Re: [Unbearable] on not listing 'Sec-Token-Binding' in the Connection header field?
John Bradley <ve7jtb@ve7jtb.com> Thu, 09 February 2017 18:57 UTC
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: unbearable@ietfa.amsl.com
Delivered-To: unbearable@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5636E129C3F for <unbearable@ietfa.amsl.com>; Thu, 9 Feb 2017 10:57:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ve7jtb-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id krw5V7HiNqjw for <unbearable@ietfa.amsl.com>; Thu, 9 Feb 2017 10:57:44 -0800 (PST)
Received: from mail-qk0-x234.google.com (mail-qk0-x234.google.com [IPv6:2607:f8b0:400d:c09::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 23CD0129540 for <unbearable@ietf.org>; Thu, 9 Feb 2017 10:57:44 -0800 (PST)
Received: by mail-qk0-x234.google.com with SMTP id s140so14851393qke.0 for <unbearable@ietf.org>; Thu, 09 Feb 2017 10:57:44 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ve7jtb-com.20150623.gappssmtp.com; s=20150623; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=mCERIagkteeiDvMUu5mZPZFBU140nkfF8kfGiQ14KcE=; b=VuNLTeanye7kT/673+I9ZLBzCmzAWusbjwjk4dCaW6bNWJAhyVjYKjzlyAWqzor7Md jwRPLVzsR+62uQyGR3lrEDDXHm82j1TZJnFZwmzlmw113w1kXUmqLyjEYXPjvDo3re2c e828a+ImfKQ34oqzCwRKwisY/XtRev23dlO+NPMnzC9zfQIaQ7TKTQ29LcBrMCV2adUf dFaJQraCNf8WcdKqxJSal8agogZOvWogpDRmlhoGzqh75SBYXxxjUorDe48S7LXWaaMT DgbUmrkEv81m4GS+FgUJD5LHptg1iEA8PcSeYsgnqUWZyuBrwefIPnwDZ1eiMFoRLrRb hOww==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=mCERIagkteeiDvMUu5mZPZFBU140nkfF8kfGiQ14KcE=; b=CCjZyZQFm2tPc2l4+1b1AknfaoGLQh5RfxwiT8g94L+quXIbeEUYWbA/hVA4yMvE9y Lr5bBIEXPFxBNaBCvzMfJVpHvsY0NcMfSH/dz6qdPER2uie8n1Z2HhBjKaKdkLLOm1Oc CtHXSS9lNF5M6inDB2tHTWrjulIlHyH8CEx+haFJpfzhd80FSLThgSoMc8kfmvt9M/FN zzHT2+7B7ZgjuyCus9n2TL46Z3qA0q3mtPb4m68bpkLALABcVBZKYEAg/YIh+2xhYrU4 gB3+7TswU1RRh4Sided3hpdPo58gFxlOQ2gUFTBl7AH9Vt6ILN8uOn7ezeA1SS9leeEQ /V4g==
X-Gm-Message-State: AMke39kua6pQ4zhzuhfa/Ep3tOm4yL9J+Y7YnsEhLWi+wW9VcfzX8TsR4SB7LiVBZkhJFvD+
X-Received: by 10.233.216.68 with SMTP id u65mr4429388qkf.68.1486666663079; Thu, 09 Feb 2017 10:57:43 -0800 (PST)
Received: from [192.168.8.100] ([181.201.209.140]) by smtp.gmail.com with ESMTPSA id u29sm9932152qki.4.2017.02.09.10.57.40 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 09 Feb 2017 10:57:42 -0800 (PST)
From: John Bradley <ve7jtb@ve7jtb.com>
Message-Id: <3248A381-14C7-48CC-A78B-B9649191A4BA@ve7jtb.com>
Content-Type: multipart/signed; boundary="Apple-Mail=_AF4CB47E-F11E-4793-AC24-149282CDC3B1"; protocol="application/pkcs7-signature"; micalg="sha1"
Mime-Version: 1.0 (Mac OS X Mail 10.2 \(3259\))
Date: Thu, 09 Feb 2017 15:57:38 -0300
In-Reply-To: <CY1PR0301MB08423422FB68F197584F31B98C450@CY1PR0301MB0842.namprd03.prod.outlook.com>
To: Andrei Popov <Andrei.Popov@microsoft.com>
References: <074faef6-b425-17f8-ac05-223834a2cc0b@KingsMountain.com> <CA+k3eCSwvcKyN6t+9cTLSAJu9+5Uz27Db5NW_zy9W7Bx71gG4Q@mail.gmail.com> <CY1PR0301MB084223E0274288D9B330D16D8C450@CY1PR0301MB0842.namprd03.prod.outlook.com> <C9D5F321-CA4F-4359-96E8-AC436E5B2A13@ve7jtb.com> <CY1PR0301MB08423422FB68F197584F31B98C450@CY1PR0301MB0842.namprd03.prod.outlook.com>
X-Mailer: Apple Mail (2.3259)
Archived-At: <https://mailarchive.ietf.org/arch/msg/unbearable/Pe397XhaNNfG8TsWaCQ46Fzh2xs>
