Transport of Real-time Inter-network Defense (RID) Messages
draft-moriarty-post-inch-rid-transport-03
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
03 | (System) | post-migration administrative database adjustment to the Yes position for Sean Turner |
2012-08-22
|
03 | (System) | post-migration administrative database adjustment to the No Objection position for Jari Arkko |
2012-08-22
|
03 | (System) | post-migration administrative database adjustment to the No Objection position for Adrian Farrel |
2012-08-22
|
03 | (System) | post-migration administrative database adjustment to the No Objection position for Lars Eggert |
2012-02-01
|
03 | Sean Turner | [Ballot Position Update] New position, Yes, has been recorded by Sean Turner |
2012-02-01
|
03 | Sean Turner | [Ballot Position Update] Position for Sean Turner has been changed to Yes from No Objection |
2012-02-01
|
03 | Amy Vezza | Ballot has been issued by Amy Vezza |
2012-02-01
|
03 | Amy Vezza | Created "Approve" ballot |
2010-08-18
|
03 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2010-08-17
|
03 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2010-08-17
|
03 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2010-08-05
|
03 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2010-08-05
|
03 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2010-08-04
|
03 | (System) | IANA Action state changed to In Progress |
2010-08-04
|
03 | Cindy Morgan | IESG state changed to Approved-announcement sent |
2010-08-04
|
03 | Cindy Morgan | IESG has approved the document |
2010-08-04
|
03 | Cindy Morgan | Closed "Approve" ballot |
2010-07-01
|
03 | Adrian Farrel | [Ballot Position Update] Position for Adrian Farrel has been changed to No Objection from Discuss by Adrian Farrel |
2010-06-30
|
03 | Jari Arkko | [Ballot Position Update] Position for Jari Arkko has been changed to No Objection from Discuss by Jari Arkko |
2010-06-30
|
03 | Peter Saint-Andre | [Ballot discuss] |
2010-06-30
|
03 | Peter Saint-Andre | [Ballot Position Update] Position for Peter Saint-Andre has been changed to No Objection from Discuss by Peter Saint-Andre |
2010-06-30
|
03 | Lars Eggert | [Ballot Position Update] Position for Lars Eggert has been changed to No Objection from Discuss by Lars Eggert |
2010-06-30
|
03 | Sean Turner | [Ballot Position Update] Position for Sean Turner has been changed to No Objection from Discuss by Sean Turner |
2010-06-30
|
03 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2010-06-30
|
03 | (System) | New version available: draft-moriarty-post-inch-rid-transport-03.txt |
2010-06-05
|
03 | Adrian Farrel | [Ballot comment] Section 1 However, extensions such as Real-time Inter-network Defense (RID) [I-D.moriarty-post-inch-rid] Do you have other extensions in mind? Would … [Ballot comment] Section 1 However, extensions such as Real-time Inter-network Defense (RID) [I-D.moriarty-post-inch-rid] Do you have other extensions in mind? Would it be OK to say.. However, Real-time Inter-network Defense (RID) [I-D.moriarty-post-inch-rid] |
2010-06-05
|
03 | Adrian Farrel | [Ballot discuss] I have a problem with the generality of the assertion in the first sentence of the Abstract. Documents intended to be shared … [Ballot discuss] I have a problem with the generality of the assertion in the first sentence of the Abstract. Documents intended to be shared among multiple constituencies must share a common format and transport mechanism. It is not the case that two documents intended to be shared among multiple constituencies have to have a common format or transport mechanism. I think you have two distinct points: - All members of a constituency that shares a document must have a common understanding of the document format. - All members of a RID consortium require a common transport mechanism for sharing documents. In fact, the Introduction is much less contentious, and you may just want to borrow from there rather than create new text. |
2010-06-04
|
03 | (System) | Removed from agenda for telechat - 2010-06-03 |
2010-06-03
|
03 | Cindy Morgan | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Cindy Morgan |
2010-06-03
|
03 | Ralph Droms | [Ballot comment] Is the table referred to in this sentence from the 5th para in sectio 3 the same table as referred to in the … [Ballot comment] Is the table referred to in this sentence from the 5th para in sectio 3 the same table as referred to in the 9th para: The following table lists the allowable RID message types in an HTTP Response for a given RID message type in the Request. |
2010-06-03
|
03 | Ralph Droms | [Ballot Position Update] Position for Ralph Droms has been changed to No Objection from Discuss by Ralph Droms |
2010-06-03
|
03 | Adrian Farrel | [Ballot comment] Section 1 However, extensions such as Real-time Inter-network Defense (RID) [I-D.moriarty-post-inch-rid] Do you have other extensions in mind? Would … [Ballot comment] Section 1 However, extensions such as Real-time Inter-network Defense (RID) [I-D.moriarty-post-inch-rid] Do you have other extensions in mind? Would it be OK to say.. However, Real-time Inter-network Defense (RID) [I-D.moriarty-post-inch-rid] |
