Re: [Rum] I-D Action: draft-ietf-rum-rue-03.txt

Brian Rosen <br@brianrosen.net> Thu, 24 September 2020 13:39 UTC

Return-Path: <br@brianrosen.net>
X-Original-To: rum@ietfa.amsl.com
Delivered-To: rum@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DD3F03A0A6E for <rum@ietfa.amsl.com>; Thu, 24 Sep 2020 06:39:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.888
X-Spam-Level:
X-Spam-Status: No, score=-1.888 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_HELO_NONE=0.001, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=brianrosen-net.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cfSBoHn-6SNb for <rum@ietfa.amsl.com>; Thu, 24 Sep 2020 06:39:34 -0700 (PDT)
Received: from mail-io1-xd36.google.com (mail-io1-xd36.google.com [IPv6:2607:f8b0:4864:20::d36]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 25F5A3A0C97 for <rum@ietf.org>; Thu, 24 Sep 2020 06:39:34 -0700 (PDT)
Received: by mail-io1-xd36.google.com with SMTP id d190so3344490iof.3 for <rum@ietf.org>; Thu, 24 Sep 2020 06:39:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=brianrosen-net.20150623.gappssmtp.com; s=20150623; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=eeE69LumU5hYC232w2CNM8XB2z+F70OLSJ98gGlBvTs=; b=amJGCDege1UVxuqxehpjvm70YUsSF3KYU9pNXaNjM5FluVRY0IfA9vekzw+6mCP4tv W2a0PbuZrkcOw+a+Rji1wnhNQlYNqDuueOecO6+kWMCfF1tdM3FhUyFgLsHtGJfymspM O+Md8p9VnMiNAMDF97E3vq4varriGxSC4Op2r1pdNfNctZ3ubNelKZgKPA3/lhMDiB42 DLYxJhfKFYMKgZFl9NvqFGTBYEMMn6Dk31nKA6EKTBrwlQK6Ns7Om14qVkC4eKiw/fi6 LNdIG06idW7dwnv4/tIGXgXBrPYngpJJZD5zBF+zvcsPYE3leVTWa1hJHb4K5F8N5ZhR Douw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=eeE69LumU5hYC232w2CNM8XB2z+F70OLSJ98gGlBvTs=; b=cHrTY3JgaUX3EhVLSdm2UFvzBVx9wAMFgEWO/bGPA/gplivqBZT4rSesD0nO3+dOcC /HH+GQBP2fsY+8csMKR7on5nIgJzXVHlXNNk07ZjhpaPKN7FP+JCRoQVgKDsjiAnm2Qp 2oC/po4YKcI6/rWWCjPmZjaM5yVpHpf6c7ywEDVzVdvUmPqvwPw6H6/+BJCoQ1QCUgB+ uC+1zbOI+4Ld02jfhQRsOUa4WRXGeE9+ROwpB7kx1berGWiEe9ZRjQjdQIkdfyZDPcdT veS8t0uSnZ9V8NLU33ROtm6URShcHQZwBv3BUM+f4t69QaZaDzkDpOGvSz+qMHrCNvXa 4xcg==
X-Gm-Message-State: AOAM531c/XEr7Mu7OcgsO7JxUZoBjzbh7EDD20E2ANaRSaAGF8CisAYN OkqZ906n8goN/hdvIUf64qZI2Q==
X-Google-Smtp-Source: ABdhPJy2tBFgj3MnaofKi/0R/X5l4E9GL918te1IgtDA5L2rhQCHmbkWEqsYNZcdost2xEszZ9W3sw==
X-Received: by 2002:a6b:8fc9:: with SMTP id r192mr3302476iod.24.1600954773234; Thu, 24 Sep 2020 06:39:33 -0700 (PDT)
Received: from brians-mbp-2871.lan (dynamic-acs-24-154-119-158.zoominternet.net. [24.154.119.158]) by smtp.gmail.com with ESMTPSA id p12sm1403764iom.47.2020.09.24.06.39.32 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Thu, 24 Sep 2020 06:39:32 -0700 (PDT)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.1\))
From: Brian Rosen <br@brianrosen.net>
In-Reply-To: <1600930740003.80867@purple.us>
Date: Thu, 24 Sep 2020 09:39:29 -0400
Cc: Paul Kyzivat <pkyzivat@alum.mit.edu>, "rum@ietf.org" <rum@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <5E0F41A3-A096-40C1-B055-3D33F76E7D84@brianrosen.net>
References: <1600679072074.473@purple.us> <13bd7883-da42-9c48-5cfe-8eaac47c8886@alum.mit.edu> <1600930740003.80867@purple.us>
To: James Hamlin <james.hamlin@purple.us>
X-Mailer: Apple Mail (2.3608.120.23.2.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/rum/_4ZmiwNzm9ZFTRCJmsRnazTqMFg>
Subject: Re: [Rum] I-D Action: draft-ietf-rum-rue-03.txt
X-BeenThere: rum@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Relay User Machine <rum.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rum>, <mailto:rum-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rum/>
List-Post: <mailto:rum@ietf.org>
List-Help: <mailto:rum-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rum>, <mailto:rum-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Sep 2020 13:39:37 -0000

