Re: [sipcore] Benjamin Kaduk's Discuss on draft-ietf-sipcore-sip-token-authnz-15: (with DISCUSS and COMMENT) - the pull request
Benjamin Kaduk <kaduk@mit.edu> Tue, 05 May 2020 21:31 UTC
Return-Path: <kaduk@mit.edu>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0FE923A0BB0; Tue, 5 May 2020 14:31:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dWa6dFf__TDh; Tue, 5 May 2020 14:31:03 -0700 (PDT)
Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AB77E3A0BAA; Tue, 5 May 2020 14:31:03 -0700 (PDT)
Received: from kduck.mit.edu ([24.16.140.251]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id 045LUrkx004434 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 5 May 2020 17:30:55 -0400
Date: Tue, 05 May 2020 14:30:53 -0700
From: Benjamin Kaduk <kaduk@mit.edu>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Cc: Christer Holmberg <christer.holmberg@ericsson.com>, The IESG <iesg@ietf.org>, "draft-ietf-sipcore-sip-token-authnz@ietf.org" <draft-ietf-sipcore-sip-token-authnz@ietf.org>, "sipcore-chairs@ietf.org" <sipcore-chairs@ietf.org>, SIPCORE <sipcore@ietf.org>, Jean Mahoney <mahoney@nostrum.com>
Message-ID: <20200505213053.GU27494@kduck.mit.edu>
References: <70D8F1BE-9596-4407-9C20-550449863330@ericsson.com> <CAGL6ep+xfkJT8eejpETS2=KbGrr=emcz4EhQaQx8tgOy-U+-sA@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <CAGL6ep+xfkJT8eejpETS2=KbGrr=emcz4EhQaQx8tgOy-U+-sA@mail.gmail.com>
User-Agent: Mutt/1.12.1 (2019-06-15)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/DsKyKcJyzc-Az0hSHk0H-IcD2Vw>
Subject: Re: [sipcore] Benjamin Kaduk's Discuss on draft-ietf-sipcore-sip-token-authnz-15: (with DISCUSS and COMMENT) - the pull request
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 May 2020 21:31:06 -0000
I think so, yes. -Ben On Tue, May 05, 2020 at 05:11:38PM -0400, Rifaat Shekh-Yusef wrote: > Ben, > > Does this pull request address your latest DISCUSS and comments? > > Regards, > Rifaat > > > On Tue, May 5, 2020 at 3:31 PM Christer Holmberg < > christer.holmberg@ericsson.com> wrote: > > > Hi, > > > > > > > > Based on Benjamin’s comments, I created a new pull request: > > > > > > > > https://github.com/rifaat-ietf/draft-ietf-sipcore-sip-token-authnz/pull/9 > > > > > > > > Regards, > > > > > > > > Christer > > > > > > > > > > > > *From: *Rifaat Shekh-Yusef <rifaat.ietf@gmail.com> > > *Date: *Tuesday, 5 May 2020 at 22.10 > > *To: *Benjamin Kaduk <kaduk@mit.edu> > > *Cc: *"iesg@ietf.org" <iesg@ietf.org>, " > > draft-ietf-sipcore-sip-token-authnz@ietf.org" < > > draft-ietf-sipcore-sip-token-authnz@ietf.org>, "sipcore-chairs@ietf.org" < > > sipcore-chairs@ietf.org>, "sipcore@ietf.org" <sipcore@ietf.org>, "A. > > Mahoney" <mahoney@nostrum.com> > > *Subject: *Re: Benjamin Kaduk's Discuss on > > draft-ietf-sipcore-sip-token-authnz-15: (with DISCUSS and COMMENT) > > *Resent from: *<alias-bounces@ietf.org> > > *Resent to: *Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, Christer > > Holmberg <christer.holmberg@ericsson.com>, Victor Pascual < > > victor.pascual.avila@gmail.com> > > *Resent date: *Tuesday, 5 May 2020 at 22.10 > > > > > > > > Inline... > > > > > > > > On Tue, May 5, 2020 at 2:46 PM Benjamin Kaduk via Datatracker < > > noreply@ietf.org> wrote: > > > > Benjamin Kaduk has entered the following ballot position for > > draft-ietf-sipcore-sip-token-authnz-15: Discuss > > > > When responding, please keep the subject line intact and reply to all > > email addresses included in the To and CC lines. (Feel free to cut this > > introductory paragraph, however.) > > > > > > Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html > > for more information about IESG DISCUSS and COMMENT positions. > > > > > > The document, along with other ballot positions, can be found here: > > https://datatracker.ietf.org/doc/draft-ietf-sipcore-sip-token-authnz/ > > > > > > > > ---------------------------------------------------------------------- > > DISCUSS: > > ---------------------------------------------------------------------- > > > > Thanks for the updates in the -14 (and -15); they cover most of my points. > > > > Unfortunately, the new security considerations text