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.301
X-Spam-Level:
X-Spam-Status: No, score=-2.301 tagged_above=-999 required=5 tests=[RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wDAdIezQvK79; Tue, 31 Jul 2018 06:51:25 -0700 (PDT)
Received: from dmz-mailsec-scanner-4.mit.edu (dmz-mailsec-scanner-4.mit.edu [18.9.25.15]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 32092130DF4; Tue, 31 Jul 2018 06:51:25 -0700 (PDT)
X-AuditID: 1209190f-3f1ff70000000852-a1-5b60695a9b69
Received: from mailhub-auth-4.mit.edu ( [18.7.62.39]) (using TLS with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by dmz-mailsec-scanner-4.mit.edu (Symantec Messaging Gateway) with SMTP id BC.69.02130.B59606B5; Tue, 31 Jul 2018 09:51:24 -0400 (EDT)
Received: from outgoing.mit.edu (OUTGOING-AUTH-1.MIT.EDU [18.9.28.11]) by mailhub-auth-4.mit.edu (8.13.8/8.9.2) with ESMTP id w6VDpIWT032536; Tue, 31 Jul 2018 09:51:19 -0400
Received: from kduck.kaduk.org (24-107-191-124.dhcp.stls.mo.charter.com [24.107.191.124]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.13.8/8.12.4) with ESMTP id w6VDpEni006599 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Tue, 31 Jul 2018 09:51:16 -0400
Date: Tue, 31 Jul 2018 08:51:14 -0500
From: Benjamin Kaduk <kaduk@mit.edu>
To: "Hollenbeck, Scott" <shollenbeck=40verisign.com@dmarc.ietf.org>
Cc: "'iesg@ietf.org'" <iesg@ietf.org>, "'regext-chairs@ietf.org'" <regext-chairs@ietf.org>, "'regext@ietf.org'" <regext@ietf.org>, "Gould, James" <jgould@verisign.com>, "'draft-ietf-regext-rdap-object-tag@ietf.org'" <draft-ietf-regext-rdap-object-tag@ietf.org>
Message-ID: <20180731135111.GE96369@kduck.kaduk.org>
References: <153271389685.32575.14236059863408474169.idtracker@ietfa.amsl.com> <adec3bc5daa44c4db99afd97b8d1e5a1@verisign.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <adec3bc5daa44c4db99afd97b8d1e5a1@verisign.com>
User-Agent: Mutt/1.9.1 (2017-09-22)
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFprAKsWRmVeSWpSXmKPExsUixG6nrhuTmRBt8P44i8XXF4eYLWb8mchs 8XXPHmaLl11PmS2uTjjCaLF85jlGBzaPE8uusHosWfKTyWPX5ga2AOYoLpuU1JzMstQifbsE row7G2sKnhpU3Ljwl7GBcaN6FyMnh4SAicTrqZuZuxi5OIQEFjNJPOg+wArhbGSUeLDtKStI lZDAVSaJNddkQWwWAVWJzlWzGEFsNgEViYbuy8wgtoiAs8TpZStZQJqZBVYwSTTNWAtWJCyQ IrHo+Uswmxdo3bOXBxghNjQwSkyec4MVIiEocXLmExYQm1lAS+LGv5dMXYwcQLa0xPJ/HCBh TgEbiU0r9oGViAooS+ztO8Q+gVFgFpLuWUi6ZyF0L2BkXsUom5JbpZubmJlTnJqsW5ycmJeX WqRropebWaKXmlK6iREU2JyS/DsY5zR4H2IU4GBU4uH9oB4fLcSaWFZcmXuIUZKDSUmUt+0b UIgvKT+lMiOxOCO+qDQntfgQowQHs5IIr40MUI43JbGyKrUoHyYlzcGiJM57ryY8WkggPbEk NTs1tSC1CCYrw8GhJMG7LT0hWkiwKDU9tSItM6cEIc3EwQkynAdoOCdIDW9xQWJucWY6RP4U oy7Hn/dTJzELseTl56VKifOmZgAVCYAUZZTmwc0BJSSJ7P01rxjFgd4S5t0LMooHmMzgJr0C WsIEtEQ7JBZkSUkiQkqqgdE/LWI2u+V/WSPPDQ9j9tcYTdraetVZbwvLPjGtzeZtfAY3b79W mZiSxPvoaHTzleBf4ivvTrgtuephhP5WPi2b6SF5eivbjfyD+RYqfy9Sesj73u2J5WOFzPdP OC4vzLxVsu6oSlZ+WWfk+qYfnEduX77gvLns27pdEbf3tgs13V30rXJu8gwlluKMREMt5qLi RAAzB/1jIwMAAA==
Archived-At: <https://mailarchive.ietf.org/arch/msg/regext/Q3PkFZiQDFLiUYGznAXY5WhShLc>
Subject: Re: [regext] Benjamin Kaduk's No Objection on draft-ietf-regext-rdap-object-tag-04: (with COMMENT)
X-BeenThere: regext@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: Registration Protocols Extensions <regext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/regext>, <mailto:regext-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/regext/>
List-Post: <mailto:regext@ietf.org>
List-Help: <mailto:regext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/regext>, <mailto:regext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 31 Jul 2018 13:51:28 -0000