Are there any solution proposals?

The solutions for this class of problem that I know about require a closed environment, where there is some trust (here between the environment creator and the providers), and there is some kind of signature on the code.  The environment refuses to execute code that is not signed, and checks the signature digest against the code digest.

We don’t have such an environment, so I am at a loss to suggest any solution.



> On Sep 24, 2020, at 2:58 AM, James Hamlin <james.hamlin@purple.us> wrote:
> 
> Hi Paul
> 
> Agreed, the background to this is that VRS Providers wish to provide controlled, limited access to 3rd party applications so as to protect their services from bad actors and misbehaving Apps. And I don't think a solution had been fully agreed.
> 
> Best regards
> 
> James
> 
> 
> James Hamlin
> Contractor
> Purple, a Division of ZP Better Together, LLC
> purplevrs.com
> The information contained in this e-mail message is intended only for the personal and confidential use of the recipient(s) named above. If you have received this communication in error, please notify us immediately by e-mail, and delete the original message.
> 
> ________________________________________
> From: Paul Kyzivat <pkyzivat@alum.mit.edu>
> Sent: 21 September 2020 15:47
> To: James Hamlin
> Cc: rum@ietf.org
> Subject: Re: [Rum] I-D Action: draft-ietf-rum-rue-03.txt
> 
> James,
> 
> Since you are the one VRS Provider person who regularly contributes
> here, can I ask you to help a bit more?
> 
> Back when we started this work with Henning several years ago a major
> concern of the providers was to find a mechanism to easily and cheaply
> restrict access to RUE implementations that have been tested/certified.
> The goal as I understand it was to avoid subjecting the provider systems
> to attacks. But to date we haven't identified a mechanism for doing this
> that actually works. At the moment there is nothing in the draft for that.
> 
> I have been arguing that web servers don't limit access to certified web
> browsers and they manage to survive. But still I am willing to entertain
> including a mechanism if we could find one that is workable.
> 
> Would you be willing to work on this with us? In particular, to start,
> identify the particular concerns and the level of effort that is/isn't
> acceptable to identify and reject uncertified clients.
> 
>        Thanks,
>        Paul
> 
> On 9/21/20 5:04 AM, James Hamlin wrote:
>> Brian
>> 
>> 
>> Thanks for the new draft.
>> 
>> 
>> I think the final sentence in section 5.2.5. "Emergency Calls" is out of
>> scope, as it tries to define the interface between the VRS provider and
>> the PSAP. From the rest of the text, the purpose of the data exchange
>> between RUE and VRS provider is already clear; the final sentence could
>> be dropped without detracting from the description of the RUM interface.
>> I propose dropping the text/: "Providers MUST implement Data Provider
>> and Service Information blocks as the call is forwarded to the PSAP."./
>> 
>> 
>> Best Regards
>> 
>> 
>> James
>> 
>> 
>> James Hamlin
>> Contractor
>> Purple, a Division of ZP Better Together, LLC
>> purplevrs.com
>> 
>> The information contained in this e-mail message is intended only for
>> the personal and confidential use of the recipient(s) named above. If
>> you have received this communication in error, please notify us
>> immediately by e-mail, and delete the original message.
>> 
>> 
> 
> 
> -- 
> Rum mailing list
> Rum@ietf.org
> https://www.ietf.org/mailman/listinfo/rum