Mario, allow me to make a minor adjustment to my suggestion:
“Servers MUST implement at least one method of access control that limits server connection access to only authorized clients. Implementation of multiple access control methods is RECOMMENDED.” We need to be clear that unauthorized clients should NOT be allowed to send ANYTHING to a server that might get processed as part of an EPP interaction. Scott From: regext <regext-boun...@ietf.org> On Behalf Of Mario Loffredo Sent: Thursday, February 22, 2024 9:30 AM To: Hollenbeck, Scott <shollenbeck=40verisign....@dmarc.ietf.org>; regext@ietf.org Subject: [EXTERNAL] Re: [regext] Fwd: New Version Notification for draft-loffredo-regext-epp-over-http-03.txt Caution: This email originated from outside the organization. Do not click links or open attachments unless you recognize the sender and know the content is safe. Hi Scott, Il 22/02/2024 13:54, Hollenbeck, Scott ha scritto: I understand that there are options available for client authentication, and that this isn’t necessarily easy for clients. However, there are known attacks that can be perpetrated against servers that allow TCP or TLS connections from unauthorized clients. One example is described here: https://hackcompute.com/hacking-epp-servers/<https://secure-web.cisco.com/1ue8wHGIlyxN-IrXsOyzbTYD2z-ImIVuVvGbKx2t8qM3_V_9oPO2stGT8UYOaw49CYpBUhOaoiyd39bmY4CzNUClJixr7ufI3bKnxp_ociah6fFteJluIGb4rWt7wzCHlOsXKuThrqfwmuQKmJ-uaH2YphL5uivdiSfE1M8WROt3QoulHSHuBbNLLeHnXrF6bODtiboQVTmt2jW4C7YnmY2uHo2B93UgH73WgICFH7tWclRkLp6H3jfdX1hRw7kLsxE3DTl-AIx2d_W83y9Gk-IhrvuLJxh3OlyX3mH0FZWk/https%3A%2F%2Fhackcompute.com%2Fhacking-epp-servers%2F> [ML] I will look into this. If there’s something about client certificates that makes them impossible to use, fine, replace them with another required mechanism. As such, the draft should say something like this: Servers MUST implement at least one method of access control that limits server access to only authorized clients. Implementation of multiple access control methods is RECOMMENDED. [ML] Sounds reasonable to me. I'll incorporate this change into the next version. Thanks a lot for your feedback. Best, Mario Scott From: Mario Loffredo <mario.loffredo=40iit.cnr...@dmarc.ietf.org><mailto:mario.loffredo=40iit.cnr...@dmarc.ietf.org> Sent: Thursday, February 22, 2024 1:52 AM To: Hollenbeck, Scott <shollenb...@verisign.com><mailto:shollenb...@verisign.com>; regext@ietf.org<mailto:regext@ietf.org> Subject: [EXTERNAL] Re: [regext] Fwd: New Version Notification for draft-loffredo-regext-epp-over-http-03.txt Caution: This email originated from outside the organization. Do not click links or open attachments unless you recognize the sender and know the content is safe. Hi Scott, thanks for your quick reply. Please find my comment below. Il 21/02/2024 13:47, Hollenbeck, Scott ha scritto: Tanks for posting the draft, Mario. One quick question: RFC 5734 (Extensible Provisioning Protocol (EPP) Transport over TCP) states that “Mutual client and server authentication using the TLS Handshake Protocol is REQUIRED”. Section 8 of the draft weakens this requirement, stating that “servers SHOULD require clients to present a digital certificate”. HTTPS requires both TCP and TLS, so why weaken the requirement? [ML] There are technical (1-2), ethical (3) and practical (4) reasons. With regard to reasons 3-4, I can speak on behalf of .it but I'm pretty sure the situation is quite the same in other ccTLDs. 1) In TLS (RFC 5246), servers must provide clients with a certificate but clients may provide servers with a certificate if it is requested by servers. It all depends on the application protocol built on top of HTTPS. If the purpose of requiring clients to issue a certificate is implementing a kind of 2FA to enforce EPP client authentication in addition to client's credentials, that is not the only way to go. For example, .it requires that a client ip address could be used by one only registrar where a registrar can use multiple client ip addresses. The association between them is created out-of-band, stored in the underlying db and recorded in the HTTP session, once it is started . Therefore, at any request, the server (i.e. one of the backend server cited below) is able to verify that noone is trying to impersonate someone else. Definitvely, I wouldn't say that using SHOULD instead of MUST weakens the requirement of enforcing client authentication as long as alternative measures could be as secure as client certificates. 