Re: [sipcore] Resend: WGLC: draft-ietf-sipcore-digest-scheme

Rifaat Shekh-Yusef <rifaat.ietf@gmail.com> Mon, 20 May 2019 02:49 UTC

Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3AB7112003F for <sipcore@ietfa.amsl.com>; Sun, 19 May 2019 19:49:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M7bhzrwZd6rd for <sipcore@ietfa.amsl.com>; Sun, 19 May 2019 19:49:03 -0700 (PDT)
Received: from mail-io1-xd36.google.com (mail-io1-xd36.google.com [IPv6:2607:f8b0:4864:20::d36]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 00789120019 for <sipcore@ietf.org>; Sun, 19 May 2019 19:49:02 -0700 (PDT)
Received: by mail-io1-xd36.google.com with SMTP id e19so9858424iob.3 for <sipcore@ietf.org>; Sun, 19 May 2019 19:49:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=4bPVg1VTPUBmBOG14NXxd7tFa4ntMdwlraFNJhrhUDw=; b=Mz/gRdflqS4+FPbcXBkTmG1kWB6QUvVYODjLUGhm4OBC7u34L2lIBe7B2zPeZEtyRx o9z+YzOU5g9LQl27DP+bKZnVESeUblPeXmEz6Y+eSH4ariXY98p0Dz4VWRv4uslxVo6d dJvQcbrXzeB2mliA4z09DzsmV+U0pApHTWdnCERy1gj23pd/AIZ/dp0a2nFuq4waq1qi VmbNAx2HVK+cBMXmYMHQiUul1XGkmpDgj5Is+ZgFRDp0DZwO/ISXyNzCSzNtGFplKsCd srk2M+TyPIq52qFsxmBO2KpRw7NNpT09uS1R2riUbmMxol3Zw+7gKvPGKqsi6n3I32Ny 2fbw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=4bPVg1VTPUBmBOG14NXxd7tFa4ntMdwlraFNJhrhUDw=; b=ATOglwnzaHUoGbzqG6XrIXEMpxxCsD3QfOiVTP/2DC/3/zG58Xz7c+fXdw4PmXner7 wCJpyPVAG7Gkpou9LM++EFEAnzhbW8Azz2oUlPVd7AJ4aNBRGUJI0y1GcJV6YGKZ7TE1 guGxllZQrEuyTWvysTM4YuqvZSJd+mRoB1M/0jF1RPHltayPCpwU8bYp3QuREYZt5kz2 DCVJO7VQurHrB4b9+EBOZpR5Rsnp0vDYJi2KqXhmDFrWiczhhWrRnro7SfA2GzXnQwv/ l/1y5Trzod7COyBdhHdqKgdHVmT4q6Sz7d02LIQFRT5dmeGRJKXEySeqSJ9GIdE98Ihc AzRg==
X-Gm-Message-State: APjAAAWZKHsoofWRtEV4YGrE69+GhoqPiKT+OUgC6o4/cpYDXbKP9chK 7LHmn/eadPZzt1EJEyo6I0in8WFNOsV8EsS+Zrebew==
X-Google-Smtp-Source: APXvYqyUJ59JwexLAzD8oONoGpA39uaoQS4r6+1Z0mWC/dp4jejkgctUA8MEk4aVu0hSGcdsfciWGhI+j68xL65dmNs=
X-Received: by 2002:a6b:7a49:: with SMTP id k9mr22444143iop.73.1558320542278; Sun, 19 May 2019 19:49:02 -0700 (PDT)
MIME-Version: 1.0
References: <CAGL6epKK=4YCJhsP9DB_R5P3EMZpR14WxY07xMwWrz-hE0hB_Q@mail.gmail.com> <87d0keexit.fsf@hobgoblin.ariadne.com>
In-Reply-To: <87d0keexit.fsf@hobgoblin.ariadne.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Sun, 19 May 2019 22:48:52 -0400
Message-ID: <CAGL6epLxSTSXWxfNjsHjAh22c0OgvyP4Ss5rWpjjQi5D84ou4A@mail.gmail.com>
To: "Dale R. Worley" <worley@ariadne.com>
Cc: SIPCORE <sipcore@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000005e67f4058948c68a"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/Q38EUPJs95VQhX--kujnZF1ZIvo>
Subject: Re: [sipcore] Resend: WGLC: draft-ietf-sipcore-digest-scheme
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 May 2019 02:49:05 -0000

Thanks Dale!

