Re: [sipcore] Benjamin Kaduk's Discuss on draft-ietf-sipcore-sip-token-authnz-15: (with DISCUSS and COMMENT)

Rifaat Shekh-Yusef <rifaat.ietf@gmail.com> Tue, 05 May 2020 19:10 UTC

Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0FECF3A07A0; Tue, 5 May 2020 12:10:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id erjlm0FLVmmE; Tue, 5 May 2020 12:10:41 -0700 (PDT)
Received: from mail-io1-xd44.google.com (mail-io1-xd44.google.com [IPv6:2607:f8b0:4864:20::d44]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 91EA33A079D; Tue, 5 May 2020 12:10:40 -0700 (PDT)
Received: by mail-io1-xd44.google.com with SMTP id k6so2771472iob.3; Tue, 05 May 2020 12:10:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=xnFiorE3MVA2uTxZPbUvwTqOYWSraO7dilmV9HkvIsk=; b=n4CcmBJnhIqP2mt0VfH30GKH1VEetEZQz9b4Ci5BVmW6n2WYAc7HM4JMBCepNgzzNP p1WPvZ+We4wvuHNhyZ4H/S8XU+n99PY7eiSxURP/gJOaExdORYsxK3xTfEdAHLH7KWbm W2te/iQ2k1W6Wo03FsGAvOTKscqs3sA1xjhHiIdsCsCsKmfHu6u7r/2KPhuc4VKRBNXc fnmk75OQVvdvlBF1kEexu2+n9ImJvi4wQ6j4Zd0lb12BFpWlEjZ8QmRV7JB30zMhI/gW XSVzSaLwodwUid7F+yMDPJJIFF57hrXcFjVG8yzztPlWt//5YSSER76rjyXATNZEBOZM jA4g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=xnFiorE3MVA2uTxZPbUvwTqOYWSraO7dilmV9HkvIsk=; b=Q0Yzk/lcG2jCnuu6M123inPhJTiXMqw4a0rx3J1vx2wcs/ZBj3rHipSAg28EE9t56E QQ1O3fwuX4K6Hgo4eH6OVMvKI5veeL1Mqz9qw3RpI0BDY+EIh5Frf6LtQRtXtcACQand Sk5bBl31gBaZw4aS8Jchaq6GnymDmln6XyeijzBw/b9Pl0YpJWbAI7/QYkwHtiLyLh9I z25vNENdDzrT5IzNmfKuQg6/dnKoYjmNEIkZ+9Cdf2GsNiDIJ4wAjr4fv2MoaYVoLf+C FYG0ziot0EFGpGPP1jOEx8iEqEfTF63ldYt9B9c9mxzzuohnREqRsAj2taAZwC8zkI8L 0cCw==
X-Gm-Message-State: AGi0PubBjM4D8e8BcHERHoxZGQrhvRroJu6Irf5Ky6Ee6v98GNPVQnxX 5J+CrdHAySvQSiWC8MQDEhzqEAeuvUSMSxnzo9M=
X-Google-Smtp-Source: APiQypKFlTzGMN1mDyrLmeq38D29hm+uuPXPH9BEPnXDErQlsfiJTr6gmKuMP7RC42fr3GgEP2fbUtLZrhg66GJND8I=
X-Received: by 2002:a05:6602:15ca:: with SMTP id f10mr4880199iow.51.1588705839920; Tue, 05 May 2020 12:10:39 -0700 (PDT)
MIME-Version: 1.0
References: <158870439650.25526.11019219125541236895@ietfa.amsl.com>
In-Reply-To: <158870439650.25526.11019219125541236895@ietfa.amsl.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Tue, 05 May 2020 15:10:28 -0400
Message-ID: <CAGL6ep+FOcb1vmoSMSJSToq7V6Xh8wJOECJ1u+VvkTi+4LScfA@mail.gmail.com>
To: Benjamin Kaduk <kaduk@mit.edu>
Cc: The IESG <iesg@ietf.org>, draft-ietf-sipcore-sip-token-authnz@ietf.org, sipcore-chairs@ietf.org, SIPCORE <sipcore@ietf.org>, Jean Mahoney <mahoney@nostrum.com>
Content-Type: multipart/alternative; boundary="0000000000003dbac905a4eb6742"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/3DyDtI_SHJnj7nORpXYokDyTscg>
Subject: Re: [sipcore] Benjamin Kaduk's Discuss on draft-ietf-sipcore-sip-token-authnz-15: (with DISCUSS and COMMENT)
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 May 2020 19:10:43 -0000

Inline...

