Re: [regext] FW: New Version Notification for draft-gould-regext-secure-authinfo-transfer-00.txt

"Patrick Mevzek" <pm@dotandco.com> Thu, 25 July 2019 05:46 UTC

Return-Path: <pm@dotandco.com>
X-Original-To: regext@ietfa.amsl.com
Delivered-To: regext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B9DB612011C for <regext@ietfa.amsl.com>; Wed, 24 Jul 2019 22:46:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=dotandco.com header.b=eLDSks0K; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=0FcPz3z4
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ts1fhmyW1QDm for <regext@ietfa.amsl.com>; Wed, 24 Jul 2019 22:46:31 -0700 (PDT)
Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com [66.111.4.25]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E733212011B for <regext@ietf.org>; Wed, 24 Jul 2019 22:46:30 -0700 (PDT)
Received: from compute3.internal (compute3.nyi.internal [10.202.2.43]) by mailout.nyi.internal (Postfix) with ESMTP id 1DF0221873 for <regext@ietf.org>; Thu, 25 Jul 2019 01:46:30 -0400 (EDT)
Received: from imap1 ([10.202.2.51]) by compute3.internal (MEProxy); Thu, 25 Jul 2019 01:46:30 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dotandco.com; h= mime-version:message-id:in-reply-to:references:date:from:to :subject:content-type; s=fm3; bh=j7qTzpJFoNVU8zzp3Cd+TuzBwy0ptBj gq/XEMekl94s=; b=eLDSks0KYUOUS4Jt6o8oA1cjI0Z32OxpkVr3kiZAqD+fBxY gJ5lKCboheOgsUHRkcG5p37ObAVIuxatQNA8o9vKJHWp/AyO639xL8ZnKOmk9j56 sBQC2ITzk8Gy1VY+FpZEChiNxDX4pvBEVjX1ysy5Cik1UoQ3/re/aHFh6Pmb4RF/ 432n7WtVv8BnKd1vTJyIpvzcZtIMNcYZaklqz2yc++8tTf5Dl7pnKxcQchKljVvP aOhOZLaEoyrgflER4YKwziMzJEw1hgGcFQBO7vuDrr9nkV4dkXhZ8Vu/FTGsRdLs bUwlRWkao182FDJhW8Mu+FkKDUmahFcDI1bp7DQ==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-proxy :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=j7qTzp JFoNVU8zzp3Cd+TuzBwy0ptBjgq/XEMekl94s=; b=0FcPz3z4VnZLIwjDpio6/r f2alVxNZLPmiigkWSlQ2XseE+MztRVRrar3hHBLuomvy/vGQNq5+md8WN7EH8VVH bqSmtq1FPpLCe0xmpumOD5aS/+7rqmYEfi0koxjID8uSc3XHPX0/DYvTAr7f752i ePcH+XTqasRKkAMcUdmzw1B2diR37S7N1/87Fnmk7ylpTzxkxPEl3f9CTSq1VxHG M8F/yeOCgWWs6IF2QjGkleALTYAhsbsEBRQEJDeWs6+Xvts+5Ww55bRmQ3umTrl/ S89YEyNLpo9671xiQhA3V6EfNwSIG5S0oGZVex7kUx4Jh+4wQlIPSirhcXbYX+Ag ==
X-ME-Sender: <xms:NUI5XSEo7m7I1JmvlnO13PQ9etM-FZBH2dXDAaLNC8bEkhXPH0nsFqYZCkg>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduvddrkedugdelhecutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecunecujfgurhepofgfggfkjghffffhvffutgesthdtre dtreerjeenucfhrhhomhepfdfrrghtrhhitghkucfovghviigvkhdfuceophhmseguohht rghnuggtohdrtghomheqnecurfgrrhgrmhepmhgrihhlfhhrohhmpehpmhesughothgrnh gutghordgtohhmnecuvehluhhsthgvrhfuihiivgeptd
X-ME-Proxy: <xmx:NUI5XQuU_iuiH-pqO06s9ofgPfAuL6QmS5iEysn9tXk2J9ylGUDYDA> <xmx:NUI5XTdijVHfxs7O29A7HTiZp93-pGqWmiOVa0Ji5Ki7RT8fxyW69w> <xmx:NUI5XWmk5I8EjUE8wVr3jBhceCzQcO-2D4-wLga_BsRXirtVdJ1D7Q> <xmx:NkI5XQm0ge3ejtCqlslQ7bF4piVVxTlEcui0j8kQhuV4WGMMqyvjzg>
Received: by mailuser.nyi.internal (Postfix, from userid 501) id A82A1C200A4; Thu, 25 Jul 2019 01:46:29 -0400 (EDT)
X-Mailer: MessagingEngine.com Webmail Interface
User-Agent: Cyrus-JMAP/3.1.6-736-gdfb8e44-fmstable-20190718v2
Mime-Version: 1.0
Message-Id: <0119acdb-2ec9-4f14-b37a-d945e0b032b5@www.fastmail.com>
In-Reply-To: <4A0925CB-23A7-492C-83C8-36EB23F61A1F@verisign.com>
References: <2FE774F6-35D1-46B5-B403-2BA1CC8928B3@verisign.com> <9aad0040-20f6-480e-90d6-090ca91c18d3@www.fastmail.com> <4A0925CB-23A7-492C-83C8-36EB23F61A1F@verisign.com>
Date: Thu, 25 Jul 2019 00:46:29 -0500
From: Patrick Mevzek <pm@dotandco.com>
To: regext@ietf.org
Content-Type: text/plain
Archived-At: <https://mailarchive.ietf.org/arch/msg/regext/RnQ1qe4ZbmsLnZPfmHkeeh28dYg>
Subject: Re: [regext] FW: New Version Notification for draft-gould-regext-secure-authinfo-transfer-00.txt
X-BeenThere: regext@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Registration Protocols Extensions <regext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/regext>, <mailto:regext-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/regext/>
List-Post: <mailto:regext@ietf.org>
List-Help: <mailto:regext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/regext>, <mailto:regext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Jul 2019 05:46:33 -0000

