Re: [regext] Benjamin Kaduk's No Objection on draft-ietf-regext-rdap-object-tag-04: (with COMMENT)

"Hollenbeck, Scott" <shollenbeck@verisign.com> Wed, 01 August 2018 12:51 UTC

Return-Path: <shollenbeck@verisign.com>
X-Original-To: regext@ietfa.amsl.com
Delivered-To: regext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0AAEF130E78; Wed, 1 Aug 2018 05:51:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.3
X-Spam-Level:
X-Spam-Status: No, score=-4.3 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=verisign.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W0QPtM62zRsR; Wed, 1 Aug 2018 05:51:40 -0700 (PDT)
Received: from mail1.verisign.com (mail1.verisign.com [72.13.63.30]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B6ECF130DFC; Wed, 1 Aug 2018 05:51:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=verisign.com; l=8268; q=dns/txt; s=VRSN; t=1533127900; h=from:to:cc:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version:subject; bh=WbUVNLVrqghEI2vThljXenQkJ6vL/ec5aGhVOwhuGlw=; b=BXK1zOQIty8dCpRw/Zh+m95mBNlr+qlSl8dSTtFerD6hrNwj3zTsqz0O lOe9Ars5mC4vVk3y79NhAwU2QJco4Fv1KJDubzJ8NDeWQu4X8GugnJWYj e6Bikw2IKi2TP6moYASp8ovHLd9iid7If1Okc/buzAqG+XwvKmTGUd5iP hPQXAJrfAhiGynOtXLqHqmz1jLFEkM1rT8AiE/E/2vGVQhMd7d+mdY61u dugx3V0Pz0HgBfEonTIWnp8nL28XZiWiL4CRVJzhagj0VI8PXEGKoUPd7 8f/GwvICT4x+2wEtLs2/m3ZTYQVL3FnJZ7KqaR95Yu/QiaddMdm9AFEMI w==;
X-IronPort-AV: E=Sophos;i="5.51,431,1526342400"; d="scan'208";a="7354355"
IronPort-PHdr: 9a23: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
X-IPAS-Result: A2EiAQAurGFb/zGZrQpRCg4LAQEBAQEBAQEBAQEBBwEBAQEBhDGBJwqaRoMukj6BZgsjhEkCg2E4FAECAQEBAQEBAgEBAoEFDII1JAGBQiwyPgEBAQECAToyDQwEAgEIEQQBAQEeBQsyHQgCBAENBQiDGYF3F7FrilMFiR+BQj6BEoMSgxsBAwKBKggVhWwCh3sMkhcDBgKIfoY0gVCEHogrhimJCkKCJgIEAgQFAhSBWIEDWBEIcIMFAQEygk2ISIUEOm8BjlGBGwEB
Received: from BRN1WNEX02.vcorp.ad.vrsn.com (10.173.153.49) by BRN1WNEX02.vcorp.ad.vrsn.com (10.173.153.49) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1466.3; Wed, 1 Aug 2018 08:51:37 -0400
Received: from BRN1WNEX02.vcorp.ad.vrsn.com ([fe80::7c0a:1cc:5def:9dde]) by BRN1WNEX02.vcorp.ad.vrsn.com ([fe80::7c0a:1cc:5def:9dde%4]) with mapi id 15.01.1466.003; Wed, 1 Aug 2018 08:51:37 -0400
From: "Hollenbeck, Scott" <shollenbeck@verisign.com>
To: "'kaduk@mit.edu'" <kaduk@mit.edu>, "'shollenbeck=40verisign.com@dmarc.ietf.org'" <shollenbeck=40verisign.com@dmarc.ietf.org>
CC: "'iesg@ietf.org'" <iesg@ietf.org>, "'regext-chairs@ietf.org'" <regext-chairs@ietf.org>, "'regext@ietf.org'" <regext@ietf.org>, "Gould, James" <jgould@verisign.com>, "'draft-ietf-regext-rdap-object-tag@ietf.org'" <draft-ietf-regext-rdap-object-tag@ietf.org>
Thread-Topic: [EXTERNAL] Re: Benjamin Kaduk's No Objection on draft-ietf-regext-rdap-object-tag-04: (with COMMENT)
Thread-Index: AQHUKNWV1rbi8S+F60e0id8VsCk9SKSqzDmQ
Date: Wed, 01 Aug 2018 12:51:37 +0000
Message-ID: <ed0f4e57eb3c496eb44b14486acbce76@verisign.com>
References: <153271389685.32575.14236059863408474169.idtracker@ietfa.amsl.com> <adec3bc5daa44c4db99afd97b8d1e5a1@verisign.com> <20180731135111.GE96369@kduck.kaduk.org>
In-Reply-To: <20180731135111.GE96369@kduck.kaduk.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.170.148.18]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/regext/_qk0vAF4Kbyf2Z05UV3J1dVAhY0>
Subject: Re: [regext] Benjamin Kaduk's No Objection on draft-ietf-regext-rdap-object-tag-04: (with COMMENT)
X-BeenThere: regext@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: Registration Protocols Extensions <regext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/regext>, <mailto:regext-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/regext/>
List-Post: <mailto:regext@ietf.org>
List-Help: <mailto:regext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/regext>, <mailto:regext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Aug 2018 12:51:43 -0000