2010-06-03
|
03 | Adrian Farrel | [Ballot discuss] I have a problem with the generality of the assertion in the first sentence of the Abstract. Documents intended to be shared … [Ballot discuss] I have a problem with the generality of the assertion in the first sentence of the Abstract. Documents intended to be shared among multiple constituencies must share a common format and transport mechanism. It is not the case that two documents intended to be shared among multiple constituencies have to have a common format or transport mechanism. I think you have to distinct points: - All members of a constituency that shares a document must have a common understanding of the document format. - All members of a RID consortium require a common transport mechanism for sharing documents. In fact, the Introduction is much less contentious, and you may just want to borrow from there rather than create new text. |
2010-06-03
|
03 | Adrian Farrel | [Ballot Position Update] Position for Adrian Farrel has been changed to Discuss from Undefined by Adrian Farrel |
2010-06-03
|
03 | Adrian Farrel | [Ballot Position Update] Position for Adrian Farrel has been changed to Undefined from Discuss by Adrian Farrel |
2010-06-03
|
03 | Gonzalo Camarillo | [Ballot Position Update] New position, No Objection, has been recorded by Gonzalo Camarillo |
2010-06-03
|
03 | Robert Sparks | [Ballot Position Update] New position, No Objection, has been recorded by Robert Sparks |
2010-06-03
|
03 | Dan Romascanu | [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu |
2010-06-03
|
03 | Adrian Farrel | [Ballot comment] Section 1 However, extensions such as Real-time Inter-network Defense (RID) [I-D.moriarty-post-inch-rid] Do you have other extensions in mind? Would … [Ballot comment] Section 1 However, extensions such as Real-time Inter-network Defense (RID) [I-D.moriarty-post-inch-rid] Do you have other extensions in mind? Would it be OK to say.. However, Real-time Inter-network Defense (RID) [I-D.moriarty-post-inch-rid] |
2010-06-03
|
03 | Adrian Farrel | [Ballot discuss] I have a problem with the generality of the assertion in the first sentence of the Abstract. Documents intended to be shared … [Ballot discuss] I have a problem with the generality of the assertion in the first sentence of the Abstract. Documents intended to be shared among multiple constituencies must share a common format and transport mechanism. It is not the case that two documents intended to be shared among multiple constituencies have to have a common format or transport mechanism. I think you have to distinct points: - All members of a constituency that shares a document must have a common understanding of the document format. - All members of a RID consortium require a common transport mechanism for sharing documents. In fact, the Introduction is much less contentious, and you may just want to borrow from there rather than create new text. |
2010-06-03
|
03 | Adrian Farrel | [Ballot Position Update] New position, Discuss, has been recorded by Adrian Farrel |
2010-06-03
|
03 | Ralph Droms | [Ballot Position Update] New position, Discuss, has been recorded by Ralph Droms |
2010-06-03
|
03 | Lars Eggert | [Ballot comment] Section 202, paragraph 8: > RID systems MUST support and SHOULD use HTTP/1.1 persistent > connections as described in [RFC2616 … [Ballot comment] Section 202, paragraph 8: > RID systems MUST support and SHOULD use HTTP/1.1 persistent > connections as described in [RFC2616] to minimize TCP connection > setup overhead. I'd be surprised if the load on a RID system was high enough or the timing constraints where tight enough such that persistent connections made a difference in practice. Section 4., paragraph 2: > public key infrastructure (PKI) to manage identities dor RID systems Nit: s/dor/for/ |
2010-06-03
|
03 | Lars Eggert | [Ballot discuss] Section 5., paragraph 1: > Consistent with BCP 56 [RFC3205], since RID over HTTP/TLS is a > substantially new … [Ballot discuss] Section 5., paragraph 1: > Consistent with BCP 56 [RFC3205], since RID over HTTP/TLS is a > substantially new service, and should be controlled at the consortium > member network's border differently than HTTP/TLS, it requires a new > port number. IANA has assigned port [IANA NOTE: assign port number > here] to RID over HTTP/TLS. DISCUSS: These instructions are not sufficient. IANA needs to have a few more bits of information; see http://tools.ietf.org/html/draft-ietf-tsvwg-iana-ports-06#section-8.1. Specifically, what service name is asked for? |
2010-06-03
|
03 | Lars Eggert | [Ballot Position Update] New position, Discuss, has been recorded by Lars Eggert |
2010-06-03
|
03 | Jari Arkko | [Ballot comment] Section 3: Note that HTTP provides no mechanism for signaling to a server than a response body is improper. that a … [Ballot comment] Section 3: Note that HTTP provides no mechanism for signaling to a server than a response body is improper. that a response body is improper? |