Hello James,

On Mon, Jul 8, 2019, at 14:16, Gould, James wrote:
> JG - The draft is a Best Current Practice (BCP) per RFC 2026, and not a 
> standards track draft.  The draft describes how to leverage the 
> existing EPP RFCs for addressing the security of the authorization 
> information value for transfers.  EPP can have protocol extensions 
> defined as informational and standards track drafts, as well as 
> operational practices defined as BCP drafts.  There are many examples 
> of IETF BCPs.  This topic is very applicable to the IETF and the REGEXT 
> working group in particular.

I will remain in disagreement here (mandating how registries should store passwords
or choose them regarding length and complexity
is certainly a bigger issue than just EPP and has nothing to do regarding how EPP
works as an exchange protocol between 2 entities), so I will only reply briefly as my
contributions will not help whatsoever building this draft and try
to refrain from participating in any future LC regarding this draft.

I would also suggest or offer the idea that various points in the draft
(like "the authorization information .... MUST NOT be stored by the registrar.")
do not align (which means: will never happen) with various registrars policies
or architectures.
That one for example shows itself in later parts:
   5.  Gaining registrar optionally verifies the authorization
       information with the info command to the registry, as defined in
       Section 4.3.
   6.  Gaining registrar sends the transfer request with the
       authorization information to the registry, as defined in
       Section 4.4.

Since both actions have no guarantee to happen back to back and immediately (nor to be done by the same subsystems, from the same EPP client, throught the same EPP connection),
the registrar MUST store the authorization somewhere.
Think about connection issues or delayed payment (wish to check authorization
information even before taking the payment and starting the transfer), etc.

As is, this document will create interoperability problems in part because
it does not even define an extension visible at greeting.
Without that, how could an EPP client know if the server follows point 4.1
for example, which is even more troublesome because of its MAY?
Without a clear indication, a client can continue sending a password, and
see its domain:create command be rejected, without even knowing why
(error reporting is not something  sufficiently standardized and stable across
all registries for a client to base itself on).
 
>     Things like that:
>     
>     > The operational practice will not require the client
>     >       to store the authorization information and will require the
>     >       server to store the authorization information using a
>     >       cryptographic hash.  
>     
>     How the password is stored and handled at the registry is completely
>     out of EPP scope. It could as well be symmetrically encrypted, and I fail
>     to see even how this can be enforceable (how will you verify remotely
>     how the registry stores the password?), as it is not protocol related.
>     
> JG - Why would the storage and handling of the authorization 
> information be out of EPP scope? 

Imagine a registry storing passwords as plain text
and another storing it encrypted through some clever mechanism deriving the key
from other registrars data (like its EPP password, that one never being needed
to echo back, so could be stored as an hash).

What does that change for EPP?
Absolutely nothing.

> Do you agree that a cryptographic 
> hash is more secure than using an encrypted value?

Irrelevant to EPP. The EPP schema clearly mandates for the passwords (both login and authInfo) to be exchanged in clear text (encapsulated in TLS of course).
One can see now that things should be done differently, and I could agree there.
But this has no relationship with how the registry stores it.

> JG - It's not meant to take into account all cases that exist today, 

That will then remain a big problem for me, as an implementer.

>     So in my views the current password based model per domain has died,
>     and other solutions have to be searched for. Maybe there is space to pursue
>     in solutions around OTP frameworks.
> 
> JG - You may want to take a stab at defining an alternative mechanism.  
> I believe that EPP does not need to be extended to make the 
> authorization information secure for transfers.  

Aside, remember that the current EPP schema already allows for authorization
to happen, not only by providing the domain authInfo but instead the authInfo
of a related contact (and its ROID to be able to pinpoint it).

And I seem to remember at least one registry to allow that. So definitively
rare but not 0 either.

> Any ideas that you have to improve it would 
> be greatly appreciated.

Maybe, but for me this work is not a good fit inside this working group
or even the IETF. It may be a better fit for some ICANN groups, in order
to deliver some "consensus policies" document (but remembering also at the same time that there is a world outside of gTLDs....). In my view the whole process around
transfers (and not just talking here about the EPP transfer command) should be reviewed
and reworked.

-- 
  Patrick Mevzek
  pm@dotandco.com