Re: [secdir] Secdir review of draft-murchison-nntp-compress-05

Ken Murchison <murch@andrew.cmu.edu> Tue, 25 October 2016 12:04 UTC

Return-Path: <murch@andrew.cmu.edu>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2BC9C129628; Tue, 25 Oct 2016 05:04:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.631
X-Spam-Level:
X-Spam-Status: No, score=-4.631 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.431] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L_65DppaX1Fo; Tue, 25 Oct 2016 05:04:57 -0700 (PDT)
Received: from smtp.andrew.cmu.edu (SMTP.ANDREW.CMU.EDU [128.2.105.203]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A832F1293D9; Tue, 25 Oct 2016 04:55:18 -0700 (PDT)
Received: from [172.31.25.139] (VPN-172-31-25-139.VPN.CMU.LOCAL [172.31.25.139]) (user=murch mech=PLAIN (0 bits)) by smtp.andrew.cmu.edu (8.15.2/8.15.1) with ESMTPSA id u9PBtFwk009917 (version=TLSv1.2 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Tue, 25 Oct 2016 07:55:15 -0400
To: Julien ÉLIE <julien@trigofacile.com>, Barry Leiba <barryleiba@computer.org>, "draft-murchison-nntp-compress.all@ietf.org" <draft-murchison-nntp-compress.all@ietf.org>, Michael Bäuerle <michael.baeuerle@stz-e.de>
References: <CALaySJ+mJdorTkygsZ==Bja+0ZmavTkq2kC33QJ67LeM34K=Ng@mail.gmail.com> <20981db3190142193043f1445abadaa3@trigofacile.com> <CALaySJKP3AEgb7=rRz=T0R4vKWOHE6AAHeg-k-h28KrtjXP64A@mail.gmail.com> <b8ea79e3-c4b6-3210-9462-cfd562545c88@trigofacile.com> <10b4998e-67ae-abdf-c1f0-321c28bcb4fe@trigofacile.com>
From: Ken Murchison <murch@andrew.cmu.edu>
Organization: Carnegie Mellon University
Message-ID: <624bc524-d0d6-0b11-9af9-3d6fea66a0e5@andrew.cmu.edu>
Date: Tue, 25 Oct 2016 07:55:15 -0400
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.3.0
MIME-Version: 1.0
In-Reply-To: <10b4998e-67ae-abdf-c1f0-321c28bcb4fe@trigofacile.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-PMX-Version: 6.3.0.2556906, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2016.10.25.114817
X-SMTP-Spam-Clean: 8% ( MULTIPLE_RCPTS 0.1, HTML_00_01 0.05, HTML_00_10 0.05, BODY_SIZE_4000_4999 0, BODY_SIZE_5000_LESS 0, BODY_SIZE_7000_LESS 0, DATE_TZ_NA 0, FROM_EDU_TLD 0, IN_REP_TO 0, LEGITIMATE_NEGATE 0, LEGITIMATE_SIGNS 0, MSG_THREAD 0, MULTIPLE_REAL_RCPTS 0, NO_CTA_URI_FOUND 0, NO_URI_FOUND 0, NO_URI_HTTPS 0, REFERENCES 0, __BOUNCE_CHALLENGE_SUBJ 0, __BOUNCE_NDR_SUBJ_EXEMPT 0, __CC_NAME 0, __CC_NAME_DIFF_FROM_ACC 0, __CC_REAL_NAMES 0, __CP_NOT_1 0, __CT 0, __CTE 0, __CT_TEXT_PLAIN 0, __FORWARDED_MSG 0, __HAS_CC_HDR 0, __HAS_FROM 0, __HAS_MSGID 0, __IN_REP_TO 0, __MIME_TEXT_ONLY 0, __MIME_TEXT_P 0, __MIME_TEXT_P1 0, __MIME_VERSION 0, __MOZILLA_USER_AGENT 0, __MULTIPLE_RCPTS_CC_X2 0, __PHISH_SPEAR_STRUCTURE_1 0, __REFERENCES 0, __SANE_MSGID 0, __SUBJ_ALPHA_NEGATE 0, __TO_MALFORMED_2 0, __TO_NAME 0, __TO_NAME_DIFF_FROM_ACC 0, __TO_REAL_NAMES 0, __USER_AGENT 0)
X-SMTP-Spam-Score: 8%
X-Scanned-By: MIMEDefang 2.78 on 128.2.105.203
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/x9ZaN5MsDRvzih06mGpw_9xLthg>
Cc: IESG <iesg@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>
Subject: Re: [secdir] Secdir review of draft-murchison-nntp-compress-05
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Oct 2016 12:04:58 -0000

I'm fine with the changes.