On Tue, May 5, 2020 at 2:46 PM Benjamin Kaduk via Datatracker <
noreply@ietf.org> wrote:

> Benjamin Kaduk has entered the following ballot position for
> draft-ietf-sipcore-sip-token-authnz-15: Discuss
>
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
>
>
> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
>
>
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-sipcore-sip-token-authnz/
>
>
>
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
>
> Thanks for the updates in the -14 (and -15); they cover most of my points.
>
> Unfortunately, the new security considerations text seems to introduce a
> problematic recommendation:
>
>    Because of that, it is critical to make sure that extra security
>    measures be taken to safeguard credentials used for Single Sign-On.
>    Examples of such measures include long passphrase instead of a
>    password, enabling multi-factor factor authentication, and the use of
>    embedded browser when possible, as defined in [RFC8252].
>
> Looking at RFC 8252 (Section 8.12), it seems to be rather strongly
> recommending
> to *not* use an embedded browser, which is the opposite of the apparent
> recommendation here.  Are we missing a word "avoiding" or similar?
>
>
Yeah, this should have been "browser" not "embedded browser".
We will remove the "embedded browser" and replace it with "the native
platform browser".



> Also, I am not 100% sure my note about refresh tokens was fully addressed;
> in Section 2.1.1 we see:
>
>    The refresh token is only used between the UAC and the AS.  If the AS
>    provides a refresh token to the UAC, the UAC uses it to request a new
>    access token and refresh token from the AS before the currently used
>    access token expires ([RFC6749], Section 1.5).  If the AS does not
>
> Is it accurate to say that the refresh token is used "to request a new
> access
> token and refresh token" (specifically the "and refresh token" part)?  I
> know that
> it is not always returned, but am less sure about whether the semantics
> always
> include an (implicit) request for a new one.
>

Returning a refresh token is based on AS policy.
We will remove the "and refresh token".



>
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>
> Some other comments on the new text that do not rise to Discuss-level.
>
> Thanks for adding the mention of a whitelist of trusted ASes; I would
> consider
> also mentioning it in Section 4 for the authz_server parameter, and/or in
> the
> security considerations.
>
> We will add that to the security consideration section.



> I also would have liked to see some guidance about when one
> should/shouldn't
> include the realm parameter in a challenge.
>
> I think this is out of scope, as we are not updating or changing the
existing SIP behavior on this issue.


Section 2.1.1
>
>    UAC contacts the AS in order to obtain tokens, and includes the
>    requested scopes, based on a local configuration (Figure 1).  The UAC
>    MUST check the AS URL received in the 401/407 response against a list
>    of trusted ASs configured on the UAC, in order to prevent several
>    classes of possible vulnerabilities when a client blindly attempt to
>    use any provided authorization.
>
> nits: "attempts", and maybe "any provided authorization server".
>
> Will fix it


> Section 3
>
> nit: s/claimes/claims/
>
> Will fix it



> Section 5
>
>    When a registrar chooses to challenge a REGISTER request, if the
>    registrar can provide access to different levels of services, it is
>    RECOMMENDED that the registrar includes a scope in the response in
>    order to indicate the minimum scope needed to register and access
>    basic services.  The access token might include an extended scope
>    that gives the user access to more advanced features beyond basic
>    services.
>
> Is there anything to say about how the broader scope value might be
> learned?
>
> In SIP, it is typically controlled by the admin, that controls the AS, and
dictates the level of access for the user.
We will add a sentence to that extent.

Regards,
 Rifaat