[regext] I-D Action: draft-ietf-regext-rfc7484bis-06.txt

2022-01-28 Thread internet-drafts


A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Registration Protocols Extensions WG of the 
IETF.

Title   : Finding the Authoritative Registration Data (RDAP) 
Service
Author  : Marc Blanchet
Filename: draft-ietf-regext-rfc7484bis-06.txt
Pages   : 20
Date: 2022-01-28

Abstract:
   This document specifies a method to find which Registration Data
   Access Protocol (RDAP) server is authoritative to answer queries for
   a requested scope, such as domain names, IP addresses, or Autonomous
   System numbers.  This document obsoletes RFC7484.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-regext-rfc7484bis/

There is also an htmlized version available at:
https://datatracker.ietf.org/doc/html/draft-ietf-regext-rfc7484bis-06

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-regext-rfc7484bis-06


Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts


___
regext mailing list
regext@ietf.org
https://www.ietf.org/mailman/listinfo/regext


Re: [regext] draft-ietf-regext-rfc7484bis: Requiring secure transport for accessing bootstrap registries

2022-01-28 Thread Marc Blanchet
Hello,
 I haven’t seen any comment on the mailing list for my comments on the reviews 
regarding the IANA RDAP bootstrap registries being served by secure transport 
(aka https).
 However, I got a notice from IANA that they have changed from http to https to 
access the bootstrap registries. 

 Therefore,  -06, just published, now says: "the registries MUST be accessible 
only  through HTTPS (TLS RFC8446) transport.”

I will respond to the data tracker reviews from Benjamin and Scott in the next 
emails, related to this issue.

So to me, -06 is the final version ready for RFC editor queue.

Marc.

> Le 25 janv. 2022 à 18:58, Marc Blanchet  a écrit :
> 
> Hello,
>  As part of the reviews of draft-ietf-regext-rfc7484bis-04 for Internet 
> Standard, Benjamin Kaduk has commented as follows:
> 
> 
> Section 3
> 
>   The RDAP Bootstrap Service Registries, as specified in Section 13
>   below, have been made available as JSON [RFC8259] objects, which can
>   be retrieved via HTTP from locations specified by IANA.  The JSON
> 
> While in a certain technical sense, using HTTPS still qualifies as
> "retrieved via HTTP", I'd suggest changing this to "HTTPS" to provide
> more straightforward guidance to use the access mechanism that provides
> integrity protection and source authenticity.
> 
> …
> 
> Section 11
> 
>   The
>   transport used to access the registries can be more secure by using
>   TLS [RFC8446], which IANA supports.
> 
> In a similar vein to Roman's comment, I note the following text from RFC
> 7481:
> 
> %HTTP over TLS MUST be used to
> % protect all client-server exchanges unless operational constraints
> % make it impossible to meet this requirement.  [...]
> 
> It seems that we could use a different phrasing here that is more
> commensurate with the requirements of STD 95.
> 
> 
> 
> Scott Kelly commented in his review:
> 
> 
> Scott Kelly
> 
> From the abstract:
>   This document specifies a method to find which Registration Data
>   Access Protocol (RDAP) server is authoritative to answer queries for
>   a requested scope, such as domain names, IP addresses, or Autonomous
>   System numbers.  This document obsoletes RFC7484
> 
> Here is the security considerations section:
> 
>   "By providing a bootstrap method to find RDAP servers, this document
>   helps to ensure that the end users will get the RDAP data from an
>   authoritative source, instead of from rogue sources.  The method has
>   the same security properties as the RDAP protocols themselves.  The
>   transport used to access the registries can be more secure by using
>   TLS [RFC8446], which IANA supports.
> 
>   Additional considerations on using RDAP are described in [RFC7481]."
> 
> Because this document is updating RFC7484, and because these security 
> considerations are copied verbatim from that doc, I hesitate to raise my 
> concern. Nonetheless, I think the assertion that this document "helps to 
> ensure that the end users will get the RDAP data from an authoritative 
> source, instead of from rogue sources." is questionable. I think the 
> suggestion to use TLS helps, but I think it would be better to say something 
> like this:
> 
> "This document specifies a method to find which RDAP server is authoritative 
> to answer queries for a requested scope, such as domain names, IP addresses, 
> or Autonomous System numbers. If this data is not authenticated, an adversary 
> may inject data that redirects the user to a rogue RDAP server. A robust 
> authentication method such as may be provided by TLS [RFC8446] SHOULD be 
> utilized to protect against this.
> 
> Additional considerations on using RDAP are described in [RFC7481]."
> 
> I'm not attached to the precise wording, but I think implementers should be 
> told what the risks are, and how to mitigate them. I don't think the current 
> security considerations quite hit that aspiration.
> 
> 
> 
> Furthermore, referring to SK text proposal, Benjamin Kaduk added:
> 
> 
> This is a good template for actual text to put in the document that covers
> TLS usage and the need for it.  However, I think we may even be able to do
> better than "TLS SHOULD be utilized", since (as I understand it) RFC 7481
> has a requirement that "HTTP over TLS MUST be used to protect all
> client-server exchanges unless operational constraints make it impossible
> to meet this requirement."  So, we might end this text instead with
> "A robust authentication method is provided by TLS [RFC8446], and
> accordingly the use of TLS is required by RFC 7481 in the absence of
> operational constraints that make use of TLS impossible; in such cases,
> alternative authentication methods SHOULD be utilized to protect against
> such risks.”
> 
> 
> I contacted IANA to ask them if there is any issue for them if we require 
> HTTPS for accessing the registries. I’ve been told that:
> - they currently serve both http

Re: [regext] Benjamin Kaduk's Discuss on draft-ietf-regext-rfc7484bis-04: (with DISCUSS and COMMENT)

2022-01-28 Thread Marc Blanchet


> Le 29 nov. 2021 à 16:37, Benjamin Kaduk via Datatracker  a 
> écrit :
> 
> Benjamin Kaduk has entered the following ballot position for
> draft-ietf-regext-rfc7484bis-04: Discuss

…

> 
> 
> Section 11
> 
>   The
>   transport used to access the registries can be more secure by using
>   TLS [RFC8446], which IANA supports.
> 
> In a similar vein to Roman's comment, I note the following text from RFC
> 7481:
> 
> %HTTP over TLS MUST be used to
> % protect all client-server exchanges unless operational constraints
> % make it impossible to meet this requirement.  [...]
> 
> It seems that we could use a different phrasing here that is more
> commensurate with the requirements of STD 95.
> 

-06 now contains the following text:  “The registries MUST be accessible only  
through HTTPS (TLS RFC8446) transport.”

Marc.



___
regext mailing list
regext@ietf.org
https://www.ietf.org/mailman/listinfo/regext