Encrypted Content-Encoding for HTTP
draft-ietf-httpbis-encryption-encoding-09
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2020-01-21
|
09 | (System) | Received changes through RFC Editor sync (added Verified Errata tag) |
2017-06-26
|
09 | (System) | Received changes through RFC Editor sync (added Errata tag) |
2017-06-23
|
09 | (System) | Received changes through RFC Editor sync (created alias RFC 8188, changed abstract to 'This memo introduces a content coding for HTTP that allows message … Received changes through RFC Editor sync (created alias RFC 8188, changed abstract to 'This memo introduces a content coding for HTTP that allows message payloads to be encrypted.', changed pages to 16, changed standardization level to Proposed Standard, changed state to RFC, added RFC published event at 2017-06-23, changed IESG state to RFC Published) |
2017-06-23
|
09 | (System) | RFC published |
2017-06-21
|
09 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2017-06-05
|
09 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2017-05-17
|
09 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2017-05-05
|
09 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2017-04-18
|
09 | (System) | IANA Action state changed to Waiting on RFC Editor from Waiting on Authors |
2017-04-18
|
09 | (System) | IANA Action state changed to Waiting on Authors |
2017-04-18
|
09 | (System) | RFC Editor state changed to EDIT |
2017-04-18
|
09 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2017-04-18
|
09 | (System) | Announcement was received by RFC Editor |
2017-04-18
|
09 | Amy Vezza | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2017-04-18
|
09 | Amy Vezza | IESG has approved the document |
2017-04-18
|
09 | Amy Vezza | Closed "Approve" ballot |
2017-04-18
|
09 | Amy Vezza | Ballot approval text was generated |
2017-04-18
|
09 | Amy Vezza | IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2017-04-18
|
09 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2017-04-18
|
09 | Martin Thomson | New version available: draft-ietf-httpbis-encryption-encoding-09.txt |
2017-04-18
|
09 | (System) | New version approved |
2017-04-18
|
09 | (System) | Request for posting confirmation emailed to previous authors: Martin Thomson |
2017-04-18
|
09 | Martin Thomson | Uploaded new revision |
2017-04-14
|
08 | Eric Rescorla | [Ballot Position Update] Position for Eric Rescorla has been changed to No Objection from Discuss |
2017-04-14
|
08 | Eric Rescorla | [Ballot discuss] The "aes128gcm" content coding uses a fixed record size. The final encoding consists of a header (see Section 2.1) and zero … [Ballot discuss] The "aes128gcm" content coding uses a fixed record size. The final encoding consists of a header (see Section 2.1) and zero or more fixed size encrypted records; the final record can be smaller than the record size. This restriction seems to be an artifact of your previous design which used short records as an end marker. With the new padding delimeter structure (which I note is isomorphic to the TLS 1.3 structure), I'm not seeing any reason to require that the records be fixed length (as they are not in TLS). I didn't see any discussion of this point in the thread where this structure was designed, so I'd like to get confirmation that the WG considered this point and decided to continue with the above restriction. I'll clear this discuss upon either such confirmation or removal of the restriction. UPDATE: James Manger points out that you need fixed record sizes for random access and header-freeness, though not for security. I will clear this. |
2017-04-14
|
08 | Eric Rescorla | Ballot discuss text updated for Eric Rescorla |
2017-04-13
|
08 | Cindy Morgan | IESG state changed to IESG Evaluation::AD Followup from Waiting for Writeup |
2017-04-13
|
08 | Kathleen Moriarty | [Ballot comment] Thanks for addressing the SecDir review comments: https://mailarchive.ietf.org/arch/msg/secdir/6TCbjRD3sEBNmZxEhxN7Q4LA0aI |
2017-04-13
|
08 | Kathleen Moriarty | [Ballot Position Update] New position, No Objection, has been recorded for Kathleen Moriarty |
2017-04-12
|
08 | Alia Atlas | [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas |
2017-04-12
|
08 | Spencer Dawkins | [Ballot comment] Thanks for producing this specification. |
2017-04-12
|
08 | Spencer Dawkins | [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins |
2017-04-12
|
08 | Deborah Brungard | [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard |
2017-04-12
|
08 | Ben Campbell | [Ballot Position Update] New position, Yes, has been recorded for Ben Campbell |