> -----Original Message-----
> From: Benjamin Kaduk <kaduk@mit.edu>
> Sent: Tuesday, July 31, 2018 9:51 AM
> To: Hollenbeck, Scott <shollenbeck=40verisign.com@dmarc.ietf.org>
> Cc: 'iesg@ietf.org' <iesg@ietf.org>; 'regext-chairs@ietf.org' <regext-
> chairs@ietf.org>; 'regext@ietf.org' <regext@ietf.org>; Gould, James
> <jgould@verisign.com>; 'draft-ietf-regext-rdap-object-tag@ietf.org'
> <draft-ietf-regext-rdap-object-tag@ietf.org>
> Subject: [EXTERNAL] Re: Benjamin Kaduk's No Objection on draft-ietf-
> regext-rdap-object-tag-04: (with COMMENT)
> 
> On Mon, Jul 30, 2018 at 02:29:02PM +0000, Hollenbeck, Scott wrote:
> > (My email client sometimes does unexpected things with message
> > encryption. Sending again with plaintext assured...)
> >
> > > -----Original Message-----
> > > From: Benjamin Kaduk <kaduk@mit.edu>
> > > Sent: Friday, July 27, 2018 1:52 PM
> > > To: The IESG <iesg@ietf.org>
> > > Cc: draft-ietf-regext-rdap-object-tag@ietf.org; Gould, James
> > > <jgould@verisign.com>; regext-chairs@ietf.org; Gould, James
> > > <jgould@verisign.com>; regext@ietf.org
> > > Subject: [EXTERNAL] Benjamin Kaduk's No Objection on
> > > draft-ietf-regext-
> > > rdap-object-tag-04: (with COMMENT)
> > >
> > > --------------------------------------------------------------------
> > > --
> > > COMMENT:
> > > --------------------------------------------------------------------
> > > --
> > >
> > > I was a little surprised to see that this document targets BCP
> > > status, not Proposed Standard.  Was there much discussion of this
> question in the WG?
> > >
> > > Section 2
> > >
> > >    Service provider tags are concatenated to the end of RDAP query
> > >    object identifiers to unambiguously identify the authoritative
> > > server
> > >
> > > It seems like it is the combination of concatenation of the service
> > > provider tag, and the use of the rdap_objectTag_level_0
> > > rdapConformance attribute that provides the unambiguous property; I
> > > would like to see this caveat made more clear here.
> >
> > Thanks for the review, Benjamin. The rdapConformance attribute doesn't
> > do anything to identify the authoritative server. It's a clue to the
> > client that the server has implemented this particular practice.
> 
> Right, it's an indication that the server has implemented this practice.
> Absent such an explicit indication, the -XXXX tag could either be a
> service provider tag, or just a regular part of the query handle.  Thus,
> just the convention of an -XXXX tag by itself is *not* unambiguous.  So,
> I'm asking for some text to be added that qualifies the statement as only
> applying "when the client knows that this convention is in use" (or
> similar).

OK, so how about changing this line in Section 2?

OLD
Service provider tags are concatenated to the end of RDAP query object identifiers to unambiguously identify the authoritative server for processing an RDAP query.