On Mon, Jul 30, 2018 at 02:29:02PM +0000, Hollenbeck, Scott wrote:
> (My email client sometimes does unexpected things with message encryption. Sending again with plaintext assured...)
> 
> > -----Original Message-----
> > From: Benjamin Kaduk <kaduk@mit.edu>
> > Sent: Friday, July 27, 2018 1:52 PM
> > To: The IESG <iesg@ietf.org>
> > Cc: draft-ietf-regext-rdap-object-tag@ietf.org; Gould, James
> > <jgould@verisign.com>; regext-chairs@ietf.org; Gould, James
> > <jgould@verisign.com>; regext@ietf.org
> > Subject: [EXTERNAL] Benjamin Kaduk's No Objection on draft-ietf-regext-
> > rdap-object-tag-04: (with COMMENT)
> >
> > ----------------------------------------------------------------------
> > COMMENT:
> > ----------------------------------------------------------------------
> >
> > I was a little surprised to see that this document targets BCP status, not
> > Proposed Standard.  Was there much discussion of this question in the WG?
> >
> > Section 2
> >
> >    Service provider tags are concatenated to the end of RDAP query
> >    object identifiers to unambiguously identify the authoritative server
> >
> > It seems like it is the combination of concatenation of the service
> > provider tag, and the use of the rdap_objectTag_level_0 rdapConformance
> > attribute that provides the unambiguous property; I would like to see this
> > caveat made more clear here.
> 
> Thanks for the review, Benjamin. The rdapConformance attribute doesn't do 
> anything to identify the authoritative server. It's a clue to the client that 
> the server has implemented this particular practice.

Right, it's an indication that the server has implemented this practice.
Absent such an explicit indication, the -XXXX tag could either be a service
provider tag, or just a regular part of the query handle.  Thus, just the
convention of an -XXXX tag by itself is *not* unambiguous.  So, I'm asking
for some text to be added that qualifies the statement as only applying
"when the client knows that this convention is in use" (or similar).

> > Also, per https://www.iab.org/2016/11/07/iab-statement-on-ipv6/, please
> > consider using IPv6 addresses in the examples.
> 
> The example copied into this document comes directly from Section 5.3 of RFC 
> 7483. I'd prefer to keep it as-is to maintain consistency with that cited 
> reference.

I note that the IAB statement is not exactly binding, but also that at some
point blindly propagating the same example into the future becomes stuck in
a history that does not reflect the present.  (I also note that my ART
colleagues are generally more active on this front than I am.)

> > Section 5.1
> >
> > Are all provided URLs supposed to be functionally different?  If not, how
> > do we tell which ones do what?
> 
> Practice thus far in the RDAP bootstrap registries has been to register http 
> and https URLs. The scheme of the URL identifies the functional difference.

Perhaps indicate that they are expected to supply the same data, but may
differ in scheme or other components?

> > Section 7
> >
> > Perhaps note that it is using IANA as a well-known central trusted
> > authority in order to provide the property of allowing users to get RDAP
> > data from an authoritative source?
> 
> Sure, OK.
> 
> >    [...] The method has the same security
> >    properties as the RDAP protocols themselves.  The transport used to
> >    access the IANA registries can be more secure by using TLS [RFC5246],
> >    which IANA supports.
> >
> > Well, I don't know that "the same as" is quite right, especially given the
> > following sentence.  The composed chain of "talk to iana, talk to referred
> > RDAP server" depends both on the security of the connection to the RDAP
> > server and that of the connection to IANA; it seems prudent to note that
> > if TLS is used for the RDAP connection, TLS should also be used when
> > talking to IANA, or even that TLS should always be used when talking to
> > IANA.
> 
> OK, how about this text?
> 
> OLD:
> This practice helps to ensure that end users will get RDAP data from an 
> authoritative source using a bootstrap method to find authoritative RDAP 
> servers, reducing the risk of sending queries to non-authoritative sources. 
> The method has the same security properties as the RDAP protocols themselves. 
> The transport used to access the IANA registries can be more secure by using 
> TLS [RFC5246], which IANA supports.
> 
> NEW:
> This practice uses IANA as a well-known, central trusted authority to provide 
> the property of allowing users to get RDAP data from an authoritative source, 
> reducing the risk of sending queries to non-authoritative sources and 
> divulging query information to unintended parties.  Additional privacy 
> protection can be gained by using TLS [RFC5246] to provide data 
> confidentiality when retrieving registry information from IANA.

I like the overall direction this is going, but have some quibbles.  For
one, TLS is not just about confidentiality protection and privacy concerns
-- it also provides integrity protection and authentication of the data
source.  For consulting a central registry like this, the integrity
protection and data authenticity seem to be potentially more important than
confidentiality, at least from where I'm sitting.

I also think it's fine to retain some text about "the same security
properties as the RDAP protocols themselves", when appropriately set into
context.  Perhaps:

NEWNG:
This practice uses IANA as a well-known, central trusted authority to
allow users to get RDAP data from an authoritative source, 
reducing the risk of sending queries to non-authoritative sources and 
divulging query information to unintended parties.  Using TLS [RFC 5246] to
protect the connection to IANA allows the server to authenticate itself as
being operated by IANA and provides integrity protection for the resulting
referral information, as well as providing privacy protection via data
confidentiality.  The subsequent RDAP connection is performed as usual, and
retains the same security properties of the RDAP protocols themselves.

-Benjamin