2017-04-11
|
08 | Eric Rescorla | [Ballot discuss] The "aes128gcm" content coding uses a fixed record size. The final encoding consists of a header (see Section 2.1) and zero … [Ballot discuss] The "aes128gcm" content coding uses a fixed record size. The final encoding consists of a header (see Section 2.1) and zero or more fixed size encrypted records; the final record can be smaller than the record size. This restriction seems to be an artifact of your previous design which used short records as an end marker. With the new padding delimeter structure (which I note is isomorphic to the TLS 1.3 structure), I'm not seeing any reason to require that the records be fixed length (as they are not in TLS). I didn't see any discussion of this point in the thread where this structure was designed, so I'd like to get confirmation that the WG considered this point and decided to continue with the above restriction. I'll clear this discuss upon either such confirmation or removal of the restriction. |
2017-04-11
|
08 | Eric Rescorla | [Ballot comment] S 2.1. You should say what idlen is. The QUIC notation here isn't defined :) S 2.2/2.3. Can you make clearer that the … [Ballot comment] S 2.1. You should say what idlen is. The QUIC notation here isn't defined :) S 2.2/2.3. Can you make clearer that the strings don't have their own null termination. I.e, that what is fed into the CEK generation function is .... 32 38 67 63 6d 00 01 not .... 32 38 67 63 6d 00 00 01 S 4.6. This mechanism only offers encryption of content; it does not perform authentication or authorization, which still needs to be performed (e.g., by HTTP authentication [RFC7235]). This text is kind of confusing, because the mechanism does provide data origin authentication. I think you mean that if the server is just going to process this as an opaque and stuff it somewhere, then it needs extra authentication? This seems like a layering issue. S 4.7. Some citations to some of the various padding traffic analysis papers might be useful. Distributing non-padding data is recommended to avoid leaking size information. I think you mean "distributing this across the records". |
2017-04-11
|
08 | Eric Rescorla | [Ballot Position Update] New position, Discuss, has been recorded for Eric Rescorla |
2017-04-11
|
08 | Suresh Krishnan | [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan |
2017-04-11
|
08 | Warren Kumari | [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari |
2017-04-11
|
08 | Alissa Cooper | [Ballot comment] From Pete's Gen-ART review: Nits/editorial comments: Looks fine from a non-security-expert's perspective. It is my duty to ask about keyid in section 2.1: … [Ballot comment] From Pete's Gen-ART review: Nits/editorial comments: Looks fine from a non-security-expert's perspective. It is my duty to ask about keyid in section 2.1: A "keyid" parameter SHOULD be a UTF-8 [RFC3629] encoded string, particularly where the identifier might need to appear in a textual form. I presume that simply means "might need to be rendered" and does not include "might need to be typed in by someone", correct? The former is easy; the latter probably requires a bit more text. |
2017-04-11
|
08 | Alissa Cooper | [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper |
2017-04-11
|
08 | Mirja Kühlewind | [Ballot comment] section 3.1: "plaintext = SSBhbSB0aGUgd2FscnVzAg" ? |
2017-04-11
|
08 | Mirja Kühlewind | [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind |
2017-04-10
|
08 | Alvaro Retana | [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana |
2017-04-09
|
08 | Alexey Melnikov | Ballot has been issued |
2017-04-09
|
08 | Alexey Melnikov | [Ballot Position Update] New position, Yes, has been recorded for Alexey Melnikov |
2017-04-09
|
08 | Alexey Melnikov | Created "Approve" ballot |
2017-04-09
|
08 | Alexey Melnikov | Ballot writeup was changed |
2017-04-06
|
08 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2017-04-05
|
08 | Pete Resnick | Request for Last Call review by GENART Completed: Ready. Reviewer: Pete Resnick. Sent review to list. |
2017-04-05
|
08 | Robert Sparks | Request for Last Call review by SECDIR Completed: Ready. Reviewer: Robert Sparks. Sent review to list. |
2017-04-04
|
08 | (System) | IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed |
2017-04-04
|
