Re: [sidr] Alissa Cooper's Discuss on draft-ietf-sidr-publication-10: (with DISCUSS and COMMENT)

Alissa Cooper <alissa@cooperw.in> Wed, 08 February 2017 15:13 UTC

Return-Path: <alissa@cooperw.in>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DDBFF129BC7; Wed, 8 Feb 2017 07:13:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.721
X-Spam-Level:
X-Spam-Status: No, score=-2.721 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cooperw.in header.b=gOOZHgog; dkim=pass (1024-bit key) header.d=messagingengine.com header.b=qewIgh4l
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id V5IXYj5eif9X; Wed, 8 Feb 2017 07:13:46 -0800 (PST)
Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com [66.111.4.25]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A514B129BCE; Wed, 8 Feb 2017 07:13:46 -0800 (PST)
Received: from compute7.internal (compute7.nyi.internal [10.202.2.47]) by mailout.nyi.internal (Postfix) with ESMTP id E60B32091C; Wed, 8 Feb 2017 10:13:45 -0500 (EST)
Received: from frontend2 ([10.202.2.161]) by compute7.internal (MEProxy); Wed, 08 Feb 2017 10:13:45 -0500
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=cooperw.in; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-sender :x-me-sender:x-sasl-enc:x-sasl-enc; s=mesmtp; bh=r0Zar5BqAk2ROVa Nl7p7HZ3sg5g=; b=gOOZHgogMqG+wwO20TNECoclpW1Rakdno/QuQMoTkkXmwYZ odmFOwnGExjyAEhgRKoNsDeDv86fYGluE+5CSjyh6IhISvr7pwJaK+95/eMLIPYv RirG5dkWceY2JsXpZh9DxB1wSl+4aX0mNLXD80NaYzJYNZTefxOC1H9jwBFc=
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-transfer-encoding:content-type :date:from:in-reply-to:message-id:mime-version:references :subject:to:x-me-sender:x-me-sender:x-sasl-enc:x-sasl-enc; s= smtpout; bh=r0Zar5BqAk2ROVaNl7p7HZ3sg5g=; b=qewIgh4lBwV6CfqgiVgC 4garDw789SKpvl8jPetahjKtFuA84/IiaFCN/dttmtP+mZn+ybZKC146kgv+kj/k mwSyP3j8homgZ7JhsLmrgfObxVNBWG5t6MezjtZnLP0ekn/rHOZ9nFTwJkpYdydU ElHSpNCg9c1S/YaoUOGZID8=
X-ME-Sender: <xms:qTWbWG5xjPv0Wlb8KfaHzYn0I1qZpoeNmXXfS8S5kMYWTP7wVS_GNw>
X-Sasl-enc: wBinBMttEM/cB1wZUv4/S6eGwjQGaz5kBDgdvg1uPnfr 1486566825
Received: from sjc-alcoop-8812.cisco.com (unknown [128.107.241.186]) by mail.messagingengine.com (Postfix) with ESMTPA id 7B9EC245D9; Wed, 8 Feb 2017 10:13:44 -0500 (EST)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Alissa Cooper <alissa@cooperw.in>
In-Reply-To: <20170131003328.D76804665206@minas-ithil.hactrn.net>
Date: Wed, 08 Feb 2017 10:13:42 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <22745407-7C4C-48B8-9AAC-1689445E0538@cooperw.in>
References: <148466796666.31979.17532709479234975824.idtracker@ietfa.amsl.com> <20170131003328.D76804665206@minas-ithil.hactrn.net>
To: Rob Austein <sra@hactrn.net>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidr/vptbzXQFfP4NeTbr9U6LieZcmoc>
Cc: Chris Morrow <morrowc@ops-netman.net>, sidr-chairs@ietf.org, IESG <iesg@ietf.org>, sidr@ietf.org, draft-ietf-sidr-publication@ietf.org
Subject: Re: [sidr] Alissa Cooper's Discuss on draft-ietf-sidr-publication-10: (with DISCUSS and COMMENT)
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidr/>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Feb 2017 15:13:48 -0000

> On Jan 30, 2017, at 7:33 PM, Rob Austein <sra@hactrn.net> wrote:
> 
> At Tue, 17 Jan 2017 07:46:06 -0800, Alissa Cooper wrote:
> ...
>> ----------------------------------------------------------------------
>> DISCUSS:
>> ----------------------------------------------------------------------
>> 
>> What is the upgrade path for the future when new versions of this
>> protocol get published? How are clients and servers meant to agree on
>> which version to use?
> 
> The schema includes a version number, so a new protocol version would
> be detectable; in the most straightforward implementation, attempting
> to parse an unknown protocol version would result in a schema
> validation error.

I think it would be useful to note that expectation (also since the document talks about existing older versions of the protocol, presumably not standardized).

Thanks,
Alissa

>  I don't think it's really possible to specify the
> upgrade path in detail until one knows what the newer version looks
> like, ie, what changed, so I'd defer this until the (hypothetical) new
> version.
> 
>> ----------------------------------------------------------------------
>> COMMENT:
>> ----------------------------------------------------------------------
>> 
>> Although I understand why Section 6 says transport security is not
>> strictly required, given that the authentication and authorization
>> mechanisms that this protocol relies on are outside of the scope here,
>> isn't it possible that clients and servers may be exchanging cookies or
>> other headers in the course of using this protocol that would benefit
>> from transport encryption? It seems like mentioning that transport
>> security may still be beneficial although not required might be a good
>> idea.
> 
> Um, the authentication is CMS signatures, it's just the authorization
> that's out of scope.
> 
> I can't think of any sane reason for stuffing cookies or the like into
> this protocol, but yes, it's theoretically possible.
> 
> The protocol is currently specified in terms of plain HTTP because an
> earlier version using HTTPS included a horrible authentication
> hairball in which HTTPS and CMS were required to use the same BPKI
> certificates for authentication, which turned out to be an
> implementation nightmare.  So we backed off to plain HTTP to cut free
> of that mess, and we didn't think there were any privacy issues in the
> real data (if there had been, we would have been using CMS encryption
> too).
> 
> That said, the world has changed, and I see at least one other discuss
> asking for HTTPS, so I guess we'll be going down that path, but this
> time with no required linkage between CMS and HTTPS, and with the
> authentication (still) just based on CMS.