2) In an L7 load balancer (LB), clients issue the requests over HTTPS and the LB forwards the requests to the backend servers (BSs) over HTTP. This is to speed up the communication between the LB and the BSs. There is no need to set up an SSL channel between them because the LB is normally exposed on the border of a protected network while the BSs are inside that network. A firewall filters the access by allowing only the communication on port 443 and only from a selected list of ip addresses. The LB logic for routing the incoming requests is very simple, hence you can easily forward a client ip address but it would be much harder to extract the client identity from a certificate (i.e. either CN or SAN) and forward it through an ad-hoc HTTP request header field to let the BS verifies the client identity. 3) Most of .it registrars (~ 1100) are italian SMEs managing only .it domains. When, in 2009, .it migrated from the old registration system, based on issuing fax, to the new one, based on issuing EPP commands over HTTP, the mission of that transition was to reduce as much as possible the technological effort required to registrars to comply with the new rules and avoid to discriminate small players who could not be as technologically powerful as the big ones. To make that transition as smooth as possible, we provided some measures to support them in everything. At that time, we evaluated client certificates could appear a practice increasing that technological divide. Then we opted for other fairer and as effective practices. 4) .it domain names market is very dynamic. Companies merge and, as a result of changing the company names, new registrars are registered with new credentials and new client certificate would be needed. Client IP addresses looks more stable. For sure, updating the set of allowed IP addresses per registrar doesn't cost a thing. I'm aware that talking about ethical reasons in a technical forum like RegExt might seem inappropriate but nonetheless think that often non-technical aspects have somewhat an influence on making technical decisions. My apologizes for the long post. Did my best to answer synthetically. Best, Mario Scott From: regext <regext-boun...@ietf.org><mailto:regext-boun...@ietf.org> On Behalf Of Mario Loffredo Sent: Wednesday, February 21, 2024 2:15 AM To: regext@ietf.org<mailto:regext@ietf.org> Subject: [EXTERNAL] [regext] Fwd: New Version Notification for draft-loffredo-regext-epp-over-http-03.txt Caution: This email originated from outside the organization. Do not click links or open attachments unless you recognize the sender and know the content is safe. Hi all, just submitted a new version of draft-loffredo-regext-epp-over-http. Here in the following the most relevant updates: 1. Has been made fully compliant with RFC 5730 2. Aligns with the structure and makeup of EPP over TCP (EoT) in RFC 5734 3. Fully pluggable transport for EPP with EoT 4. Verisign added as co-authors If the agenda of next meeting was not full, I would like to have a 10-minute slot to present the updates a bit more in detail. Any feedback is appreciated. Best, Mario -------- Messaggio Inoltrato -------- Oggetto: New Version Notification for draft-loffredo-regext-epp-over-http-03.txt Data: Tue, 20 Feb 2024 23:11:09 -0800 Mittente: internet-dra...@ietf.org<mailto:internet-dra...@ietf.org> A: Dan Keathley <dkeath...@verisign.com><mailto:dkeath...@verisign.com>, Daniel Keathley <dkeath...@verisign.com><mailto:dkeath...@verisign.com>, James Gould <jgo...@verisign.com><mailto:jgo...@verisign.com>, Lorenzo Luconi Trombacchi <lorenzo.luc...@iit.cnr.it><mailto:lorenzo.luc...@iit.cnr.it>, Lorenzo Trombacchi <lorenzo.luc...@iit.cnr.it><mailto:lorenzo.luc...@iit.cnr.it>, Mario Loffredo <mario.loffr...@iit.cnr.it><mailto:mario.loffr...