Re: [sipcore] draft-ietf-sipcore-digest-scheme comments

Rifaat Shekh-Yusef <rifaat.ietf@gmail.com> Sat, 25 May 2019 20:08 UTC

Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 376BA120103 for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 13:08:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Bqi0wjl1zQ_H for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 13:08:26 -0700 (PDT)
Received: from mail-io1-xd30.google.com (mail-io1-xd30.google.com [IPv6:2607:f8b0:4864:20::d30]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F0E59120021 for <sipcore@ietf.org>; Sat, 25 May 2019 13:08:25 -0700 (PDT)
Received: by mail-io1-xd30.google.com with SMTP id b3so4985996iob.12 for <sipcore@ietf.org>; Sat, 25 May 2019 13:08:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=FNUfy36wpChFOWNPoo+lAH2e2ks7ffJwtjaxgsywJBc=; b=O7ZS3pklh5qj69up8ZXmuctRmysI3dH3IllC9/2eHzKIMdBwNEW6mEEpnPxrlvliYk 93VZjRjVGtLw+FZuE/Hfj3WICmGH3RycVx78j8rY/9ZFTrfrmG2Svoe0jjXTrJ7yMPzC 8TyPYaSqDkpESa4xCbpIikwbAO6xBl8OCM13hXlxYhVHSS2PrX1yLhLS7a0gsjqc+8+7 lyYRzjlY1FH/Y3tOg09O3FuvKXJc7iYww0SQBpLrUv4x0pK5LBpS7bYNMV5AhX/UtNps dVijowYmqqURZYK9u2z8LUgxr8RBzA42wtn51TTPKkZbe1foUbWn8prHEszio8hx/o/S aBqQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=FNUfy36wpChFOWNPoo+lAH2e2ks7ffJwtjaxgsywJBc=; b=T0V07dcWlPupE6dJQ/i6ki91yzZ6johFBksm2i4Gqnhrovv3nWrfqn+eQ9IJaM4ly7 LIOqqsfPLV33rsSgEEyma58k9NENahl+JkCrQdNEKdPycAC4/dPZMDsYWi7UNx/NNyQv 2GbxQErBdMyAJOiNN7GyrTNT8xjfiVNgC77R4zBI9UnML9B8et5rJyFdgXjciSMQv3SO kBIOvj38CjZsz2OdJMXYnZiLkM+rDfksaBnwZhhdS4WMk8sd3Jofz+pWg1phvjGD5yp5 3YGTY2m5GTDAiwiD3aCQQi9/YpUSpcGIz/D/o06EB42sAvmCQ3ocKvhUSm5o4nu8XD4F KSAg==
X-Gm-Message-State: APjAAAWV3ahkdsCinayNVxy4n8O/buJY7Hzl+89HIwkrFzT6tNqVVihd setWZQze/X3zYOQ86iXMzahUPKlko4/TBfRP41k=
X-Google-Smtp-Source: APXvYqwS5ygwa4PBCt2M42AAOqces8Z0WgWHQ+MrrJlngeDjOErdV3CYi5IrPj9ofaVs7LNbJH5yBHW/fXGsRivgFm8=
X-Received: by 2002:a5d:8e0c:: with SMTP id e12mr17871643iod.31.1558814905242; Sat, 25 May 2019 13:08:25 -0700 (PDT)
MIME-Version: 1.0
References: <DE595AFF-5DEA-4A32-8527-10B841D6C7C1@edvina.net> <CAGL6epLMHoneH6PNgeF5TgJhveh-xWeZSW6XQDBB2Gf5mS9eRQ@mail.gmail.com> <C1431DCD-C4DD-4BFA-9C5D-E4DFE7B0F2DA@edvina.net> <B4A08741-A092-480C-AE12-2DD25D7835D0@ericsson.com> <CAGL6epJTv+Dytk_VHNi4Sk0mimVj=cMqWR4u9uSg1q+RcUQJ_Q@mail.gmail.com> <98D9E38D-4EA3-4F55-B37D-5334FA42F362@ericsson.com> <CAGL6epL7y0jiOqBdt3UOkx31ueQofh-W8vPwjvOUZhHZsaDq3A@mail.gmail.com> <2BD32E4F-AA3F-4C61-BE9F-037353FA4083@ericsson.com> <CAGL6ep+F4Wj6uQMyLttvRaTDmROg=J8__6nwkeCNHgJTR1db_A@mail.gmail.com> <74E1C0B9-8DBE-4301-998F-66A8329CB408@ericsson.com> <CAGL6epJUBoFPWsdzYu6bKx9qVLr20btLDQ3R7DwpvxbD-CQ7dQ@mail.gmail.com> <5671B78F-88CE-4528-B2C9-3B92AA2752A1@ericsson.com>
In-Reply-To: <5671B78F-88CE-4528-B2C9-3B92AA2752A1@ericsson.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Sat, 25 May 2019 16:08:14 -0400
Message-ID: <CAGL6epLb7GTKT3kExc-vta6h2Pym=PW=20vL-JSK6B77j9VthQ@mail.gmail.com>
To: Christer Holmberg <christer.holmberg@ericsson.com>
Cc: "Olle E. Johansson" <oej@edvina.net>, SIPCORE <sipcore@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000b29ab40589bbe0c3"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/SjdBuzmf0Vby1kdW4o46rX02PLw>
Subject: Re: [sipcore] draft-ietf-sipcore-digest-scheme comments
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 May 2019 20:08:29 -0000

