[regext] draft-ietf-regexy-login-security

"Martin Thomson" <mt@lowentropy.net> Wed, 13 November 2019 00:57 UTC

Return-Path: <mt@lowentropy.net>
X-Original-To: regext@ietfa.amsl.com
Delivered-To: regext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9B9691200C1 for <regext@ietfa.amsl.com>; Tue, 12 Nov 2019 16:57:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level:
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=lowentropy.net header.b=ueSCfagn; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=FQhNsvwW
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NHjgxssECFTU for <regext@ietfa.amsl.com>; Tue, 12 Nov 2019 16:57:36 -0800 (PST)
Received: from out5-smtp.messagingengine.com (out5-smtp.messagingengine.com [66.111.4.29]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C4971120091 for <regext@ietf.org>; Tue, 12 Nov 2019 16:57:35 -0800 (PST)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.nyi.internal (Postfix) with ESMTP id 2899321FE0 for <regext@ietf.org>; Tue, 12 Nov 2019 19:57:35 -0500 (EST)
Received: from imap2 ([10.202.2.52]) by compute1.internal (MEProxy); Tue, 12 Nov 2019 19:57:35 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lowentropy.net; h=mime-version:message-id:date:from:to:subject:content-type; s= fm3; bh=SJlGD07n0OqdryAdyIO8PR+jNdFQqDUGwa7v7vML+Uc=; b=ueSCfagn ZrJHoyjl4jVffYWp2mLNMogfzDrpChKIShAU5dpq3KupK/ONEeNgdUfJSkL6ORT9 1DIVXUzvtF6q/QrqipkfZQvNTL6sKIzRK7xr/k5FKDSC20YALpytGw4W0sc+Eyt8 ZkXfXZCxvUCwKwzSPcUS09bO96wf4Q4W4WDHdKrXwLyiXQYeyUCj/9a74rBjkg5B H3M4CEXJFaBHd21mdLGAx9CxBX9DL7V08wyCtYjhMwgSH84KefHuJ+vjWuxJO8CJ L1+C8BjqJozPTunz9j9be71XsCmLAPZAagFq8BaTdmvsB9iB/NfCl2pEbw7yAIB0 2Od9WOx+I4bBvg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:message-id :mime-version:subject:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm1; bh=SJlGD07n0OqdryAdyIO8PR+jNdFQq DUGwa7v7vML+Uc=; b=FQhNsvwW+rf/Kqb2e9j3o03S7lgyOsQl7+4mcEUpdKjkD 5XWP2lL28i/h4Xv8oiBtbwnJrdSR05mA+HqDTH+Ne/XaI7ZaYRDN8lRFNHjXHisb dR+WM1q+QXLrN1Ml9U7ydDmb4qcjPHxul7HY/UeW/MbMDSHyrNYwBzU33j0C5HZ8 xjYvbT2WYI+JCntwq6GzCEnPTTjSY5wNCZQz7NfKGYRWKe8JnomZiHSjBRI+OZgm ScaDqwneCKVrTihHjw9d0GFYBlQb8kGBxOgFEbKRXalpJCVikMIbiInylTqp/uLO wUAAVVtCh6NdoClLtJ2gy323bJf0Auo736e3nMBjA==
X-ME-Sender: <xms:_lTLXZ6MOsIux2Baf5DOr_JA7XGRy40z7FxnTJjbX9wiuhTxsjYQ1Q>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedufedrudeftddgvdelucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucenucfjughrpefofgggkfffhffvufgtsehttdertd erredtnecuhfhrohhmpedfofgrrhhtihhnucfvhhhomhhsohhnfdcuoehmtheslhhofigv nhhtrhhophihrdhnvghtqeenucfrrghrrghmpehmrghilhhfrhhomhepmhhtsehlohifvg hnthhrohhphidrnhgvthenucevlhhushhtvghrufhiiigvpedt
X-ME-Proxy: <xmx:_lTLXXnfM9isjiUy2otUNMKN1BuBEseMylmuhFfypyeOKsSIO9qkAg> <xmx:_lTLXbhDYMlynYKqmEQsQp0tHYmpFDSAMezlimuFKOsK-Xkrih7Vpg> <xmx:_lTLXSL3RJvXkhtcbSl507xPvLQIkKDyWwhZ_ZX4QdMMXIVYcKtMLQ> <xmx:_1TLXVgK2aq33_ZNar6ZKa8D608bXW9T7tFf6DHJUBafV6btcEtBqA>
Received: by mailuser.nyi.internal (Postfix, from userid 501) id 89381E00AA; Tue, 12 Nov 2019 19:57:34 -0500 (EST)
X-Mailer: MessagingEngine.com Webmail Interface
User-Agent: Cyrus-JMAP/3.1.7-557-g34fce02-fmstable-20191113v1
Mime-Version: 1.0
Message-Id: <406eac6f-f908-4944-8f43-16df858b182f@www.fastmail.com>
Date: Wed, 13 Nov 2019 11:57:11 +1100
From: Martin Thomson <mt@lowentropy.net>
To: regext@ietf.org
Content-Type: text/plain
Archived-At: <https://mailarchive.ietf.org/arch/msg/regext/gHR7KYI1WMCLGJe781mvom_AZdg>
Subject: [regext] draft-ietf-regexy-login-security
X-BeenThere: regext@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Registration Protocols Extensions <regext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/regext>, <mailto:regext-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/regext/>
List-Post: <mailto:regext@ietf.org>
List-Help: <mailto:regext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/regext>, <mailto:regext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Nov 2019 00:57:38 -0000

In reviewing the IANA registrations for this draft, I noticed a design issue that I think the working group needs to discuss more.

>From a strictly schema perspective, the whitespace normalization requirements for token will likely have implications for usability of passwords that include spaces on the <pw> and <newPW> elements.  That's a problem for manually constructed messages, so it would be a minor comment.

However, that would ignore the fact that use of plaintext passwords is not a good practice.  Even if this is merely revising something from RFC 5730 to extend their length (which is fine in isolation), I think that the working group needs to more fully consider.  Though it remains common, relying on password-based authentication is generally regarded as a failing; though it might be unavoidable, most authentication systems try to avoid it, or only use passwords as a way to step up to something stronger.  Sending passwords in cleartext in protocols is regarded as a serious exposure in most systems.  Even passing hashed and salted passwords has risks that mean that is generally avoided where possible.

For a protocol of this nature, it seems like alternative methods could be developed.  And if passwords are unavoidable for usability reasons I can't see right now, then the CFRG is developing password-based authentication protocols that might be suitable for this.  Or there are protocols like OAuth that might allow for delegation.