@iit.cnr.it>, Maurizio Martinelli <maurizio.martine...@iit.cnr.it><mailto:maurizio.martine...@iit.cnr.it> A new version of Internet-Draft draft-loffredo-regext-epp-over-http-03.txt has been successfully submitted by James Gould and posted to the IETF repository. Name: draft-loffredo-regext-epp-over-http Revision: 03 Title: Extensible Provisioning Protocol (EPP) Transport over HTTP Date: 2024-02-20 Group: Individual Submission Pages: 10 URL: https://www.ietf.org/archive/id/draft-loffredo-regext-epp-over-http-03.txt<https://secure-web.cisco.com/1KC6jFTUqMZOdJ6Po7DLUvEx4bz0ukpJdTEJRZF3dOUg7kFe2kdc4o1QYJSN-A5KRI4ajga3mx9j5Tsu1bi5St5Cx-uNAPP-zwZf_HA62hPwz_9eg00egGGltzTsNNaDizHZCJ8Qfk_M3mODWdby1rFTWL-6XrwRg7jx4CAvpx2iygBoEYzI8nSfyrndF2LS3hCQzMKD9uwb2RWuaAlkMVLJlEApMtxPPTF80K-Epc3S4QwSDz7vCBUTOBc9MwJ9HP1_piTsR_qHHxi4hxILn5bJxyanwkmh2HtYgTGuGrh4/https%3A%2F%2Fwww.ietf.org%2Farchive%2Fid%2Fdraft-loffredo-regext-epp-over-http-03.txt> Status: https://datatracker.ietf.org/doc/draft-loffredo-regext-epp-over-http/<https://secure-web.cisco.com/1WgECIVUjOIAsR-iTFVZofRj22KELPh2hR8mXqt4Ah1RMjkgzKWNgiSYSqjhaC9jGxs2cZbo78tWGijeobZgLB-BWiu0HdBadbM28kt_fooT0Q_E4EmZIh5b-HgRmf7cfA2xW3Jcui1LwreE8les4WDgk91q0c1uVcgT4n2MJgRthft2VpOGu1zCSQhc803p20A9z0q9dQS2MRPq9j8VEPAiJ9kgkXdsmP4hGRtbTga0F8_Wd1hHV1gdDQIDMu_txRFAC-fPjrizrYpJwVy50rv9zq5TeoIabT7CQTRAHU68/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-loffredo-regext-epp-over-http%2F> HTMLized: https://datatracker.ietf.org/doc/html/draft-loffredo-regext-epp-over-http<https://secure-web.cisco.com/1myv8wfhgRLMpRy662lU3LEpvfhXhlua4LmjwmAXrUQVz-SCnWY8NRdZrR5_sVzPKSomr0tAgTTlHV8IeplBfyGb4GuUKwmrSVbViybxm3Hs_9FFlnvoaoLt-eKH29bmOk-AuKVN05pZR_25b-GEHyQswHoPuqmPqqDR-0m4hfJBUNziLQkYTcmMvQWYvZP7jTRw2TH9A7mimZVgX-t_YHRknBIo6VIsRoYsnpLQ0pU9-pkSvfbV2ZBi9Z9AtE9nsBoXOXj-tkY3NKf4VlBN9MBPGWuHFuYEcHsifeI3a1WE/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-loffredo-regext-epp-over-http> Diff: https://author-tools.ietf.org/iddiff?url2=draft-loffredo-regext-epp-over-http-03<https://secure-web.cisco.com/12jI5T3lqP1oAgYgBbf_sR7EUAcL6VKmKLkg2ylT0ex8vwIKgjRHZ23Y0CD2WITQBuuLaQ2ksuqC0wswgmdwPrTl3Nh04Ww9tfhzLmUBBIFzgzTCXyQqSJUiSuo02WMuefoj4FvdkPczACJYDVH_FPgB9NSHwsBf3FusBpBfOuRG24bIj-uEGOxnDzLf3hXuChwIWRZrEn69Lkm45r8V_I_kLZaSfpxGhi-eCgCiKByBtLngPzbReNyOuB3Jytgp2e9Nna_6jLwOEwRx1pkntina57RexI6eqTRyG8JvT5h0/https%3A%2F%2Fauthor-tools.ietf.org%2Fiddiff%3Furl2%3Ddraft-loffredo-regext-epp-over-http-03> Abstract: This document describes how an Extensible Provisioning Protocol (EPP) session is mapped onto a Hypertext Transfer Protocol (HTTP) connection. EPP over HTTP (EoH) requires the use of Transport Layer Security (TLS) to secure EPP information (i.e. HTTPS). The IETF Secretariat -- Dott. Mario Loffredo Senior Technologist Technological Unit “Digital Innovation” Institute of Informatics and Telematics (IIT) National Research Council (CNR) via G. Moruzzi 1, I-56124 PISA, Italy Phone: +39.0503153497 Web: http://www.iit.cnr.it/mario.loffredo<http://secure-web.cisco.com/1o6c2NfEYxxsjKE7HUwmzvM8ny4xX34mbmrT8Rvm6sEhVQyO6-D2WG9MY_Pn8u_iLv2f8wSbItdKvJHo2eI5LEeEXaCG3n8Ue3Vq-bWbF0u0LcDvfg0KqAggaklI3IWf3b8c8PG1o5pxTztoUjDnzOhr3l2QSPDDl6VDYB8o-h3LXz2sOIcAGBY3zVtq3w4le9MLnwy0Re2HbVml2Or8y5Z0gzPzw3kmuQbPuPVvQZyNFvVKsHKQ-FYE2xXyonc9MJKBwn-A_2d5xnLNobAmVOZC8Lc_2uB_1qFVHMmfJGxw/http%3A%2F%2Fwww.iit.cnr.it%2Fmario.loffredo> -- Dott. Mario Loffredo Senior Technologist Technological Unit “Digital Innovation” Institute of Informatics and Telematics (IIT) National Research Council (CNR) via G. Moruzzi 1, I-56124 PISA, Italy Phone: +39.0503153497 Web: http://www.iit.cnr.it/mario.loffredo<http://secure-web.cisco.com/1FMArwksz_849iz9FyumjPDji-GzZShIR7_yIpseQkAVRKCGrbxFcJP9EMCESeSGDcy4tz3wf5nAV4N8pa0IbMlQ5uZeSzwCC2SGaUVBkDPJRLfnPIhBHlMPgjNRer-kS-RvZ47Txo0XwDM-oi4zt37Gkvfx21o2g9bFk6_xouo5n-txGgUYxy5gkbj2nyelQiIJ1MUpOae4KSw-QPrqMTlTz3wS6z6If6ji97TZwrPnC_PfDKPvG4HvaXFZo4P85CV_uWMnuC0fYIQNQeFA-w_ubybvBZdHz45Mn4jzhxPk/http%3A%2F%2Fwww.iit.cnr.it%2Fmario.loffredo>
_______________________________________________ regext mailing list regext@ietf.org https://www.ietf.org/mailman/listinfo/regext