Cc: IETF TokBind WG <unbearable@ietf.org>, Brian Campbell <bcampbell@pingidentity.com>, =JeffH Hodges <Jeff.Hodges@kingsmountain.com>
Subject: Re: [Unbearable] on not listing 'Sec-Token-Binding' in the Connection header field?
X-BeenThere: unbearable@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "\"This list is for discussion of proposals for doing better than bearer tokens \(e.g. HTTP cookies, OAuth tokens etc.\) for web applications. The specific goal is chartering a WG focused on preventing security token export and replay attacks.\"" <unbearable.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/unbearable>, <mailto:unbearable-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/unbearable/>
List-Post: <mailto:unbearable@ietf.org>
List-Help: <mailto:unbearable-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/unbearable>, <mailto:unbearable-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Feb 2017 18:57:46 -0000
If it is negotiating token binding with the server then it can’t pass along the original token binding in the same header without significant confusion I suspect. The bigger short term question is what should a proxy that doesn’t understand token binding do. If token binding is signalled from the user agent as hop by hop then it should drop the header. I think it is better for the server to get no token binding header than one from a client that thinks it has negotiated token binding but it cant validate. The Include-Referred-Token-Binding-ID header should be end to end and not removed by proxies. John B. > On Feb 9, 2017, at 3:48 PM, Andrei Popov <Andrei.Popov@microsoft.com> wrote: > > Ø I dont know that a proxy that doesn’t understand token binding should forward the header especially in the forward case. > Ø > Ø What if the forward proxy is negotiating it’s own token binding to the server? (should a forward proxy proxy do that is perhaps another question) > > Would you agree that if a proxy is negotiating its own TB to the server, then this proxy is TB-aware, and knows what to do about the client’s TB header? > > From: John Bradley [mailto:ve7jtb@ve7jtb.com] > Sent: Thursday, February 9, 2017 10:41 AM > To: Andrei Popov <Andrei.Popov@microsoft.com> > Cc: Brian Campbell <bcampbell@pingidentity.com>; =JeffH Hodges <Jeff.Hodges@kingsmountain.com>; IETF TokBind WG <unbearable@ietf.org> > Subject: Re: [Unbearable] on not listing 'Sec-Token-Binding' in the Connection header field? > > That may be the rub. > > From a header perspective we are talking about any proxy forward and reverse. > > I dont know that a proxy that doesn’t understand token binding should forward the header especially in the forward case. > > What if the forward proxy is negotiating it’s own token binding to the server? (should a forward proxy proxy do that is perhaps another question) > > I understand the desire to pass the header on in the reverse proxy case as it may make server code easier. > > However I take Jeff’s point that token binding is by its nature hop by hop and if we mess with that we may get some unintended side effects. > > If Brian had proposed sticking everything in one or two new headers and removing the existing one then this would be much less controversial. > > I