2010-06-03
|
03 | Jari Arkko | [Ballot discuss] Question: When the response is "[Empty]" as specified in Section 3, and the server wishes to employ a callback method of actually processing … [Ballot discuss] Question: When the response is "[Empty]" as specified in Section 3, and the server wishes to employ a callback method of actually processing the request, should the server make a callback with an empty contents or omit making any callback whatsover? |
2010-06-03
|
03 | Jari Arkko | [Ballot Position Update] New position, Discuss, has been recorded by Jari Arkko |
2010-06-03
|
03 | Jari Arkko | [Ballot comment] Section 3: Note that HTTP provides no mechanism for signaling to a server than a response body is improper. that a … [Ballot comment] Section 3: Note that HTTP provides no mechanism for signaling to a server than a response body is improper. that a response body is improper? |
2010-06-02
|
03 | Sean Turner | [Ballot comment] Sec 4: r/dor/for |
2010-06-02
|
03 | Sean Turner | [Ballot discuss] 1) Does this ID need a blurb about PFS? TLS says: TLS users desiring Perfect Forward Secrecy should use DHE cipher … [Ballot discuss] 1) Does this ID need a blurb about PFS? TLS says: TLS users desiring Perfect Forward Secrecy should use DHE cipher suites. So I'm curious if these users should desire it or not? If so then, the cipher suites need to be documented. (2) Security Consideration has the following text: For transport confidentiality, identification, and authentication, TLS with mutual authentication MUST be used to secure the HTTP connection as in [RFC2818]. I looked in RFC 2818 and it says the following about client identity checks: Typically, the server has no external knowledge of what the client's identity ought to be and so checks (other than that the client has a certificate chain rooted in an appropriate CA) are not possible. If a server has such knowledge (typically from some source external to HTTP or TLS) it SHOULD check the identity as described above. Now, I'm confused. Is this draft saying that mutual authentication is required and it's upping the requirements in RFC 2818? Or is it not doing that and the security consideration is incorrect (i.e., it's not mutual authentication)? If mutual certificate-based authentication is required then you also need to add some text to address the use of certificates. Maybe add a new section to address it and move the one sentence out from the security considerations about the names. (3) Need to say something about MUST NOT negotiate NULL suites for authentication, integrity, and confidentiality. (4) Need to say something about whether renegotiation is supported. (5) (I copied one of Tim's DISCUSSes from another document that points to TLS) The document requires use of TLS, and mandates certificate-based authentication for both the client and server. This provides a nice baseline with a reasonably consistent level of security. However, many people consider SSL and TLS to be interchangeable, and early versions of SSL do not provide an acceptable level of security. I would like to see text along the following lines added to this specification: Implementations of TLS typically support multiple versions of the Transport Layer Security protocol as well as the older Secure Sockets Layer (SSL) protocol. Because of known security vulnerabilities, TLSTM clients and servers MUST NOT request, offer, or use SSL 2.0. See Appendix E.2 of [TLS] for further details. The Security Considerations would be one possible location for this text, but the exact placement is not an issue... (6) Why isn't this a MUST: RID systems SHOULD additionally verify the fully qualified domain name (FQDN) of a connected RID system peer against the presented Subject identity. (7) I support Peter's DISCUSS wrt to pointing to https://datatracker.ietf.org/doc/draft-saintandre-tls-server-id-check/ for the name checking text. |
2010-06-02
|
03 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica |
2010-06-02
|
03 | Sean Turner | [Ballot comment] Sec 4: r/dor/for |
2010-06-02
|
03 | Sean Turner | [Ballot discuss] 1) Does this ID need a blurb about PFS? TLS says: TLS users desiring Perfect Forward Secrecy should use DHE cipher … [Ballot discuss] 1) Does this ID need a blurb about PFS? TLS says: TLS users desiring Perfect Forward Secrecy should use DHE cipher suites. So I'm curious if these users should desire it or not? If so then, the cipher suites need to be documented. (2) Security Consideration has the following text: For transport confidentiality, identification, and authentication, TLS with mutual authentication MUST be used to secure the HTTP connection as in [RFC2818]. I looked in RFC 2818 and it says the following about client identity checks: Typically, the server has no external knowledge of what the client's identity ought to be and so checks (other than that the