seems to introduce a > > problematic recommendation: > > > > Because of that, it is critical to make sure that extra security > > measures be taken to safeguard credentials used for Single Sign-On. > > Examples of such measures include long passphrase instead of a > > password, enabling multi-factor factor authentication, and the use of > > embedded browser when possible, as defined in [RFC8252]. > > > > Looking at RFC 8252 (Section 8.12), it seems to be rather strongly > > recommending > > to *not* use an embedded browser, which is the opposite of the apparent > > recommendation here. Are we missing a word "avoiding" or similar? > > > > > > > > Yeah, this should have been "browser" not "embedded browser". > > > > We will remove the "embedded browser" and replace it with "the native > > platform browser". > > > > > > > > > > > > Also, I am not 100% sure my note about refresh tokens was fully addressed; > > in Section 2.1.1 we see: > > > > The refresh token is only used between the UAC and the AS. If the AS > > provides a refresh token to the UAC, the UAC uses it to request a new > > access token and refresh token from the AS before the currently used > > access token expires ([RFC6749], Section 1.5). If the AS does not > > > > Is it accurate to say that the refresh token is used "to request a new > > access > > token and refresh token" (specifically the "and refresh token" part)? I > > know that > > it is not always returned, but am less sure about whether the semantics > > always > > include an (implicit) request for a new one. > > > > > > > > Returning a refresh token is based on AS policy. > > > > We will remove the "and refresh token". > > > > > > > > > > > > > > ---------------------------------------------------------------------- > > COMMENT: > > ---------------------------------------------------------------------- > > > > Some other comments on the new text that do not rise to Discuss-level. > > > > Thanks for adding the mention of a whitelist of trusted ASes; I would > > consider > > also mentioning it in Section 4 for the authz_server parameter, and/or in > > the > > security considerations. > > > > We will add that to the security consideration section. > > > > > > > > > > > > I also would have liked to see some guidance about when one > > should/shouldn't > > include the realm parameter in a challenge. > > > > I think this is out of scope, as we are not updating or changing the > > existing SIP behavior on this issue. > > > > > > > > > > > > Section 2.1.1 > > > > UAC contacts the AS in order to obtain tokens, and includes the > > requested scopes, based on a local configuration (Figure 1). The UAC > > MUST check the AS URL received in the 401/407 response against a list > > of trusted ASs configured on the UAC, in order to prevent several > > classes of possible vulnerabilities when a client blindly attempt to > > use any provided authorization. > > > > nits: "attempts", and maybe "any provided authorization server". > > > > Will fix it > > > > > > > > Section 3 > > > > nit: s/claimes/claims/ > > > > Will fix it > > > > > > > > > > > > Section 5 > > > > When a registrar chooses to challenge a REGISTER request, if the > > registrar can provide access to different levels of services, it is > > RECOMMENDED that the registrar includes a scope in the response in > > order to indicate the minimum scope needed to register and access > > basic services. The access token might include an extended scope > > that gives the user access to more advanced features beyond basic > > services. > > > > Is there anything to say about how the broader scope value might be > > learned? > > > > In SIP, it is typically controlled by the admin, that controls the AS, and > > dictates the level of access for the user. > > > > We will add a sentence to that extent. > > > > > > > > Regards, > > > > Rifaat > > > > > >
- Re: [sipcore] Benjamin Kaduk's Discuss on draft-i… Christer Holmberg
- Re: [sipcore] Benjamin Kaduk's Discuss on draft-i… Rifaat Shekh-Yusef
- Re: [sipcore] Benjamin Kaduk's Discuss on draft-i… Benjamin Kaduk
- Re: [sipcore] Benjamin Kaduk's Discuss on draft-i… Rifaat Shekh-Yusef