- From: David Schinazi <dschinazi.ietf@gmail.com>
- Date: Thu, 13 Oct 2022 14:55:29 -0700
- To: Nick Harper <ietf@nharper.org>
- Cc: Ilari Liusvaara <ilariliusvaara@welho.com>, HTTP Working Group <ietf-http-wg@w3.org>
- Message-ID: <CAPDSy+44+1QtOecbtbZPWNoOapBS=g2MOYH+4W5L5KhW0YA4wA@mail.gmail.com>
Thanks Ilari and Nick for the reviews. I agree with your points and think we can resolve them in a pretty straightforward way. To make sure we don't lose them, I've filed them as individual GitHub issues < https://github.com/DavidSchinazi/draft-schinazi-httpbis-transport-auth/issues>. We'll look into addressing them once we have a decision from the WG whether there is interest in adoption. David On Thu, Oct 13, 2022 at 2:44 PM Nick Harper <ietf@nharper.org> wrote: > I agree with Ilari - do not use the TLS SignatureAlgorithm and > HashAlgorithm registries that were orphaned by RFC 8447. For (asymmetric) > signatures, you could use the 16-bit TLS SignatureScheme registry ( > https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-signaturescheme > ). > > The draft is very light on details about where the user's key (private or > symmetric) comes from. I assume that key > generation/distribution/registration/etc is out of scope for this draft, > but the draft should address the security properties expected of said key, > e.g. can a key be used for Unprompted Authentication and another use? > > There's no mention of how a server should process this header and respond > to it. Given that the purpose is to be unprobable, the draft should > probably say something to the effect of "if a server receives a header it > is unable to validate, it should process the request as if the header were > not present". The security considerations should also discuss ways that a > server might inadvertently reveal that it serves resources protected by > this mechanism. > > On Thu, Oct 13, 2022 at 1:09 PM Ilari Liusvaara <ilariliusvaara@welho.com> > wrote: > >> On Thu, Oct 13, 2022 at 11:58:56AM -0700, David Schinazi wrote: >> > Hello HTTP enthusiasts, >> > >> > ---------- Forwarded message --------- >> > Name: draft-schinazi-httpbis-unprompted-auth >> > Revision: 00 >> > Title: HTTP Unprompted Authentication >> > Document date: 2022-10-13 >> > Group: Individual Submission >> > Pages: 9 >> > URL: >> > >> https://www.ietf.org/archive/id/draft-schinazi-httpbis-unprompted-auth-00.txt >> >> Some quick comments: >> >> - I do not see requirement for TLS 1.3 or Extended Master Secret >> anywhere. It is not safe to use TLS Exporters for authentication >> otherwise. >> >> - There is no requirement to include hash algorithm in signatures. >> There are TLS signature algorithms that mean totally different >> things depending on hash function, and more of those could >> appear in the future. E.g, signatures 7 and 8 already have double >> meaning (EdDSA [hash 8] and some Chinese stuff [hash 7]). >> >> - The signatures do not appear to be contextualized in any way, >> which is questionable. For example, one could use the same >> contextualization mechanism that TLS 1.3 uses (which prepends >> 64 spaces, a context label and NUL [one zero octet]). >> >> >> >> -Ilari >> >> >> >> >> >> >>
Received on Thursday, 13 October 2022 21:55:54 UTC