[saag] Fwd: New Version Notification for draft-richer-vectors-of-trust-07.txt

Sean Turner <sean@sn3rd.com> Mon, 12 March 2018 19:11 UTC

Return-Path: <sean@sn3rd.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E3C89126CD6 for <saag@ietfa.amsl.com>; Mon, 12 Mar 2018 12:11:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=sn3rd.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PDYGSfFY2p_E for <saag@ietfa.amsl.com>; Mon, 12 Mar 2018 12:11:06 -0700 (PDT)
Received: from mail-pl0-x235.google.com (mail-pl0-x235.google.com [IPv6:2607:f8b0:400e:c01::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4B067126CC4 for <saag@ietf.org>; Mon, 12 Mar 2018 12:11:06 -0700 (PDT)
Received: by mail-pl0-x235.google.com with SMTP id m22-v6so9892505pls.5 for <saag@ietf.org>; Mon, 12 Mar 2018 12:11:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sn3rd.com; s=google; h=from:mime-version:subject:date:references:cc:to:message-id; bh=1iaPAogEKrVZEAaGa6ktefvilVTGKHOulfwxxGnqpZU=; b=HkRMLJW1nmhK5Gp87ZdAo4LxgSeila83D7Y2Om6shj8OS15Wkzrty1b1suEnQ/xP3c bZOuajKyorWZ6bwe8vmEVbHVJJJmEyWRb4+r/1B5Q1jgDrmqx4UZpDmwFh2PsG1fusH7 xR6BoMOheuAqnM7BJrTLct+JCR/IrwjzEtuWc=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:mime-version:subject:date:references:cc:to :message-id; bh=1iaPAogEKrVZEAaGa6ktefvilVTGKHOulfwxxGnqpZU=; b=WUKqADt1GaIRM5HPayS90ImgMEjqUpgyOrBN+XJnMApQGx7u7SWKGwSnxkb8i13bxP q0tidwOdNGZR9ARFClhXlRXQp4xMH7q1yq+xn6IcA6nKN1uv7LlETo0ucI/UoPotuWz1 mwuPuTOR6iRXxdC3QfE8oiJofSB1mUUHoqMopfDU/Toy0ClRJfbidYQ5hb3AL7M407/d tBqAU3dlFLGpyMp2R0dzKvuiIbPZT9DQewJUmafuo1PHP5WRDYcSDiIJ0dmnMF0gx9DJ QWqAT5XLJPekqIdxAfHEe9IZGp2Yxj/5L0eJmvQKdG0PFXbw9/rlZrbYg8xdFiCjmCCi bJlQ==
X-Gm-Message-State: AElRT7Hi7f/L/H64RleP5NvncUDZASIlIfaXI9U2BRByZAJmQ4ZrDiEh ikfADn013YvGpiLKG6GIT88DqPd2v9o=
X-Google-Smtp-Source: AG47ELuHTqpeWwg5sz5RSXAVwpROA92+C08fuCCpu5b5Gc20jJkK0bf9TrxjqfpVY4OKTnq5JNnHwA==
X-Received: by 2002:a17:902:341:: with SMTP id 59-v6mr3298452pld.407.1520881865682; Mon, 12 Mar 2018 12:11:05 -0700 (PDT)
Received: from [5.5.33.116] (vpn.snozzages.com. [204.42.252.17]) by smtp.gmail.com with ESMTPSA id d70sm18307188pfl.119.2018.03.12.12.11.03 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 12 Mar 2018 12:11:05 -0700 (PDT)
From: Sean Turner <sean@sn3rd.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_7971FCCE-14B0-4658-8EE7-A8C5082DCCF7"
Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\))
Date: Mon, 12 Mar 2018 19:11:01 +0000
References: <202944E0-CBED-465B-A55F-A6F1BE4E3F10@mit.edu>
Cc: draft-richer-vectors-of-trust@ietf.org
To: saag@ietf.org
Message-Id: <EBA69A3C-4984-4BEB-A230-4AA40791895B@sn3rd.com>
X-Mailer: Apple Mail (2.3445.5.20)
Archived-At: <https://mailarchive.ietf.org/arch/msg/saag/zBnO2zwV02eVnbe7tYU-oCOy4AU>
Subject: [saag] Fwd: New Version Notification for draft-richer-vectors-of-trust-07.txt
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Mar 2018 19:11:10 -0000

Messages related to draft-richer-vectors-of-trust.