On 10/24/2016 04:20 PM, Julien ÉLIE wrote:
> Hi Barry,
>
> Thanks again for your valuable comments on the document.  They were very
> much appreciated, and permitted to fix a few issues.
>
> I've just finalized a revised draft, taking into account all the comments
> received during Last Call.
> I just want to highlight the following change in wording.
> Ken and Michael, as respectively co-author and document shepherd, please
> tell if you think the new wording is not the right thing to do.
>
> Personally, I think this document (draft-murchison-nntp-compress) should
> only focus on standardizing the COMPRESS command and not try to fix
> how authentication works in another kind of compression (TLS-level
> compression).  It would otherwise be an update to RFC 4643.
>
> Updating TLS usage with NNTP is the aim of a second, separate document
> (draft-elie-nntp-tls-recommendations) that updates RFC 4643 with
> best current practices.  That one discourages the use of TLS-level
> compression, thus dealing with authentication layered with a TLS-level
> compression method.
>
>
>>>    In order to help mitigate leaking authentication credentials via for
>>>    instance a CRIME attack [CRIME], authentication SHOULD NOT be
>>>    attempted when a compression layer is active.  Consequently, a server
>>>    SHOULD NOT return any arguments with the AUTHINFO capability label
>>>    (or SHOULD NOT advertise it at all) in response to a CAPABILITIES
>>>    command received from an unauthenticated client after a compression
>>>    layer is active, and such a client SHOULD NOT attempt to utilize any
>>>    AUTHINFO [RFC4643] commands.  It implies that a server SHOULD reply
>>>    with a 502 response code if a syntactically valid AUTHINFO command is
>>>    received while a compression layer is already active.
>>>
>>> Why are these SHOULD, and not MUST?  Under what conditions would it be
>>> necessary or reasonable for an implementation not to abide by these,
>>> and what considerations need to be considered when making that
>>> determination?  (And this is also directly referred to in Section 6.)
> [...]
>> OK.  I've adopted your suggestion.
> [...]
>> Hmm...  I think I should now do a pass on the document and explicitly
>> say when "compression layer" only means the one negotiated with COMPRESS.
>> As a matter of fact, I do not think it's a good idea to say in this
>> draft that authentication MUST NOT be attempted when TLS-level
>> compression is active!  It would otherwise be a change in how
>> authentication works (RFC 4643 heavily mentions the preferred use of
>> AUTHINFO along with TLS, and RFC 4642 allows TLS-level compression).
>> This document would otherwise be an update to RFC 4643, by no longer
>> allowing AUTHINFO when TLS-level compression is active.
> Pass done.  I updated the wording in a few parts of the document.
> The above quoted paragraph becomes:
>
>     In order to help mitigate leaking authentication credentials via for
>     instance a CRIME attack [CRIME], authentication MUST NOT be attempted
>     after a successful use of the COMPRESS command.  Consequently, a
>     server MUST either list the AUTHINFO capability with no arguments or
>     not advertise it at all, in response to a CAPABILITIES command
>     received from an unauthenticated client after a successful use of the
>     COMPRESS command, and such a client MUST NOT attempt to utilize any
>     AUTHINFO [RFC4643] commands.  It implies that a server MUST reply
>     with a 502 response code if a syntactically valid AUTHINFO command is
>     received after a successful use of the COMPRESS command.  (Note that
>     this specification does not change the behaviour of AUTHINFO as
>     described in [RFC4643] independently of TLS-level compression.
>     Authentication is therefore still allowed, even though TLS-level
>     compression is active.)
>
>
> I hope you're all fine with that.
> Have a nice day,
>

-- 
Kenneth Murchison
Principal Systems Software Engineer
Carnegie Mellon University