Re: [tram] Stephen Farrell's Discuss on draft-ietf-tram-turn-third-party-authz-13: (with DISCUSS and COMMENT)

Oleg Moskalenko <mom040267@gmail.com> Tue, 14 April 2015 05:26 UTC

Return-Path: <mom040267@gmail.com>
X-Original-To: tram@ietfa.amsl.com
Delivered-To: tram@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 28C181B33A4; Mon, 13 Apr 2015 22:26:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.75
X-Spam-Level:
X-Spam-Status: No, score=-1.75 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id anm3d1l-YwIo; Mon, 13 Apr 2015 22:26:32 -0700 (PDT)
Received: from mail-wg0-x235.google.com (mail-wg0-x235.google.com [IPv6:2a00:1450:400c:c00::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A1AFD1B339E; Mon, 13 Apr 2015 22:26:31 -0700 (PDT)
Received: by wgyo15 with SMTP id o15so102908431wgy.2; Mon, 13 Apr 2015 22:26:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=FjHccdJvcl44EaAfLFlOAasgwZw/HXAkSZptJO2z8bE=; b=NClXDfMGLdnNTCLFj0QFC5V9F/37hrOGodQf3CbPX/n9JeRK8v2RAdX2u4JsVtdpbW JIvZy8kwJmL7wt6vTqne1fEKaaIHZQPTGXpOwLKoc/wQy3HGlIIAmh7IQ0F+Ry5yD9xc BnDBhQCDMEUbOKk1I0uGZLm+TdDdAwDfF+SVk4W7TJZvB3+fCkD2CUElL3HPxIwgYG8g GgO6MNbpd91S5zyujtySQzjgb7spUvjX1WQkECnNFC21YA9EwPPacwu6Qx/77YRIReSV eohDdnI4E4F8WFPVD7puXZmsgWjy6jXLe6R5V/jVxFYXdW/6GKERr2yr/MaBkqb2oiUX oi5A==
MIME-Version: 1.0
X-Received: by 10.194.157.68 with SMTP id wk4mr33808255wjb.130.1428989190446; Mon, 13 Apr 2015 22:26:30 -0700 (PDT)
Received: by 10.194.190.7 with HTTP; Mon, 13 Apr 2015 22:26:30 -0700 (PDT)
In-Reply-To: <CABkgnnUyHTd83LWM0Lp0xOJnVp3Gt6KvrbuGkraejP7kwEJf7w@mail.gmail.com>
References: <20150410193813.20376.40907.idtracker@ietfa.amsl.com> <55282B4E.4000409@akamai.com> <913383AAA69FF945B8F946018B75898A411FFC5F@xmb-rcd-x10.cisco.com> <CABkgnnUyHTd83LWM0Lp0xOJnVp3Gt6KvrbuGkraejP7kwEJf7w@mail.gmail.com>
Date: Mon, 13 Apr 2015 22:26:30 -0700
Message-ID: <CALDtMrLO-kqM4LTOgKJq90swE52k0draQ110t5Q8GVfUwPFpUQ@mail.gmail.com>
From: Oleg Moskalenko <mom040267@gmail.com>
To: Martin Thomson <martin.thomson@gmail.com>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <http://mailarchive.ietf.org/arch/msg/tram/qIE38ACF00arZjRODLyfWlxSCvA>
Cc: "tram-chairs@ietf.org" <tram-chairs@ietf.org>, "tram@ietf.org" <tram@ietf.org>, Brandon Williams <brandon.williams@akamai.com>, "rlb@ipv.sx" <rlb@ipv.sx>, "Salz, Rich" <rsalz@akamai.com>, "Tirumaleswar Reddy (tireddy)" <tireddy@cisco.com>, "Stephen Farrell (stephen.farrell@cs.tcd.ie)" <stephen.farrell@cs.tcd.ie>
Subject: Re: [tram] Stephen Farrell's Discuss on draft-ietf-tram-turn-third-party-authz-13: (with DISCUSS and COMMENT)
X-BeenThere: tram@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussing the creation of a Turn Revised And Modernized \(TRAM\) WG, which goal is to consolidate the various initiatives to update TURN and STUN." <tram.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tram>, <mailto:tram-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tram/>
List-Post: <mailto:tram@ietf.org>
List-Help: <mailto:tram-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tram>, <mailto:tram-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Apr 2015 05:26:33 -0000

On Mon, Apr 13, 2015 at 11:17 AM, Martin Thomson
<martin.thomson@gmail.com> wrote:
>
> Section 1 doesn't really explain what the draft provides.

I disagree. It is pretty clear on general description what this draft
is about. At least, it was obvious to me from the very first reading.

>
> Section 3 claims to be an overview, but it doesn't actually describe
> what happens.  It leaves the token acquisition part out of scope.
> That's fine, but it doesn't describe how the THIRD-PARTY-AUTHORIZATION
> attribute might be used, even in the broadest sense.

It describes it in section 6.1.

> It doesn't
> explain why it's a server name, or how that name relates to the domain
> name of the server (i.e., the one that might have been passed to a DNS
> resolver).

"Server name" is just a logical whatever name. It is not related to
anything that you mentioned; that is just a well-known name, set by
the STUN server administrator. I believe that this is pretty clear
from the text.

>
> Section 4 doesn't permit any additional information to be carried in
> the token.  Therefore, the STUN/TURN server is unable to apply any
> additional policies that the authorization server might impose, such
> as limits on the length of the session, the number of ports allocated,
> or the bandwidth that is allocated.  (Or whatever we might later
> conceive of.)

I believe that extra token information is a very very bad idea - it
kills the whole interoperability thing in the draft. If we are adding
"extra" information to the token, we can as well just kill the draft
and tell the STUN server developers "do whatever you want, secure the
stuff somehow, we do not care".

>
> It's not clear what Section 4.1.1 is for.  If this is private
> communications, then it is far too specific.  If this is intended to
> be normative, then it isn't sufficient.

That is something that I agree with.

>  What is the base URI?  What
> prevents a random internet denizen from acquiring this symmetric key?

I suppose that's pretty clear that the AS and STUN server mutual
communications are protected by TLS certificates that they trust.

> Why these two specific parameters?  Why does the expiration
> information in the JWK replicate what HTTP provides?  I'd be far
> happier with hand-waving than with this section in place.
>
> Section 5 fails to explicitly state whether the MAC key is used as
> input to short term or long term credentials.  It needs to say short
> term, I think.

No. The whole document is about the LONG-TERM credentials. That's
pretty clear for everybody who followed the STUN security, and it is
getting mentioned in the text many times (just search for "long-term"
on the page).

>
> Why does this document use 'kid' rather than USERNAME?  Isn't the
> point to get a short term  username+password pair from the
> authorization server?
>
> Section 7 seems to imply two layers of authentication: the AEAD and
> some HMAC.  I can't work out what is being authenticated.  I'm not
> sure that anyone else could either.

I am afraid that you simply need more time to read that document.

Thanks
Oleg