On Sat, May 25, 2019 at 3:36 PM Christer Holmberg <
christer.holmberg@ericsson.com> wrote:

> Hi,
>
> ...
>
> >>>>>>>> Section 2.4:
> >>>>>>>>
> >>>>>>>> "When the UAC receives a response with multiple header fields
> with the
> >>>>>>>>   same realm it SHOULD use the topmost header field that it
> supports,
> >>>>>>>>   unless a local policy dictates otherwise.”
> >>>>>>>>
> >>>>>>>> Why a SHOULD? I would prefer a MUST.
> >>>>>>>
> >>>>>>> I can do that, but the last part of this paragraph states that
> local policy can override this recommendations anyway.
> >>>>>>> So, does it make any difference?
> >>>>>>> Should we allow that? Why would local policy enforce a downgrade?
> >>>>>>>
> >>>>>>>> “When the UAC receives a 401 response with multiple
> WWW-Authenticate
> >>>>>>>>   header fields with different realms it SHOULD retry and include
> an
> >>>>>>>>   Authorization header field containing credentials that match the
> >>>>>>>>   topmost header field of any one of the realms.”
> >>>>>>>>
> >>>>>>>> If you are disallowing multiple Authorization headers for the
> same realm,
> >>>>>>>> but with different algorithms I think this should be clearly
> written. In my
> >>>>>>>> view, that would be a good thing.
> >>>>>>>
> >>>>>>> This is allowed.
> >>>>>>
> >>>>>> RFC 3261 does not say anything about using the topmost header, does
> it?
> >>>>>>
> >>>>>> I was referring to this document.
> >>>>>
> >>>>> So, the should-use-topmost is something new, defined in this
> document?
> >>>>
> >>>> Yes, as per RFC7616.
> >>>
> >>> Perhaps then say "As defined in RFC7617,...."
> >>>
> >>> And, perhaps mention it in section 2, where the changes are listed.
> >>>
> >>> The normative text for SIP is specified in this document, so I do not
> see the need to add such a sentence.
> >>
> >> When we update an RFC, it is good to have an overview about what the
> updates are, so that people don't have to start reading 3261, 7617
> >> and try to figure out themselves. They will obviously have to read the
> RFCs to figure out the details, but it helps if they know what the updates
> >> are about.
> >
> > Section 2 is all about the changes introduced to the Digest mechanism.
>
> Yes, but that doesn't really say anything about what exactly is updated.
>
> > If that is not sufficient, can you propose some text?
>
> Something like this:
>
> "2.  Updates RFC 3261
>

I do not see the need for this change. The first page has "Update: 3261"
and the first sentence in section 2 explicitly states that again.


> This section replaces the reference to RFC2617 with a reference to RFC7617
> in RFC3261, and
> describes the modifications to the usage of the Digest mechanism in
> RFC3261 resulting from
> that reference update. It adds support for the SHA-256 and SHA-512/256
> algorithms. It adds
> required support for the "qop" option. It provides additional UAC and UAS
> procedures regarding usage of
> multiple SIP Authorization, WWW-Authenticate and Proxy-Authenticate header
> fields, including
> in which order to insert and process them. It provides guidance regarding
> forking. Finally, it
> updates the SIP protocol BNF as required by the updates."
>
> Feel free to modify, remove - or add if I have forgot something.
>
> All of this is specified later in section 2, but if this helps someone, I
do not mind adding this to section 2.


>
> In addition, I suggest to change the names of subsections 2.3 and 2.4.
>
> The current name of subsection 2.3 is "The Authenticate Response Header
> Field". But, there is no such header field described. The section talks
> about other header fields (with similar names). Could we simply call it
> "UAS behavior"?
>
> The current name of subsection 2.4 is "The Authorization Request Header
> Field". But, the section also talks about the WWW-Authenticate header
> field. Could we simply call it "UAC behavior"?
>
>
Sure. I can make these changes.

Regards,
 Rifaat




> Regards,
>
> Christer
>
>
>