Re: [Unbearable] on not listing 'Sec-Token-Binding' in the Connection header field?

Amos Jeffries <squid3@treenet.co.nz> Thu, 09 February 2017 18:52 UTC

Return-Path: <squid3@treenet.co.nz>
X-Original-To: unbearable@ietfa.amsl.com
Delivered-To: unbearable@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0977A1293EE for <unbearable@ietfa.amsl.com>; Thu, 9 Feb 2017 10:52:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.109
X-Spam-Level:
X-Spam-Status: No, score=-1.109 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RDNS_NONE=0.793, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HlF6N_Cq7pLF for <unbearable@ietfa.amsl.com>; Thu, 9 Feb 2017 10:52:02 -0800 (PST)
Received: from treenet.co.nz (unknown [121.99.228.82]) by ietfa.amsl.com (Postfix) with ESMTP id C5F3F127076 for <unbearable@ietf.org>; Thu, 9 Feb 2017 10:52:00 -0800 (PST)
Received: from [192.168.20.251] (unknown [121.98.40.15]) by treenet.co.nz (Postfix) with ESMTP id ED095E6EBA for <unbearable@ietf.org>; Fri, 10 Feb 2017 07:51:58 +1300 (NZDT)
To: unbearable@ietf.org
References: <935ac509-1e0f-3fed-0239-04cf390ef2ce@KingsMountain.com> <CY1PR0301MB084218FB63BE0A51C6045AE18C450@CY1PR0301MB0842.namprd03.prod.outlook.com>
From: Amos Jeffries <squid3@treenet.co.nz>
Message-ID: <a0746b9e-cec0-4c13-eadf-82249aa80146@treenet.co.nz>
Date: Fri, 10 Feb 2017 07:51:32 +1300
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.7.1
MIME-Version: 1.0
In-Reply-To: <CY1PR0301MB084218FB63BE0A51C6045AE18C450@CY1PR0301MB0842.namprd03.prod.outlook.com>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/unbearable/yFI-Yrm5_j9unnQX0CNHZk_XHyI>
Subject: Re: [Unbearable] on not listing 'Sec-Token-Binding' in the Connection header field?
X-BeenThere: unbearable@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "\"This list is for discussion of proposals for doing better than bearer tokens \(e.g. HTTP cookies, OAuth tokens etc.\) for web applications. The specific goal is chartering a WG focused on preventing security token export and replay attacks.\"" <unbearable.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/unbearable>, <mailto:unbearable-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/unbearable/>
List-Post: <mailto:unbearable@ietf.org>
List-Help: <mailto:unbearable-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/unbearable>, <mailto:unbearable-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Feb 2017 18:52:04 -0000

On 10/02/2017 7:18 a.m., Andrei Popov wrote:
> Hi Jeff,
> 
> If you agree that the client, generally, does not know whether the proxy/TLS terminator validates TB or passes it on to the back-end server, then why do you argue that the client should require the proxy to drop TB headers? I believe the client should not interfere with this and let datacenter infrastructure figure out how/where to handle TB headers.
> 
>> ..which is what we want by default for security considerations reasons, I think.
> Sorry, what security considerations reasons are you referring to?
> 

* Leaking the TB values from TLS terminating proxies. *unless* they are
intentionally non-validating reverse-proxies.

* to be sure the Sec-Token-Binding actually belongs to the TLS
connection the HTTP message was transmitted over. Not being injected by
an attacker.

* to pevent multiple Sec-Token-Binding being delivered on a message if
there happened to be multiple different TLS hops along the way. To
ensure attackers can't just send multiple TBH and hope one gets accepted.

Amos