Hello,
I haven’t seen any comment on the mailing list for my comments on the reviews
regarding the IANA RDAP bootstrap registries being served by secure transport
(aka https).
However, I got a notice from IANA that they have changed from http to https to
access the bootstrap registries.
Therefore, -06, just published, now says: "the registries MUST be accessible
only through HTTPS (TLS RFC8446) transport.”
I will respond to the data tracker reviews from Benjamin and Scott in the next
emails, related to this issue.
So to me, -06 is the final version ready for RFC editor queue.
Marc.
> Le 25 janv. 2022 à 18:58, Marc Blanchet a écrit :
>
> Hello,
> As part of the reviews of draft-ietf-regext-rfc7484bis-04 for Internet
> Standard, Benjamin Kaduk has commented as follows:
>
>
> Section 3
>
> The RDAP Bootstrap Service Registries, as specified in Section 13
> below, have been made available as JSON [RFC8259] objects, which can
> be retrieved via HTTP from locations specified by IANA. The JSON
>
> While in a certain technical sense, using HTTPS still qualifies as
> "retrieved via HTTP", I'd suggest changing this to "HTTPS" to provide
> more straightforward guidance to use the access mechanism that provides
> integrity protection and source authenticity.
>
> …
>
> Section 11
>
> The
> transport used to access the registries can be more secure by using
> TLS [RFC8446], which IANA supports.
>
> In a similar vein to Roman's comment, I note the following text from RFC
> 7481:
>
> %HTTP over TLS MUST be used to
> % protect all client-server exchanges unless operational constraints
> % make it impossible to meet this requirement. [...]
>
> It seems that we could use a different phrasing here that is more
> commensurate with the requirements of STD 95.
>
>
>
> Scott Kelly commented in his review:
>
>
> Scott Kelly
>
> From the abstract:
> This document specifies a method to find which Registration Data
> Access Protocol (RDAP) server is authoritative to answer queries for
> a requested scope, such as domain names, IP addresses, or Autonomous
> System numbers. This document obsoletes RFC7484
>
> Here is the security considerations section:
>
> "By providing a bootstrap method to find RDAP servers, this document
> helps to ensure that the end users will get the RDAP data from an
> authoritative source, instead of from rogue sources. The method has
> the same security properties as the RDAP protocols themselves. The
> transport used to access the registries can be more secure by using
> TLS [RFC8446], which IANA supports.
>
> Additional considerations on using RDAP are described in [RFC7481]."
>
> Because this document is updating RFC7484, and because these security
> considerations are copied verbatim from that doc, I hesitate to raise my
> concern. Nonetheless, I think the assertion that this document "helps to
> ensure that the end users will get the RDAP data from an authoritative
> source, instead of from rogue sources." is questionable. I think the
> suggestion to use TLS helps, but I think it would be better to say something
> like this:
>
> "This document specifies a method to find which RDAP server is authoritative
> to answer queries for a requested scope, such as domain names, IP addresses,
> or Autonomous System numbers. If this data is not authenticated, an adversary
> may inject data that redirects the user to a rogue RDAP server. A robust
> authentication method such as may be provided by TLS [RFC8446] SHOULD be
> utilized to protect against this.
>
> Additional considerations on using RDAP are described in [RFC7481]."
>
> I'm not attached to the precise wording, but I think implementers should be
> told what the risks are, and how to mitigate them. I don't think the current
> security considerations quite hit that aspiration.
>
>
>
> Furthermore, referring to SK text proposal, Benjamin Kaduk added:
>
>
> This is a good template for actual text to put in the document that covers
> TLS usage and the need for it. However, I think we may even be able to do
> better than "TLS SHOULD be utilized", since (as I understand it) RFC 7481
> has a requirement that "HTTP over TLS MUST be used to protect all
> client-server exchanges unless operational constraints make it impossible
> to meet this requirement." So, we might end this text instead with
> "A robust authentication method is provided by TLS [RFC8446], and
> accordingly the use of TLS is required by RFC 7481 in the absence of
> operational constraints that make use of TLS impossible; in such cases,
> alternative authentication methods SHOULD be utilized to protect against
> such risks.”
>
>
> I contacted IANA to ask them if there is any issue for them if we require
> HTTPS for accessing the registries. I’ve been told that:
> - they currently serve both http