08 | Sabrina Tanamal | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Services Operator has completed its review of draft-ietf-httpbis-encryption-encoding-08.txt. If any part of this review is inaccurate, please let … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Services Operator has completed its review of draft-ietf-httpbis-encryption-encoding-08.txt. If any part of this review is inaccurate, please let us know. The IANA Services Operator understands that, upon approval of this document, there is a single action which we must complete. In the HTTP Content Coding Registry located in the Hypertext Transfer Protocol (HTTP) Parameters registry located at: https://www.iana.org/assignments/http-parameters/ a single, new entry is to be added as follows: Name: aes128gcm Description: AES-GCM encryption with a 128-bit content encryption key Reference: [ RFC-to-be ] Notes: The IANA Services Operator understands that this is the only action required to be completed upon approval of this document. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is only to confirm what actions will be performed. Thank you, Sabrina Tanamal IANA Services Specialist PTI |
2017-04-03
|
08 | Al Morton | Request for Last Call review by OPSDIR Completed: Ready. Reviewer: Al Morton. Sent review to list. |
2017-03-31
|
08 | Alexey Melnikov | Placed on agenda for telechat - 2017-04-13 |
2017-03-30
|
08 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Robert Sparks |
2017-03-30
|
08 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Robert Sparks |
2017-03-27
|
08 | Jean Mahoney | Request for Last Call review by GENART is assigned to Pete Resnick |
2017-03-27
|
08 | Jean Mahoney | Request for Last Call review by GENART is assigned to Pete Resnick |
2017-03-27
|
08 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Al Morton |
2017-03-27
|
08 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Al Morton |
2017-03-23
|
08 | Amy Vezza | IANA Review state changed to IANA - Review Needed |
2017-03-23
|
08 | Amy Vezza | The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: httpbis-chairs@ietf.org, draft-ietf-httpbis-encryption-encoding@ietf.org, Mark Nottingham , mnot@mnot.net, ietf-http-wg@w3.org, … The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: httpbis-chairs@ietf.org, draft-ietf-httpbis-encryption-encoding@ietf.org, Mark Nottingham , mnot@mnot.net, ietf-http-wg@w3.org, alexey.melnikov@isode.com Reply-To: ietf@ietf.org Sender: Subject: Last Call: (Encrypted Content-Encoding for HTTP) to Proposed Standard The IESG has received a request from the Hypertext Transfer Protocol WG (httpbis) to consider the following document: - 'Encrypted Content-Encoding for HTTP' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2017-04-06. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This memo introduces a content coding for HTTP that allows message payloads to be encrypted. Note to Readers Discussion of this draft takes place on the HTTP working group mailing list (ietf-http-wg@w3.org), which is archived at https://lists.w3.org/Archives/Public/ietf-http-wg/ . Working Group information can be found at http://httpwg.github.io/ ; source code and issues list for this draft can be found at https://github.com/httpwg/http-extensions/labels/encryption . The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-httpbis-encryption-encoding/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-httpbis-encryption-encoding/ballot/ The following IPR Declarations may be related to this I-D: https://datatracker.ietf.org/ipr/2777/ The document contains these normative downward references. See RFC 3967 for additional information: rfc5869: HMAC-based Extract-and-Expand Key Derivation Function (HKDF) (Informational - IETF stream) Note that some of these references may already be listed in the acceptable Downref Registry. |
2017-03-23
|
08 | Amy Vezza | IESG state changed to In Last Call from Last Call Requested |
2017-03-23
|
08 | Alexey Melnikov | Last call was requested |
2017-03-23
|
08 | Alexey Melnikov | Last call announcement was generated |
2017-03-23
|
08 | Alexey Melnikov | Ballot approval text was generated |
2017-03-23
|
08 | Alexey Melnikov | Ballot writeup was generated |
2017-03-23
|
08 | Alexey Melnikov | IESG state changed to Last Call Requested from AD Evaluation |
2017-03-23
|
08 | Alexey Melnikov | IESG state changed to AD Evaluation from Publication Requested |
2017-03-02
|
