Re: [urn] Secure naming of Information Objects

"Kemp, David P." <DPKemp@missi.ncsc.mil> Tue, 05 April 2011 18:32 UTC

Return-Path: <DPKemp@missi.ncsc.mil>
X-Original-To: urn@core3.amsl.com
Delivered-To: urn@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 237D63A696F for <urn@core3.amsl.com>; Tue, 5 Apr 2011 11:32:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level:
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HhGIXBZvXs7y for <urn@core3.amsl.com>; Tue, 5 Apr 2011 11:32:45 -0700 (PDT)
Received: from stingray.missi.ncsc.mil (stingray.missi.ncsc.mil [144.51.50.20]) by core3.amsl.com (Postfix) with ESMTP id E6D2F3A6853 for <urn@ietf.org>; Tue, 5 Apr 2011 11:32:44 -0700 (PDT)
Received: from AUGUSTINE.missi.ncsc.mil (augustine.missi.ncsc.mil [144.51.60.33]) by stingray.missi.ncsc.mil with ESMTP id p35IYOYY018369; Tue, 5 Apr 2011 14:34:24 -0400 (EDT)
Received: from DABECK.missi.ncsc.mil ([144.51.60.16]) by AUGUSTINE.missi.ncsc.mil with Microsoft SMTPSVC(6.0.3790.4675); Tue, 5 Apr 2011 14:33:59 -0400
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
x-mimeole: Produced By Microsoft Exchange V6.5
Date: Tue, 05 Apr 2011 14:34:23 -0400
Message-ID: <C1A47F1540DF3246A8D30C853C05D0DA03B8AD32@DABECK.missi.ncsc.mil>
In-Reply-To: <9690854AFEABB548BBE27CB1615A876F0D1074D5FC@ESESSCMS0363.eemea.ericsson.se>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [urn] Secure naming of Information Objects
Thread-Index: Acvvw7+dPJ7UpLgvTb28RWIJ/iO2SQD7XQlg
References: <9690854AFEABB548BBE27CB1615A876F0D1074D5FC@ESESSCMS0363.eemea.ericsson.se>
From: "Kemp, David P." <DPKemp@missi.ncsc.mil>
To: urn@ietf.org
X-OriginalArrivalTime: 05 Apr 2011 18:33:59.0593 (UTC) FILETIME=[0789C190:01CBF3C0]
Cc: Börje Ohlman <borje.ohlman@ericsson.com>
Subject: Re: [urn] Secure naming of Information Objects
X-BeenThere: urn@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussions about possible revisions to the definition of Uniform Resource Names <urn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/urn>, <mailto:urn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/urn>
List-Post: <mailto:urn@ietf.org>
List-Help: <mailto:urn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/urn>, <mailto:urn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Apr 2011 18:32:46 -0000

Comments on http://datatracker.ietf.org/doc/draft-farrell-ni/:

1) I don't see the benefit of defining syntax without specifying any requirements:

   We expect it will be beneficial for applications to be able to map
   between human-readable URIs and URIs that allow for validation of
   integrity the URI/resource mapping.  However, in order to keep our
   scheme simple and more broadly applicable, all considerations for how
   to map between URIs and for how to access resources using these URIs
   are to be specified elsewhere.  In this memo, we simply define a form
   of URI that can be used hopefully in many different contexts.

The ABNF does not specify any syntax for "other-string", there are no other requirements for "other-string", and there is no defined way to map between an "other-string" and a hash-string.  If all these things are to be specified elsewhere, the value-add of this document saying that an NI can be "ni://" followed by anything including maybe some more slashes, is precisely zero.

This document should define hash URIs only.  If some other document defines a mapping between hashes and something else, then the merits of that mapping can be discussed in the context of that other document.

2) This (at the top of page 4) is bizarrely circular:

    Note that the "/" character from the MIME type MUST be percent
    encoded in order to conform to the ABNF below.  That is "application/
    jpeg" will be presented as "application%2fjpeg".

    mime-type = type %2f subtype

The ABNF could just as easily have been written using a slash, as RFC 2045 defines content-type:

    content := "Content-Type" ":" type "/" subtype

and then the "/" character wouldn't have to be percent encoded.  Is there some reason the ABNF was written using a percent encoding for slash?

3) Why would there be a need to register truncated hash algorithms?  An algorithm is an algorithm, and truncation is truncation - there is no reason to register the cross-product of the two.  The example:

    ni:///sha256:NDVmZTMzOGVkY2JjZGQ0ZmNmZGFlODQ5MjkyZDM0ZTg
    2ZDI5YzllMmU5OTFlNmE2Mjc3ZTFhN2JhNmE4ZjVmMwo

could just as easily be written:

    ni:///sha256:NDVmZTMz

to specify the first 48 bits of the SHA256 hash value.  I don't see the value of a URI that does not uniquely identify a resource.  But if there is some scenario for which collisions are acceptable, there is no useful extra information to be derived from a truncated hash identifier, e.g., ni:///sha256-t48:NDVmZTMz.

4) In general, this draft seems light on specifics and heavy on generalities.  I would prefer to use the more mature http://tools.ietf.org/id/draft-thiemann-hash-urn-01.txt as the starting point for defining hash-based names.

Dave



-----Original Message-----
From: urn-bounces@ietf.org [mailto:urn-bounces@ietf.org] On Behalf Of Börje Ohlman
Sent: Thursday, March 31, 2011 1:01 PM
To: urn@ietf.org
Subject: [urn] Secure naming of Information Objects

As I mentioned at the WG meeting today we (people working on Information Centric Networking) have done some work on how to name information objects. We have noted that there are a number of working groups within the IETF that , we think, could have use of such a common naming scheme, e.g. PPSP, DECADE and CDNI. We think a common naming scheme within the IETF would be useful.

 

Below you find links to two drafts that we have submitted on this subject. It would be very valuable to have your comments on the ideas presented in those drafts. Also suggestions on which would be the best place within the IETF to work on such a common naming scheme would be useful.

 

http://datatracker.ietf.org/doc/draft-dannewitz-ppsp-secure-naming/

http://datatracker.ietf.org/doc/draft-farrell-ni/

 

                             Börje Ohlman