Re: [Unbearable] on not listing 'Sec-Token-Binding' in the Connection header field?

Amos Jeffries <squid3@treenet.co.nz> Thu, 09 February 2017 19:49 UTC

Return-Path: <squid3@treenet.co.nz>
X-Original-To: unbearable@ietfa.amsl.com
Delivered-To: unbearable@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5E05D1294F4 for <unbearable@ietfa.amsl.com>; Thu, 9 Feb 2017 11:49:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.109
X-Spam-Level:
X-Spam-Status: No, score=-1.109 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RDNS_NONE=0.793, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cyDMS4PXV5Ca for <unbearable@ietfa.amsl.com>; Thu, 9 Feb 2017 11:49:42 -0800 (PST)
Received: from treenet.co.nz (unknown [121.99.228.82]) by ietfa.amsl.com (Postfix) with ESMTP id ECB3612943A for <unbearable@ietf.org>; Thu, 9 Feb 2017 11:49:41 -0800 (PST)
Received: from [192.168.20.251] (unknown [121.98.40.15]) by treenet.co.nz (Postfix) with ESMTP id 7C200E6EBA for <unbearable@ietf.org>; Fri, 10 Feb 2017 08:49:38 +1300 (NZDT)
To: unbearable@ietf.org
References: <e56976df-c7e7-6dde-8f27-9aeb152f66ab@KingsMountain.com> <CY1PR0301MB084254BDDD2E72104D20BE9A8C430@CY1PR0301MB0842.namprd03.prod.outlook.com> <C97FF7A1-5EAB-4117-A9D2-65C9A9993A8F@ve7jtb.com> <CADHfa2A-kpD_swEzMue33eeKj=Xd6_au2KL=XD+AmYq=m6hrdw@mail.gmail.com> <43DD0CF0-4043-448D-BE38-FAFFDE779B57@ve7jtb.com> <CY1PR0301MB08423324E89771A0EEDD72068C420@CY1PR0301MB0842.namprd03.prod.outlook.com> <d975388a-7a09-4842-89dc-7a2bd94ba0ff@treenet.co.nz> <AB2B80EF-2726-4C61-837B-17F668064D66@ve7jtb.com>
From: Amos Jeffries <squid3@treenet.co.nz>
Message-ID: <d5d7678b-2c40-843e-2a54-52950f604122@treenet.co.nz>
Date: Fri, 10 Feb 2017 08:48:55 +1300
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.7.1
MIME-Version: 1.0
In-Reply-To: <AB2B80EF-2726-4C61-837B-17F668064D66@ve7jtb.com>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/unbearable/lAO-lxipZqjJ_aYm_gcODzNGJSI>
Subject: Re: [Unbearable] on not listing 'Sec-Token-Binding' in the Connection header field?
X-BeenThere: unbearable@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "\"This list is for discussion of proposals for doing better than bearer tokens \(e.g. HTTP cookies, OAuth tokens etc.\) for web applications. The specific goal is chartering a WG focused on preventing security token export and replay attacks.\"" <unbearable.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/unbearable>, <mailto:unbearable-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/unbearable/>
List-Post: <mailto:unbearable@ietf.org>
List-Help: <mailto:unbearable-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/unbearable>, <mailto:unbearable-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Feb 2017 19:49:43 -0000

On 10/02/2017 8:24 a.m., John Bradley wrote:
> So it is valid in hop by hop for the proxy to pass on the original
> header information as its own for the next hop if that is the correct
> thing to do?
> 
> I suppose that is largely what happens with keep-alive.
> 

Yes.

The other parallel is the various Proxy-Auth* headers from RFC 7235.
Which are defined explicitly as point-to-point (not quite hop-by-hop, so
Connection entry is optional) then section 4.4 explicitly calls out the
exception case:
"
   ... When multiple proxies are used in a chain,
   the Proxy-Authorization header field is consumed by the first inbound
   proxy that was expecting to receive credentials.  A proxy MAY relay
   the credentials from the client request to the next proxy if that is
   the mechanism by which the proxies cooperatively authenticate a given
   request.
"

This is almost exactly the same as the intended behaviour for the
non-validating TTRP use case with Sec-Token-Binding.

Amos