NEW
In combination with the rdapConformance attribute described in Section 4, service provider tags are concatenated to the end of RDAP query object identifiers to unambiguously identify the authoritative server for processing an RDAP query.

> > > Also, per https://www.iab.org/2016/11/07/iab-statement-on-ipv6/,
> > > please consider using IPv6 addresses in the examples.
> >
> > The example copied into this document comes directly from Section 5.3
> > of RFC 7483. I'd prefer to keep it as-is to maintain consistency with
> > that cited reference.
> 
> I note that the IAB statement is not exactly binding, but also that at
> some point blindly propagating the same example into the future becomes
> stuck in a history that does not reflect the present.  (I also note that
> my ART colleagues are generally more active on this front than I am.)

I very much prefer to keep the example consistent with 7483 since it is included ONLY to show how addition of an object tag would change the example. I could strike other values from the example (including the IP addresses) if that would help.

> > > Section 5.1
> > >
> > > Are all provided URLs supposed to be functionally different?  If
> > > not, how do we tell which ones do what?
> >
> > Practice thus far in the RDAP bootstrap registries has been to
> > register http and https URLs. The scheme of the URL identifies the
> functional difference.
> 
> Perhaps indicate that they are expected to supply the same data, but may
> differ in scheme or other components?

OK, how about this change?

OLD
One or more URLs that provide the RDAP service regarding this registration.

NEW
One or more URLs that provide the RDAP service regarding this registration. The URLS are expected to supply the same data, but they can differ in scheme or other components as required by the service operator.

> > > Section 7
> > >
> > > Perhaps note that it is using IANA as a well-known central trusted
> > > authority in order to provide the property of allowing users to get
> > > RDAP data from an authoritative source?
> >
> > Sure, OK.
> >
> > >    [...] The method has the same security
> > >    properties as the RDAP protocols themselves.  The transport used to
> > >    access the IANA registries can be more secure by using TLS
> [RFC5246],
> > >    which IANA supports.
> > >
> > > Well, I don't know that "the same as" is quite right, especially
> > > given the following sentence.  The composed chain of "talk to iana,
> > > talk to referred RDAP server" depends both on the security of the
> > > connection to the RDAP server and that of the connection to IANA; it
> > > seems prudent to note that if TLS is used for the RDAP connection,
> > > TLS should also be used when talking to IANA, or even that TLS
> > > should always be used when talking to IANA.
> >
> > OK, how about this text?
> >
> > OLD:
> > This practice helps to ensure that end users will get RDAP data from
> > an authoritative source using a bootstrap method to find authoritative
> > RDAP servers, reducing the risk of sending queries to non-authoritative
> sources.
> > The method has the same security properties as the RDAP protocols
> themselves.
> > The transport used to access the IANA registries can be more secure by
> > using TLS [RFC5246], which IANA supports.
> >
> > NEW:
> > This practice uses IANA as a well-known, central trusted authority to
> > provide the property of allowing users to get RDAP data from an
> > authoritative source, reducing the risk of sending queries to
> > non-authoritative sources and divulging query information to
> > unintended parties.  Additional privacy protection can be gained by
> > using TLS [RFC5246] to provide data confidentiality when retrieving
> registry information from IANA.
> 
> I like the overall direction this is going, but have some quibbles.  For
> one, TLS is not just about confidentiality protection and privacy concerns
> -- it also provides integrity protection and authentication of the data
> source.  For consulting a central registry like this, the integrity
> protection and data authenticity seem to be potentially more important
> than confidentiality, at least from where I'm sitting.
> 
> I also think it's fine to retain some text about "the same security
> properties as the RDAP protocols themselves", when appropriately set into
> context.  Perhaps:
> 
> NEWNG:
> This practice uses IANA as a well-known, central trusted authority to
> allow users to get RDAP data from an authoritative source, reducing the
> risk of sending queries to non-authoritative sources and divulging query
> information to unintended parties.  Using TLS [RFC 5246] to protect the
> connection to IANA allows the server to authenticate itself as being
> operated by IANA and provides integrity protection for the resulting
> referral information, as well as providing privacy protection via data
> confidentiality.  The subsequent RDAP connection is performed as usual,
> and retains the same security properties of the RDAP protocols themselves.

OK, I'll make this change assuming that it addresses Warren's feedback as well.

Scott