Re: [rtcweb] Security-arch IdP determination issue/DISCUSS

"Martin Thomson" <mt@lowentropy.net> Wed, 24 April 2019 04:35 UTC

Return-Path: <mt@lowentropy.net>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D4C1E1201B2 for <rtcweb@ietfa.amsl.com>; Tue, 23 Apr 2019 21:35:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=lowentropy.net header.b=ZetWJTo2; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=MIjWDT9C
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 39tFhR5Ij5Ps for <rtcweb@ietfa.amsl.com>; Tue, 23 Apr 2019 21:35:26 -0700 (PDT)
Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com [66.111.4.25]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DFA02120106 for <rtcweb@ietf.org>; Tue, 23 Apr 2019 21:35:25 -0700 (PDT)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.nyi.internal (Postfix) with ESMTP id 4254E21B5A for <rtcweb@ietf.org>; Wed, 24 Apr 2019 00:35:25 -0400 (EDT)
Received: from imap2 ([10.202.2.52]) by compute1.internal (MEProxy); Wed, 24 Apr 2019 00:35:25 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lowentropy.net; h=mime-version:message-id:in-reply-to:references:date:from:to :subject:content-type; s=fm2; bh=9Tqhl7vufNC5DRvsTVorwKotdXvr5YJ 7Lo40z0QA35o=; b=ZetWJTo2VUpNiRjTx5/xHtU73gMwKwcIr3aDbU1ZRnIISbC O1sZVRUH/mZPOMNvOkWWrjAT/U0dXzUi+tiwn10ZSm2QxRV5aMyF2FepDXyq4j89 SvDlJCuhg7CmP0pHEWQ9N+hxs/O4M9XHyjXFmxMx4ppEIkKi0BEWwGRERj8ukbLi +6jGBSySpbLJgH9gYobjCZ59xpRom0CUYUo8eiYuiAqgvfrfOky05QYAQRDgGRw5 ga6vIaBF2NnAbod0/Re477w48yHRXs2ixIp+yohpoOgOBILswCmAf7/6N9+oj3y/ InQgUqRHmMU4jXKqGl6SgnZV1n3Q9YXqiyjbfzA==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-proxy :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm2; bh=9Tqhl7 vufNC5DRvsTVorwKotdXvr5YJ7Lo40z0QA35o=; b=MIjWDT9CKf8WfdcojIiqOf b4Ce1646RYEHcPOmKIpyABr/G7vUaH5WD8HpDmbgx01d3nAuyEm/awjPvmN29VbM ISWgxWUMItjulQxdCCFwbExhaxSSeDqb63blJObKTGQ/DPrp9j1j3cUYRyl64JEb AtTr4TBRgt+GfNw4w9BjHW5Ulj0SdysGKJzWznbIZirLqlAIKOFVTbJyaG88/QwH R0ppJ7p8Ix+JxKzRfAu0rBgn+PR9Cuq4wXwcS6wfjdFoj+95mt/EzmUQepyOHGCZ i5vvUkaqhIOnvq8zVW4uUAVuIq1H+30Gp5914zuG+CQkNSFRgWqpfSs2exPGmBbw ==
X-ME-Sender: <xms:jOe_XON-oi4RyEwgchA4pLOmtR7U_5aEgsD7A1kNn2QGO3q5HOh7Kg>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduuddrgeelgdekhecutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecunecujfgurhepofgfggfkjghffffhvffutgesthdtre dtreertdenucfhrhhomhepfdforghrthhinhcuvfhhohhmshhonhdfuceomhhtsehlohif vghnthhrohhphidrnhgvtheqnecuffhomhgrihhnpehivghtfhdrohhrghenucfrrghrrg hmpehmrghilhhfrhhomhepmhhtsehlohifvghnthhrohhphidrnhgvthenucevlhhushht vghrufhiiigvpedt
X-ME-Proxy: <xmx:jOe_XElUTiCpois8oIkoXCebJh6bzplRbcGJdd9bNuF12463SocutA> <xmx:jOe_XC50yLAppBqn_JNxRWqZp-U2s2HOxb3jGIdNrAEJxuoyaVYkRw> <xmx:jOe_XI2Jr-_al5dzs6xlcXiVwdqBg-PnhV742eEUwx2uEcu7_zgmHg> <xmx:jee_XJS-0NGb4tO7keAyjOa2O20mv5WXqLjHOL6Ud44gvdNRrl92dw>
Received: by mailuser.nyi.internal (Postfix, from userid 501) id 8DCFD7C199; Wed, 24 Apr 2019 00:35:24 -0400 (EDT)
X-Mailer: MessagingEngine.com Webmail Interface
User-Agent: Cyrus-JMAP/3.1.6-444-g755619f-fmstable-20190423v1
Mime-Version: 1.0
Message-Id: <7b879787-78b3-4c4f-81c9-e78958b8597f@www.fastmail.com>
In-Reply-To: <CA+9kkMCUVwC-uRe_pR2_M2DgNDfxCNNRihRApPzCji4PaeJtKg@mail.gmail.com>
References: <CA+9kkMCUVwC-uRe_pR2_M2DgNDfxCNNRihRApPzCji4PaeJtKg@mail.gmail.com>
Date: Wed, 24 Apr 2019 00:35:24 -0400
From: Martin Thomson <mt@lowentropy.net>
To: rtcweb@ietf.org
Content-Type: text/plain
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtcweb/pPpQ4CsMiWbw9YoBA_1Sug5HxHw>
Subject: Re: [rtcweb] Security-arch IdP determination issue/DISCUSS
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtcweb/>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Apr 2019 04:35:28 -0000

On Wed, Apr 10, 2019, at 04:00, Ted Hardie wrote:
> In section 7.5 of the Security-arch draft, the document says:
> 
> Authority:  The authority [RFC3986 
> <https://tools.ietf.org/html/rfc3986>] at which the IdP's service is
>       hosted.  Note that this may include a non-default port or a
>       userinfo component, but neither will be available in a certificate
>       verifying the site.
> 
> Benjamin Kaduk raised a DISCUSS on this:
> > I'm a bit unclear about how the port in the 
> > IdP URI's Authority (Section 7.5) would get 
> > discovered. If it can be remotely supplied, 
> > there may be risks in just trusting blindly 
> > whatever value is received.
> 
> Given that we discover this via a .well-known location which is meant 
> to be deterministic, I went looking for the more general .well-known 
> advice on this topic. Turns out that the updated version in 578bis 
> <https://tools.ietf.org/html/draft-nottingham-rfc5785bis-09#page-2> has 
> this:
> 
> > Typically, applications will use the default port 
> > for the given scheme; if an alternative port is 
> > used, it MUST be explicitly specified by the 
> > application in question.
> 
> Obviously, our doc predates 5785bis, but given the discuss and that 
> advice, I think the right thing to do here is to drop the ability to 
> have a non-default port or to specify an alternate port.
> 
> Is there anyone currently using this with a non-default port?
> 
> Any objections to dropping this or preferences for specifying an alternate port?

I hope that this also includes dropping the userinfo part, so that this is just the host portion (https://tools.ietf.org/html/rfc3986#section-3.2.2).

Firefox does support the port number, but I'm not aware of anyone using it.  As Cullen points out, getting a unique name is not the biggest barrier to deployment.  You might even argue that there is a security benefit in that arbitrary ports can be used to assert identities.