always thought that we could use the same header on the inside of the proxy, but can see why that might mess up some other expectations. > > So is token binding hop by hop? > > John B. > > On Feb 9, 2017, at 3:25 PM, Andrei Popov <Andrei.Popov@microsoft.com <mailto:Andrei.Popov@microsoft.com>> wrote: > > Exactly, I agree with Brian. The proxy/terminator is better positioned to know how/where TB headers are handled in a particular datacenter. And a proxy/terminator that knows nothing about TB headers should forward them on. > > From: Unbearable [mailto:unbearable-bounces@ietf.org <mailto:unbearable-bounces@ietf.org>] On Behalf Of Brian Campbell > Sent: Thursday, February 9, 2017 8:38 AM > To: =JeffH <Jeff.Hodges@kingsmountain.com <mailto:Jeff.Hodges@kingsmountain.com>> > Cc: IETF TokBind WG <unbearable@ietf.org <mailto:unbearable@ietf.org>> > Subject: Re: [Unbearable] on not listing 'Sec-Token-Binding' in the Connection header field? > > > > On Thu, Feb 9, 2017 at 9:55 AM, =JeffH <Jeff.Hodges@kingsmountain.com <mailto:Jeff.Hodges@kingsmountain.com>> wrote: > > I agree with this for security considerations reasons -- we want the Sec-Token-Binding header to be hop-by-hop in sync with the underlying TLS connection and not be "leaked" downstream unless it is a conscious decision, e.g., in the tls terminating reverse proxy (TTRP) case. > > > But the client is only making a connection to a server and client does not know whether it makes sense for that server to forward or not. And it shouldn't know that. Sec-Token-Binding shouldn't be listed in Connection header field by a client. > > _______________________________________________ > Unbearable mailing list > Unbearable@ietf.org <mailto:Unbearable@ietf.org> > https://www.ietf.org/mailman/listinfo/unbearable <https://www.ietf.org/mailman/listinfo/unbearable>
- [Unbearable] on not listing 'Sec-Token-Binding' i… =JeffH
- Re: [Unbearable] on not listing 'Sec-Token-Bindin… Andrei Popov
- Re: [Unbearable] on not listing 'Sec-Token-Bindin… John Bradley
- Re: [Unbearable] on not listing 'Sec-Token-Bindin… John Bradley
- Re: [Unbearable] on not listing 'Sec-Token-Bindin… Dirk Balfanz
- Re: [Unbearable] on not listing 'Sec-Token-Bindin… John Bradley
- Re: [Unbearable] on not listing 'Sec-Token-Bindin… Andrei Popov
- Re: [Unbearable] on not listing 'Sec-Token-Bindin… =JeffH
- Re: [Unbearable] on not listing 'Sec-Token-Bindin… Brian Campbell
- Re: [Unbearable] on not listing 'Sec-Token-Bindin… =JeffH
- Re: [Unbearable] on not listing 'Sec-Token-Bindin… Andrei Popov
- Re: [Unbearable] on not listing 'Sec-Token-Bindin… Andrei Popov
- Re: [Unbearable] on not listing 'Sec-Token-Bindin… John Bradley
- Re: [Unbearable] on not listing 'Sec-Token-Bindin… Andrei Popov
- Re: [Unbearable] on not listing 'Sec-Token-Bindin… Amos Jeffries
- Re: [Unbearable] on not listing 'Sec-Token-Bindin… John Bradley
- Re: [Unbearable] on not listing 'Sec-Token-Bindin… Andrei Popov
- Re: [Unbearable] on not listing 'Sec-Token-Bindin… Amos Jeffries
- Re: [Unbearable] on not listing 'Sec-Token-Bindin… John Bradley
- Re: [Unbearable] on not listing 'Sec-Token-Bindin… Amos Jeffries
- Re: [Unbearable] on not listing 'Sec-Token-Bindin… Andrei Popov
- Re: [Unbearable] on not listing 'Sec-Token-Bindin… =JeffH