08 | Mark Nottingham | # Shepherd Writeup for draft-ietf-httpbis-encryption-encoding ## 1. Summary Mark Nottingham is the document shepherd; Alexey Melnikov is the responsible Area Director. This memo introduces a … # Shepherd Writeup for draft-ietf-httpbis-encryption-encoding ## 1. Summary Mark Nottingham is the document shepherd; Alexey Melnikov is the responsible Area Director. This memo introduces a content-coding for HTTP that allows message payloads to be encrypted. The intended status is Proposed Standard. ## 2. Review and Consensus This document has been discussed for some time in the Working Group, going through several revisions and reviews. The editor is primarily responsible for the design, but reviews by a number of other people have shaped its design over time. The most immediate use case comes from the WEBPUSH WG. A list of implementations can be found at: https://github.com/httpwg/wiki/wiki/EncryptedContentEncoding Note that some need to be updated to reflect the latest draft. ## 3. Intellectual Property Martin has confirmed that, to his direct, personal knowledge, all IPR related to this document has already been disclosed, in conformance with BCPs 78 and 79. One IPR disclosure has been made for this document; see . The Working Group was informed of this (see ), but no changes to the draft resulted. ## 4. Other Points This document has a downward reference to RFC5869, which is already in the DOWNREF Registry. |
2017-03-02
|
08 | Mark Nottingham | Responsible AD changed to Alexey Melnikov |
2017-03-02
|
08 | Mark Nottingham | IETF WG state changed to Submitted to IESG for Publication from In WG Last Call |
2017-03-02
|
08 | Mark Nottingham | IESG state changed to Publication Requested |
2017-03-02
|
08 | Mark Nottingham | IESG process started in state Publication Requested |
2017-03-02
|
08 | Mark Nottingham | Changed document writeup |
2017-03-02
|
08 | Martin Thomson | New version available: draft-ietf-httpbis-encryption-encoding-08.txt |
2017-03-02
|
08 | (System) | New version approved |
2017-03-02
|
08 | (System) | Request for posting confirmation emailed to previous authors: Martin Thomson |
2017-03-02
|
08 | Martin Thomson | Uploaded new revision |
2017-02-15
|
07 | Mark Nottingham | IETF WG state changed to In WG Last Call from WG Document |
2017-02-13
|
07 | Martin Thomson | New version available: draft-ietf-httpbis-encryption-encoding-07.txt |
2017-02-13
|
07 | (System) | New version approved |
2017-02-13
|
07 | (System) | Request for posting confirmation emailed to previous authors: "Martin Thomson" |
2017-02-13
|
07 | Martin Thomson | Uploaded new revision |
2016-12-22
|
06 | Martin Thomson | New version available: draft-ietf-httpbis-encryption-encoding-06.txt |
2016-12-22
|
06 | (System) | New version approved |
2016-12-22
|
06 | (System) | Request for posting confirmation emailed to previous authors: "Martin Thomson" |
2016-12-22
|
06 | Martin Thomson | Uploaded new revision |
2016-12-21
|
05 | Martin Thomson | New version available: draft-ietf-httpbis-encryption-encoding-05.txt |
2016-12-21
|
05 | (System) | New version approved |
2016-12-21
|
05 | (System) | Request for posting confirmation emailed to previous authors: "Martin Thomson" |
2016-12-21
|
05 | Martin Thomson | Uploaded new revision |
2016-11-13
|
04 | Patrick McManus | Added to session: IETF-97: httpbis Tue-1330 |
2016-10-31
|
04 | Martin Thomson | New version available: draft-ietf-httpbis-encryption-encoding-04.txt |
2016-10-31
|
04 | (System) | New version approved |
2016-10-31
|
03 | (System) | Request for posting confirmation emailed to previous authors: "Martin Thomson" |
2016-10-31
|
03 | Martin Thomson | Uploaded new revision |
2016-10-09
|
03 | Martin Thomson | New version available: draft-ietf-httpbis-encryption-encoding-03.txt |
2016-10-09
|
03 | (System) | New version approved |
2016-10-09
|
02 | (System) | Request for posting confirmation emailed to previous authors: "Martin Thomson" |
2016-10-09
|
02 | Martin Thomson | Uploaded new revision |
2016-06-29
|
02 | Martin Thomson | New version available: draft-ietf-httpbis-encryption-encoding-02.txt |
2016-06-06
|
01 | Mark Nottingham | Changed consensus to Yes from Unknown |
2016-06-06
|
01 | Mark Nottingham | Intended Status changed to Proposed Standard from None |
2016-06-06
|
01 | Mark Nottingham | Notification list changed to "Mark Nottingham" <mnot@mnot.net> |
2016-06-06
|
01 | Mark Nottingham | Document shepherd changed to Mark Nottingham |
2016-03-22
|
Naveen Khan | Posted related IPR disclosure: Glassey?McNeil's Statement about IPR related to draft-ietf-httpbis-encryption-encoding, draft-ietf-pkix-x509-ipaddr-as-extn, and draft-mm-wg-effect-encrypt-01 | |
2016-03-20
|
01 | Martin Thomson | New version available: draft-ietf-httpbis-encryption-encoding-01.txt |
2015-12-23
|
00 | Mark Nottingham | This document now replaces draft-thomson-http-encryption instead of None |
2015-12-23
|
00 | Martin Thomson | New version available: draft-ietf-httpbis-encryption-encoding-00.txt |