Re: [regext] CALL FOR ADOPTION: draft-gould-regext-secure-authinfo-transfer

"Patrick Mevzek" <pm@dotandco.com> Tue, 28 January 2020 16:30 UTC

Return-Path: <pm@dotandco.com>
X-Original-To: regext@ietfa.amsl.com
Delivered-To: regext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F1C2F12018D for <regext@ietfa.amsl.com>; Tue, 28 Jan 2020 08:30:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=dotandco.com header.b=bD3aBNgE; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=A0gNN3Me
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id chORHkQS-Nqk for <regext@ietfa.amsl.com>; Tue, 28 Jan 2020 08:30:32 -0800 (PST)
Received: from out2-smtp.messagingengine.com (out2-smtp.messagingengine.com [66.111.4.26]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CEA5D12003E for <regext@ietf.org>; Tue, 28 Jan 2020 08:30:31 -0800 (PST)
Received: from compute3.internal (compute3.nyi.internal [10.202.2.43]) by mailout.nyi.internal (Postfix) with ESMTP id 80AAB220D5 for <regext@ietf.org>; Tue, 28 Jan 2020 11:30:30 -0500 (EST)
Received: from imap1 ([10.202.2.51]) by compute3.internal (MEProxy); Tue, 28 Jan 2020 11:30:30 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dotandco.com; h= mime-version:message-id:in-reply-to:references:date:from:to :subject:content-type; s=fm2; bh=e7Leu9UiIcCRHys3CdRVXN1eRq2CbLb SpRAh7IKy/W4=; b=bD3aBNgEQ4EOvtULcNs53KThq7418C9j+rRskBYqEWNwqYm nMvQ4mbt8AcdP5C+XloqKIA24GMDyOL0KuibajoBAfRDKU+4Vwm0UD1mQRy75NtY KDkh/5gsZm/Wu56YGyVALrjttJbqsuUFW0K49/IKT8kd9bEY/QiTFCiUPTZNEoKz kAqrhlhFOxrsSjvhvSNmJil0o2bDLvD7C+uKSgFTpm69C77crWXo3r1/GuPytJAw smpYnTfApFQ3MrjrT6BWHTDvqet99FjdwtEYg6iICAh4AI0FMaMlO74j04M4H9GM +dUwCKVyWMAp8Vd23BNgBLeb9QsRDu+pnmckzoA==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-proxy :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm1; bh=e7Leu9 UiIcCRHys3CdRVXN1eRq2CbLbSpRAh7IKy/W4=; b=A0gNN3MeNFc5JCu1d7i68R CY7ZAj2OOzSZp/e+KvnRxRxvQ9nB5K3dzfefToX1iooL2WF+TgPogKifxu6LjkkZ 6TPHex2T/swjFOf5YLN2M3F0L9b1rRUVLDOmgmgnJJHedSZBfymdV/cQNRiuxNiN i3ElxDeLWcoMEFbabe6m8MgXgEROqXo159jCwlF5m7in9ySJrOcVomxPMqD92wvq 75AZlPnb5CAvBMSfokZ21JTb1AIu6UuW0fvCgYSuOQ0hKJWuEfgD6+kcDnE6YDUe b/fubcyrTuWe5OPwG80Ht+JmaraedQfh9GHJP3pJjeHnsJFEP+H9kYazwzzoBSNw ==
X-ME-Sender: <xms:pmEwXr5TtByDaaDSRO_EyaLlB3mX2qy5jrDwf8q6AlTwS2_fjsDgqmm2dmM>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedugedrfeeggdekfecutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecunecujfgurhepofgfggfkjghffffhvffutgesthdtre dtreerjeenucfhrhhomhepfdfrrghtrhhitghkucfovghviigvkhdfuceophhmseguohht rghnuggtohdrtghomheqnecuvehluhhsthgvrhfuihiivgeptdenucfrrghrrghmpehmrg hilhhfrhhomhepphhmseguohhtrghnuggtohdrtghomh
X-ME-Proxy: <xmx:pmEwXufwsSa9czNJtIe60FLgxrdQ4-Xmgnf6gYZughiZbzDyAvBmmA> <xmx:pmEwXrcUiYwspNZYk8TQ5SXsQwUlPIxcdyEjZxOqeTyUaRCFxWtB7g> <xmx:pmEwXnAY0U3pB2AUwHPEYEKyV_VheSYcOjDTo6KsfqROwBv-oueXEQ> <xmx:pmEwXiULDDWbDIVBi8OrE9dvqeTpRRJz9hWmbfNoOqohpSLMIwXiMw>
Received: by mailuser.nyi.internal (Postfix, from userid 501) id 7E3F1C200BD; Tue, 28 Jan 2020 11:30:29 -0500 (EST)
X-Mailer: MessagingEngine.com Webmail Interface
User-Agent: Cyrus-JMAP/3.1.7-781-gfc16016-fmstable-20200127v1
Mime-Version: 1.0
Message-Id: <d0e2ab9c-6825-4926-9613-168132130559@www.fastmail.com>
In-Reply-To: <9D3A8ECD-976A-469E-B5B0-6FD6B8BB8BE0@verisign.com>
References: <3498D60D-AED3-448F-AA97-D5390E14938F@antoin.nl> <894ec029-7ef0-4c02-8b37-9872e8f5934b@www.fastmail.com> <9D3A8ECD-976A-469E-B5B0-6FD6B8BB8BE0@verisign.com>
Date: Tue, 28 Jan 2020 11:30:06 -0500
From: Patrick Mevzek <pm@dotandco.com>
To: regext@ietf.org
Content-Type: text/plain
Archived-At: <https://mailarchive.ietf.org/arch/msg/regext/V1wfhhUQvBP-vFMIuL1vuuOhwqM>
Subject: Re: [regext] CALL FOR ADOPTION: draft-gould-regext-secure-authinfo-transfer
X-BeenThere: regext@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Registration Protocols Extensions <regext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/regext>, <mailto:regext-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/regext/>
List-Post: <mailto:regext@ietf.org>
List-Help: <mailto:regext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/regext>, <mailto:regext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Jan 2020 16:30:34 -0000