I liked your proposed changes; I will incorporate them into the next
version of the document.

Regards,
 Rifaat


On Sun, May 19, 2019 at 9:15 PM Dale R. Worley <worley@ariadne.com> wrote:

> Looking into this issue:
>
> > > 2) There is discussion "The IANA registry ... specifies the algorithms
> > > .... and specifies a priority for each algorithm."  But I cannot find
> the
> > > word
> > > priority in the registry, nor in the sole reference in the registry,
> RFC
> > > 7616.  Can you update this to point to whatever defines the priority?
> > >
> > >
> > It is specified in section 3.7:
> > https://tools.ietf.org/html/rfc7616#section-3.7
> >
> > But I think the wording in the draft is confusing; I will try to clarify
> > that.
>
> Looking at section 2.1 of draft-ietf-sipcore-digest-scheme-02, it reads
>
>    2.1.  Hash Algorithms
>
>    The Digest scheme has an 'algorithm' parameter that specifies the
>    algorithm to be used to compute the digest of the response.  The IANA
>    registry named "HTTP Digest Hash Algorithms" specifies the algorithms
>    that correspond to 'algorithm' values, and specifies a priority for
>    each algorithm.
>
>    [RFC3261] specifies only one algorithm, MD5, which is used by
>    default.  This document extends [RFC3261] to allow use of any
>    registered algorithm.
>
>    The priority of the algorithm defines its usage preference.  UAs
>    SHOULD prefer algorithms with higher priorities.
>
>    Note that [RFC7616] defines a -sess variant for each algorithm; the
>    -sess variants are not used with SIP.
>
> A nit is that the registry is named "Hash Algorithms for HTTP Digest
> Authentication".
>
> RFC 7616 is not referenced here as establishing the priorities, but
> rather the IANA registry is referenced.  The critical text is from RFC
> 7616, which establishes the preference ordering of algorithms not
> globally, but based on the authentication challenge in a particular
> challenge/response transaction:
>
>    The server MUST
>    add these challenges to the response in order of preference, starting
>    with the most preferred algorithm, followed by the less preferred
>    algorithm.
>    [...]
>    When the client receives the first challenge, it SHOULD use the first
>    challenge it supports, unless a local policy dictates otherwise.
>
> This suggests the wording could be improved along thse lines (changes
> marked with "|"):
>
>    2.1.  Hash Algorithms
>
>    The Digest scheme has an 'algorithm' parameter that specifies the
>    algorithm to be used to compute the digest of the response.  The IANA
>  | registry named "Hash Algorithms for HTTP Digest Authentication"
>  | specifies the algorithms
>  | that correspond to 'algorithm' values.
>
>    [RFC3261] specifies only one algorithm, MD5, which is used by
>    default.  This document extends [RFC3261] to allow use of any
>    registered algorithm.
>
>  | [RFC7616] specifies the usage preference when a response
>  | contains multiple challenges specifying different algorithms.  That
>  | specification is not changed by this document.
>
>    Note that [RFC7616] defines a -sess variant for each algorithm; the
>    -sess variants are not used with SIP.
>
> And there is this issue:
>
> > 1) When is the binding time of "the contents of the Hash Algorithms for
> > HTTP Digest Authentication registry"?  That is, if a new algorithm is
> > added to the registry, does it automatically become authorized for use
> > in SIP?
> >
> > My impression is that the answer is Yes.
>
> Perhaps I am being too fussy about this issue.  But I would like to
> ensure that nobody mistakes the intention of this document.  I think
> the following two wording changes would be more than enough to avoid
> any problems:
>
>    1.  Introduction
>
>    This document updates the Digest Access Authentication scheme used by
>    SIP to support the list of digest algorithms defined in the "Hash
>  | Algorithms for HTTP Digest Authentication" registry (defined by
>  | [RFC7616]) as it is updated from time to time.
>
>    2.1.  Hash Algorithms
>
>    [RFC3261] specifies only one algorithm, MD5, which is used by
>    default.  This document extends [RFC3261] to allow use of any
>  | algorithm that is registered at the time of use.
>
> Dale
>