Re: [secdir] Secdir review of draft-murchison-nntp-compress-05

Michael Bäuerle <michael.baeuerle@stz-e.de> Tue, 25 October 2016 16:41 UTC

Return-Path: <michael.baeuerle@stz-e.de>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1770112959E; Tue, 25 Oct 2016 09:41:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JBhnA9wuyBq7; Tue, 25 Oct 2016 09:41:35 -0700 (PDT)
Received: from hardbaer.com (mail.hardbaer.com [91.250.101.142]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 062B4127078; Tue, 25 Oct 2016 09:41:34 -0700 (PDT)
X-No-Relay: not in my network
X-No-Relay: not in my network
X-No-Relay: not in my network
X-No-Relay: not in my network
X-No-Relay: not in my network
Received: from WStation3.stz-e.de (business-092-079-177-146.static.arcor-ip.net [92.79.177.146]) by hardbaer.com (Postfix) with ESMTPSA id 210B01C695CCC; Tue, 25 Oct 2016 18:41:32 +0200 (CEST)
Date: Tue, 25 Oct 2016 18:41:26 +0200
From: Michael Bäuerle <michael.baeuerle@stz-e.de>
To: Julien ÉLIE <julien@trigofacile.com>
Message-ID: <20161025184126.62bab74f@WStation3.stz-e.de>
In-Reply-To: <10b4998e-67ae-abdf-c1f0-321c28bcb4fe@trigofacile.com>
References: <CALaySJ+mJdorTkygsZ==Bja+0ZmavTkq2kC33QJ67LeM34K=Ng@mail.gmail.com> <20981db3190142193043f1445abadaa3@trigofacile.com> <CALaySJKP3AEgb7=rRz=T0R4vKWOHE6AAHeg-k-h28KrtjXP64A@mail.gmail.com> <b8ea79e3-c4b6-3210-9462-cfd562545c88@trigofacile.com> <10b4998e-67ae-abdf-c1f0-321c28bcb4fe@trigofacile.com>
User-Agent: Claws-Mail/3.13.1
MIME-Version: 1.0
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/gvxkXNFaZWn1atP3M5mK4joJF_0>
X-Mailman-Approved-At: Wed, 26 Oct 2016 00:59:20 -0700
Cc: draft-murchison-nntp-compress.all@ietf.org, Barry Leiba <barryleiba@computer.org>, IESG <iesg@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>
Subject: Re: [secdir] Secdir review of draft-murchison-nntp-compress-05
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Oct 2016 07:37:27 -0000

Julien ÉLIE wrote:
> 
> Hi Barry,
> 
> Thanks again for your valuable comments on the document.  They were very
> much appreciated, and permitted to fix a few issues.
> 
> I've just finalized a revised draft, taking into account all the comments
> received during Last Call.
> I just want to highlight the following change in wording.
> Ken and Michael, as respectively co-author and document shepherd, please
> tell if you think the new wording is not the right thing to do.
> 
> Personally, I think this document (draft-murchison-nntp-compress) should
> only focus on standardizing the COMPRESS command and not try to fix
> how authentication works in another kind of compression (TLS-level
> compression).  It would otherwise be an update to RFC 4643.
> 
> Updating TLS usage with NNTP is the aim of a second, separate document
> (draft-elie-nntp-tls-recommendations) that updates RFC 4643 with
> best current practices.  That one discourages the use of TLS-level
> compression, thus dealing with authentication layered with a TLS-level
> compression method.
> 
> 
> >>   In order to help mitigate leaking authentication credentials via for
> >>   instance a CRIME attack [CRIME], authentication SHOULD NOT be
> >>   attempted when a compression layer is active.  Consequently, a server
> >>   SHOULD NOT return any arguments with the AUTHINFO capability label
> >>   (or SHOULD NOT advertise it at all) in response to a CAPABILITIES
> >>   command received from an unauthenticated client after a compression
> >>   layer is active, and such a client SHOULD NOT attempt to utilize any
> >>   AUTHINFO [RFC4643] commands.  It implies that a server SHOULD reply
> >>   with a 502 response code if a syntactically valid AUTHINFO command is
> >>   received while a compression layer is already active.
> >>
> >> Why are these SHOULD, and not MUST?  Under what conditions would it be
> >> necessary or reasonable for an implementation not to abide by these,
> >> and what considerations need to be considered when making that
> >> determination?  (And this is also directly referred to in Section 6.)  
> [...]
> > OK.  I've adopted your suggestion.  
> [...]
> > Hmm...  I think I should now do a pass on the document and explicitly
> > say when "compression layer" only means the one negotiated with COMPRESS.
> > As a matter of fact, I do not think it's a good idea to say in this
> > draft that authentication MUST NOT be attempted when TLS-level
> > compression is active!  It would otherwise be a change in how
> > authentication works (RFC 4643 heavily mentions the preferred use of
> > AUTHINFO along with TLS, and RFC 4642 allows TLS-level compression).
> > This document would otherwise be an update to RFC 4643, by no longer
> > allowing AUTHINFO when TLS-level compression is active.  
> 
> Pass done.  I updated the wording in a few parts of the document.
> The above quoted paragraph becomes:
> 
>    In order to help mitigate leaking authentication credentials via for
>    instance a CRIME attack [CRIME], authentication MUST NOT be attempted
>    after a successful use of the COMPRESS command.  Consequently, a
>    server MUST either list the AUTHINFO capability with no arguments or
>    not advertise it at all, in response to a CAPABILITIES command
>    received from an unauthenticated client after a successful use of the
>    COMPRESS command, and such a client MUST NOT attempt to utilize any
>    AUTHINFO [RFC4643] commands.  It implies that a server MUST reply
>    with a 502 response code if a syntactically valid AUTHINFO command is
>    received after a successful use of the COMPRESS command.  (Note that
>    this specification does not change the behaviour of AUTHINFO as
>    described in [RFC4643] independently of TLS-level compression.
>    Authentication is therefore still allowed, even though TLS-level
>    compression is active.)
> 
> 
> I hope you're all fine with that.

I'm fine with it.


Regards,

Michael Bäuerle