Re: [secdir] Secdir review of draft-murchison-nntp-compress-05
Michael Bäuerle <michael.baeuerle@stz-e.de> Tue, 25 October 2016 16:41 UTC
Return-Path: <michael.baeuerle@stz-e.de>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1770112959E; Tue, 25 Oct 2016 09:41:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JBhnA9wuyBq7; Tue, 25 Oct 2016 09:41:35 -0700 (PDT)
Received: from hardbaer.com (mail.hardbaer.com [91.250.101.142]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 062B4127078; Tue, 25 Oct 2016 09:41:34 -0700 (PDT)
X-No-Relay: not in my network
X-No-Relay: not in my network
X-No-Relay: not in my network
X-No-Relay: not in my network
X-No-Relay: not in my network
Received: from WStation3.stz-e.de (business-092-079-177-146.static.arcor-ip.net [92.79.177.146]) by hardbaer.com (Postfix) with ESMTPSA id 210B01C695CCC; Tue, 25 Oct 2016 18:41:32 +0200 (CEST)
Date: Tue, 25 Oct 2016 18:41:26 +0200
From: Michael Bäuerle <michael.baeuerle@stz-e.de>
To: Julien ÉLIE <julien@trigofacile.com>
Message-ID: <20161025184126.62bab74f@WStation3.stz-e.de>
In-Reply-To: <10b4998e-67ae-abdf-c1f0-321c28bcb4fe@trigofacile.com>
References: <CALaySJ+mJdorTkygsZ==Bja+0ZmavTkq2kC33QJ67LeM34K=Ng@mail.gmail.com> <20981db3190142193043f1445abadaa3@trigofacile.com> <CALaySJKP3AEgb7=rRz=T0R4vKWOHE6AAHeg-k-h28KrtjXP64A@mail.gmail.com> <b8ea79e3-c4b6-3210-9462-cfd562545c88@trigofacile.com> <10b4998e-67ae-abdf-c1f0-321c28bcb4fe@trigofacile.com>
User-Agent: Claws-Mail/3.13.1
MIME-Version: 1.0
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/gvxkXNFaZWn1atP3M5mK4joJF_0>
X-Mailman-Approved-At: Wed, 26 Oct 2016 00:59:20 -0700
Cc: draft-murchison-nntp-compress.all@ietf.org, Barry Leiba <barryleiba@computer.org>, IESG <iesg@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>
Subject: Re: [secdir] Secdir review of draft-murchison-nntp-compress-05
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Oct 2016 07:37:27 -0000
Julien ÉLIE wrote: > > Hi Barry, > > Thanks again for your valuable comments on the document. They were very > much appreciated, and permitted to fix a few issues. > > I've just finalized a revised draft, taking into account all the comments > received during Last Call. > I just want to highlight the following change in wording. > Ken and Michael, as respectively co-author and document shepherd, please > tell if you think the new wording is not the right thing to do. > > Personally, I think this document (draft-murchison-nntp-compress) should > only focus on standardizing the COMPRESS command and not try to fix > how authentication works in another kind of compression (TLS-level > compression). It would otherwise be an update to RFC 4643. > > Updating TLS usage with NNTP is the aim of a second, separate document > (draft-elie-nntp-tls-recommendations) that updates RFC 4643 with > best current practices. That one discourages the use of TLS-level > compression, thus dealing with authentication layered with a TLS-level > compression method. > > > >> In order to help mitigate leaking authentication credentials via for > >> instance a CRIME attack [CRIME], authentication SHOULD NOT be > >> attempted when a compression layer is active. Consequently, a server > >> SHOULD NOT return any arguments with the AUTHINFO capability label > >> (or SHOULD NOT advertise it at all) in response to a CAPABILITIES > >> command received from an unauthenticated client after a compression > >> layer is active, and such a client SHOULD NOT attempt to utilize any > >> AUTHINFO [RFC4643] commands. It implies that a server SHOULD reply > >> with a 502 response code if a syntactically valid AUTHINFO command is > >> received while a compression layer is already active. > >> > >> Why are these SHOULD, and not MUST? Under what conditions would it be > >> necessary or reasonable for an implementation not to abide by these, > >> and what considerations need to be considered when making that > >> determination? (And this is also directly referred to in Section 6.) > [...] > > OK. I've adopted your suggestion. > [...] > > Hmm... I think I should now do a pass on the document and explicitly > > say when "compression layer" only means the one negotiated with COMPRESS. > > As a matter of fact, I do not think it's a good idea to say in this > > draft that authentication MUST NOT be attempted when TLS-level > > compression is active! It would otherwise be a change in how > > authentication works (RFC 4643 heavily mentions the preferred use of > > AUTHINFO along with TLS, and RFC 4642 allows TLS-level compression). > > This document would otherwise be an update to RFC 4643, by no longer > > allowing AUTHINFO when TLS-level compression is active. > > Pass done. I updated the wording in a few parts of the document. > The above quoted paragraph becomes: > > In order to help mitigate leaking authentication credentials via for > instance a CRIME attack [CRIME], authentication MUST NOT be attempted > after a successful use of the COMPRESS command. Consequently, a > server MUST either list the AUTHINFO capability with no arguments or > not advertise it at all, in response to a CAPABILITIES command > received from an unauthenticated client after a successful use of the > COMPRESS command, and such a client MUST NOT attempt to utilize any > AUTHINFO [RFC4643] commands. It implies that a server MUST reply > with a 502 response code if a syntactically valid AUTHINFO command is > received after a successful use of the COMPRESS command. (Note that > this specification does not change the behaviour of AUTHINFO as > described in [RFC4643] independently of TLS-level compression. > Authentication is therefore still allowed, even though TLS-level > compression is active.) > > > I hope you're all fine with that. I'm fine with it. Regards, Michael Bäuerle
- [secdir] Secdir review of draft-murchison-nntp-co… Barry Leiba
- Re: [secdir] Secdir review of draft-murchison-nnt… Julien ÉLIE
- Re: [secdir] Secdir review of draft-murchison-nnt… Barry Leiba
- Re: [secdir] Secdir review of draft-murchison-nnt… Julien ÉLIE
- Re: [secdir] Secdir review of draft-murchison-nnt… Julien ÉLIE
- Re: [secdir] Secdir review of draft-murchison-nnt… Barry Leiba
- Re: [secdir] Secdir review of draft-murchison-nnt… Julien ÉLIE
- Re: [secdir] Secdir review of draft-murchison-nnt… Julien ÉLIE
- Re: [secdir] Secdir review of draft-murchison-nnt… Julien ÉLIE
- Re: [secdir] Secdir review of draft-murchison-nnt… Ken Murchison
- Re: [secdir] Secdir review of draft-murchison-nnt… Michael Bäuerle
- Re: [secdir] Secdir review of draft-murchison-nnt… Alexey Melnikov
- Re: [secdir] Secdir review of draft-murchison-nnt… Julien ÉLIE