> Begin forwarded message:
> 
> From: Justin Richer <jricher@mit.edu>
> Subject: Re: New Version Notification for draft-richer-vectors-of-trust-07.txt
> Date: March 12, 2018 at 19:09:35 GMT
> To: Sean Turner <sean@sn3rd.com>
> Cc: Leif Johansson <leifj@sunet.se>
> 
>>> On Mar 12, 2018, at 18:07, Justin Richer <jricher@mit.edu <mailto:jricher@mit.edu>> wrote:
>>> 
>>> Hi Sean, thanks so much. Responses inline:
>>> 
>>>> On Mar 12, 2018, at 1:46 PM, Sean Turner <sean@sn3rd.com <mailto:sean@sn3rd.com>> wrote:
>>>> 
>>>> Sorry just found the gh repo in an old mail … I can put in PRs if you want on the nits.
>>> 
>>> Yes please, that would be great. Feel free to do it as just one PR or several, whatever’s your preference.
>> 
>> I will try my best to not screw up the xml.
>> 
>>>> spt
>>>> 
>>>>> On Mar 12, 2018, at 17:33, Sean Turner <sean@sn3rd.com <mailto:sean@sn3rd.com>> wrote:
>>>>> 
>>>>> Here’s my review of draft-richer-vectors-of-trust (should I send this someplace else too -secdir?):
>>>>> 
>>>>> tl;dr: I like the idea after I got over my RBAC flashbacks!
>>> 
>>> I totally get that, and since this work is meant to stand in contrast to RBAC if there’s a way we can make that clearer then that would be good.
>> 
>> After we exchanged those emails earlier I was wondering if the RBAC-flashback was a good thing or a bad thing.  I come to think it was a good thing because it definitely gets you thinking about what worked and what didn’t.
>> 
>>>>> I’ll be honest that at first I was like here we go again, but I do like that you managed to keep it to only 4 vectors initially and allow it to be expanded later.  I thought the recommendation for the second marker (alpha vs numeric) was pretty much what I would have done: P needs to have # the others not so much.  Not that for the same reasons you did C0 you could also do A0 - it is a “No”.
>>> 
>>> What would an A0 be, though? An unsigned assertion? C0 is something you might want to communicate (we did nothing in particular but there’s a user here maybe) but I’m not seeing the value in A0.
>>> 
>>> As another example of how this works, NIST’s implementation uses both alpha and numeric for all their categories, requiring numeric for base values and adding alpha values as optional additional info on top of the category the number represents. 
>>> 
>>> https://github.com/usnistgov/800-63-3/blob/volume-d/sp800-63d/vot_mapping.md <https://github.com/usnistgov/800-63-3/blob/volume-d/sp800-63d/vot_mapping.md>
>> 
>> I was simply thinking about 0 = None/No.  I don’t think you have to change it to make all of the ones with no checks 0.
>> 
>>>>> 
>>>>> I was initially a little confused about it being standards track because it’s specifying a framework, but you are specifying a wire format so that seems okay in my book.
>>> 
>>> I’m fine with whatever target is recommended but it feels standards track to me. 
>> 
>> Like I said initially I was like oh it’s a framework, but once you started defining stuff that gets sent on the wire well I can go with standards track.
>> 
>>>>> Question in s3.4: When you say “such as a session cookie in a web browser” you talking about HTTP’s cookies right and not TLSs?
>>> 
>>> Yes, HTTP cookies. We can add text to make that more explicit. 
>> 
>> I can slap that in my PR.
>> 
>>>>> The IANA considerations section looks fine.  I assume you two would offer to the Des?
>>> 
>>> Yes. I volunteer and I’ll gladly volunteer Leif.
>> 
>> I guess this is more for the ADs to know there’s a pool of candidates waiting to that the lead :)
>> 
>>>>> I can see some asking for more information for the Sec/Priv sections, bit honestly what you got there is pretty much it: don’t send these things in the clear, bind them with cryptography, and don’t share too much otherwise you’ll give away something you might not have meant to.   So, in my book that’s probably good enough.
>>> 
>>> I found it hard to draw out much more than what we’ve got in there, especially in privacy because this is by its nature identifying information. Happy to expand if anyone’s got a good suggestion.
>> 
>> I think this is exactly the right way to play it.  You could write a novel here, but instead hit the hi points.  When somebody says what about blah you can point them at the gh repo and PRs welcome ;)
>> 
>>>>> Nits: 
>>>>> 
>>>>> 0) Update to match the new terminology paragraph:
>>>>> 
>>>>> The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
>>>>> NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
>>>>> "MAY", and "OPTIONAL" in this document are to be interpreted as
>>>>> described in BCP 14 [RFC2119] [RFC8174] when, and only when, they
>>>>> appear in all capitals, as shown here.
>>> 
>>> Sounds fine.
>> 
>> Can do.
>> 
>>>>> 1) s5.1: vtr vs votr?  I know everybody loves the 3-letter once but it make more sense that vot is the request and votr is the response.  I’m in no way going any where near a mat to argue this point though.
>>> 
>>> The JWT community loves the three-letter fields so we went with this. If we were to change it (which I’d kinda rather not) I’d instead go with “vot_req” to expand it out. 
>> 
>> Ah I get that - no need to change it.
>> 
>>>>> 2) s8: sentence end abruptly:
>>> 
>>> I think it’s just missing a reference target which rendered funny
>> 
>> I’ll leave this one to you because I’m not sure where it’s supposed to point.
>> 
>>>>> 3) I think both SP-800 references are missing something.
>>> 
>>> Possibly, I wasn’t sure how to best pull those in.
>> 
>> I’ll see what I can dig up and put it in the PR.
>> 
>>>>> 4) I-D nits complains about two outdated references:
>>>>> 
>>>>> ** Obsolete normative reference: RFC 5226 (Obsoleted by RFC 8126)
>>>>> 
>>>>> ** Obsolete normative reference: RFC 7159 (Obsoleted by RFC 8259)
>>> 
>>> I had no idea there was a new JSON, again!
>> 
>> This bit me in the ass earlier this month.
>> 
>>> — Justin
>>>