Re: [Unbearable] on not listing 'Sec-Token-Binding' in the Connection header field?

Amos Jeffries <squid3@treenet.co.nz> Thu, 09 February 2017 19:14 UTC

Return-Path: <squid3@treenet.co.nz>
X-Original-To: unbearable@ietfa.amsl.com
Delivered-To: unbearable@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DE772129C5A for <unbearable@ietfa.amsl.com>; Thu, 9 Feb 2017 11:14:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.109
X-Spam-Level:
X-Spam-Status: No, score=-1.109 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RDNS_NONE=0.793, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id taW-9DjSnbit for <unbearable@ietfa.amsl.com>; Thu, 9 Feb 2017 11:14:26 -0800 (PST)
Received: from treenet.co.nz (unknown [121.99.228.82]) by ietfa.amsl.com (Postfix) with ESMTP id A96671299EF for <unbearable@ietf.org>; Thu, 9 Feb 2017 11:14:26 -0800 (PST)
Received: from [192.168.20.251] (unknown [121.98.40.15]) by treenet.co.nz (Postfix) with ESMTP id 1D6CAE6EBA for <unbearable@ietf.org>; Fri, 10 Feb 2017 08:14:24 +1300 (NZDT)
To: unbearable@ietf.org
References: <e56976df-c7e7-6dde-8f27-9aeb152f66ab@KingsMountain.com> <CY1PR0301MB084254BDDD2E72104D20BE9A8C430@CY1PR0301MB0842.namprd03.prod.outlook.com> <C97FF7A1-5EAB-4117-A9D2-65C9A9993A8F@ve7jtb.com> <CADHfa2A-kpD_swEzMue33eeKj=Xd6_au2KL=XD+AmYq=m6hrdw@mail.gmail.com> <43DD0CF0-4043-448D-BE38-FAFFDE779B57@ve7jtb.com> <CY1PR0301MB08423324E89771A0EEDD72068C420@CY1PR0301MB0842.namprd03.prod.outlook.com>
From: Amos Jeffries <squid3@treenet.co.nz>
Message-ID: <d975388a-7a09-4842-89dc-7a2bd94ba0ff@treenet.co.nz>
Date: Fri, 10 Feb 2017 08:14:01 +1300
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.7.1
MIME-Version: 1.0
In-Reply-To: <CY1PR0301MB08423324E89771A0EEDD72068C420@CY1PR0301MB0842.namprd03.prod.outlook.com>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/unbearable/ScsOkatQj9ULWrYZjtaiaWUrLik>
Subject: Re: [Unbearable] on not listing 'Sec-Token-Binding' in the Connection header field?
X-BeenThere: unbearable@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "\"This list is for discussion of proposals for doing better than bearer tokens \(e.g. HTTP cookies, OAuth tokens etc.\) for web applications. The specific goal is chartering a WG focused on preventing security token export and replay attacks.\"" <unbearable.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/unbearable>, <mailto:unbearable-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/unbearable/>
List-Post: <mailto:unbearable@ietf.org>
List-Help: <mailto:unbearable-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/unbearable>, <mailto:unbearable-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Feb 2017 19:14:30 -0000

On 9/02/2017 6:20 a.m., Andrei Popov wrote:
> Ø  The Connect header is for the client to tell a proxy "this header
> really doesn't make sense to forward, please drop it on the next
> hop". …but in the case of the Sec-Token-Binding header, the client
> does not know whether it makes sense to forward or not. The client,
> generally, does not know whether the proxy or TLS terminator
> validates bindings, passes them along for the application server to
> validate, or strips them altogether.
> 

The Connection header is not particularly about proxies. It is simply
about distinguishing hop-by-hop things from end-to-end so any naive/old
HTTP recipient can keep the relevant data secure in a fail-closed way.

Since the TLS is hop-by-hop the preferred behaviour ought to be a
MUST/SHOULD for listing in Connection header to meet the RFC 7230
conditions.

If the recipient happens to be TB-aware and non-validating (for any
reason, not just TTRPs). Then RFC 7230 grants the ability to forward on
both the Sec-Token-Binding and Connection:Sec-Token-Binding headers as
being relevant to the next-hop it is using.

ie. the "(or replace it with the intermediary's own connection options
for the forwarded message)" clause is what applies to non-validating
recipients.

However the non-validating case should be an exception rather than the
norm. Specifically called out as such for TTRPs etc.


HTH
Amos