On Tue, Jan 28, 2020, at 11:00, Gould, James wrote:
> JG - You have brought this up before, but the adoption of a BCP draft 
> by the WG is certainly applicable. 

I remain unconvinced, and would advocate that this draft, if going forward,
is *at best* EXPERIMENTAL, and certainly not BCP.

Again, there are multiple models of transfers out there. No one can say,
and specifically not at the protocol level, that one is flat out better
than another. The fact that the current situation has to be amended regarding
passwords (the whole purpose of the draft) clearly shows the current
"most common" case is far from being perfect.
Hence, whatever is written here can not be a BCP.
And everything related to password storage, complexity, entropy, etc. should
not be in a specification coming out of the REGEXT working group. Coming out of IETF,
maybe. But just not from this group.

I am just advocating to take all of that into account, instead of taking
one case and declaring this is the only way to do it (while it is obviously
not true on the field), because this is exactly why EPP is so fragmented today.

>     The authInfo node was defined from the ground up to be extensible,
>     and we should leverage that to put into place better mechanisms than
>     current plain text passwords.
> 
> JG - An alternative approach is not mutually exclusive and I look 
> forward to any proposals that you may have.

I think I gave multiple ideas (which can of all boil down to: let us step back and think about passwords in general instead of fixing current situation with workarounds; this is the same problem I have with login-security extension), but I won't work on those alone if no one 
is interested. Yet, they exist, as I am sure others not even written yet.

But, even if they do not exist, this does not give an immediate green light
to what is proposed here. However in order not to rehash things I will stop here
for now, and maybe participate in further discussions when/if the draft is adopted
by WG which seems plausible.

In its current form however I would clearly voice my concerns against BCP status.

> JG - Any input from interested parties is welcome.  The main question 
> is whether other models can be fit into a common practice or whether 
> they stand on their own.   

At this stage, this is not what interests me, and if concerned parties
do not want to participate here they may have their reasons (starting with not feeling
to be taken into account, I guess, I do not know I do not speak for anyone).
My concern is just to show that there are multiple ways to operate, that must
have a reason and that should make us think at the protocol level how to handle
all that instead of "patching" the current password situation.
     
> JG - One goal of enhancing the security of the authorization 
> information for transfers is to reduce or remove the dependency on the 
> use of RDDS.  

This may need to be expressed in the draft then.
 
> JG - draft-gould-regext-secure-authinfo-transfer focuses on the 
> behavior of the info command and response as it relates to verifying 
> the authorization information value and disclosing whether the 
> authorization information is set in the info response to the sponsoring 
> or non-sponsoring registrar.  Defining a BCP would help to make things 
> more consistent.  draft-gould-regext-secure-authinfo-transfer does not 
> cover what elements are returned in a full or partial info response.  

This may be a little contradictory with the goal of reducing dependency of 
RDDS. If the business side of things mandates to send emails to contacts,
and if nothing nowhere is said about replies to domain:info from
non sponsoring registrar, then you are back at basically the current situation.

> My thought is that if the valid authorization information is provided 
> by a non-sponsoring registrar that the full info response should be 
> returned. 

Maybe. I am just saying (observing) that it is not the case today.

Here is a non-scientific sample of responses to domain:info from non sponsoring
registrar with correct authInfo:

- all data but no authInfo, nor any date
- all data but no authInfo
- error code 2201
- all data but no contact IDs
- all data but authInfo value replaced with a placeholder
- error code 2306
- all data, but no expiration date
- and of course, "sometimes" :-) all data including the authInfo

(the problem for a registrar trying to validate a password is the following: on what
criteria(s) to separate "successful domain:info because good authInfo" from "successful
domain:info because all of them are successful by default, sponsoring registrar or not,
valid authInfo or not" <- yes this case exists, and not just once, and again with
some filtering on what is returned)

You can say they are all violating the specification.
My problem is: even if that is true, it does not change anything on the field,
in real life.
Nothing will change in current responses, and no document, even BCP, will make
registries change behavior, if there are no good reasons/generic framework/clear push
from registrars that are very silent in this WG/etc.

Maybe at some point, as controversial it might be, it would make sense to start working
on "epp-2.0" or at least "domain-2.0".

HTH,

-- 
  Patrick Mevzek
  pm@dotandco.com