client has a certificate chain rooted in an appropriate CA) are not possible. If a server has such knowledge (typically from some source external to HTTP or TLS) it SHOULD check the identity as described above. Now, I'm confused. Is this draft saying that mutual authentication is required and it's upping the requirements in RFC 2818? Or is it not doing that and the security consideration is incorrect (i.e., it's not mutual authentication)? If mutual certificate-based authentication is required then you also need to add some text to address the use of certificates. Maybe add a new section to address it and move the one sentence out from the security considerations about the names. (3) Need to say something about MUST NOT negotiate NULL suites for authentication, integrity, and confidentiality. (4) Need to say something about whether renegotiation is supported. (5) (I copied one of Tim's DISCUSSes from another document that points to TLS) The document requires use of TLS, and mandates certificate-based authentication for both the client and server. This provides a nice baseline with a reasonably consistent level of security. However, many people consider SSL and TLS to be interchangeable, and early versions of SSL do not provide an acceptable level of security. I would like to see text along the following lines added to this specification: Implementations of TLS typically support multiple versions of the Transport Layer Security protocol as well as the older Secure Sockets Layer (SSL) protocol. Because of known security vulnerabilities, TLSTM clients and servers MUST NOT request, offer, or use SSL 2.0. See Appendix E.2 of [TLS] for further details. The Security Considerations would be one possible location for this text, but the exact placement is not an issue... (6) Why isn't this a MUST: RID systems SHOULD additionally verify the fully qualified domain name (FQDN) of a connected RID system peer against the presented Subject identity. (7) I support Peter's DISCUSS wrt to pointing to https://datatracker.ietf.org/doc/draft-saintandre-tls-server-id-check/ for the name checking text. |
2010-06-02
|
03 | Sean Turner | [Ballot comment] Sec 4: r/dor/for |
2010-06-02
|
03 | Sean Turner | [Ballot discuss] 1) Does this ID need a blurb about PFS? TLS says: TLS users desiring Perfect Forward Secrecy should use DHE cipher … [Ballot discuss] 1) Does this ID need a blurb about PFS? TLS says: TLS users desiring Perfect Forward Secrecy should use DHE cipher suites. So I'm curious if these users should desire it or not? If so then, the cipher suites need to be documented. (2) Security Consideration has the following text: For transport confidentiality, identification, and authentication, TLS with mutual authentication MUST be used to secure the HTTP connection as in [RFC2818]. I looked in RFC 2818 and it says the following about client identity checks: Typically, the server has no external knowledge of what the client's identity ought to be and so checks (other than that the client has a certificate chain rooted in an appropriate CA) are not possible. If a server has such knowledge (typically from some source external to HTTP or TLS) it SHOULD check the identity as described above. Now, I'm confused. Is this draft saying that mutual authentication is required and it's upping the requirements in RFC 2818? Or is it not doing that and the security consideration is incorrect (i.e., it's not mutual authentication)? If mutual certificate-based authentication is required then you also need to add some text to address the use of certificates. Maybe add a new section to address it and move the one sentence out from the security considerations about the names. (3) Need to say something about MUST NOT negotiate NULL suites for authentication, integrity, and confidentiality. (4) Need to say something about whether renegotiation is supported. (5) (I copied one of Tim's DISCUSSes from another document that points to TLS) The document requires use of TLS, and mandates certificate-based authentication for both the client and server. This provides a nice baseline with a reasonably consistent level of security. However, many people consider SSL and TLS to be interchangeable, and early versions of SSL do not provide an acceptable level of security. I would like to see text along the following lines added to this specification: Implementations of TLS typically support multiple versions of the Transport Layer Security protocol as well as the older Secure Sockets Layer (SSL) protocol. Because of known security vulnerabilities, TLSTM clients and servers MUST NOT request, offer, or use SSL 2.0. See Appendix E.2 of [TLS] for further details. The Security Considerations would be one possible location for this text, but the exact placement is not an issue... (6) Why isn't this a MUST: RID systems SHOULD additionally verify the fully qualified domain name (FQDN) of a connected RID system peer against the presented Subject identity. (7) I support Peter's DISCUSS wrt to pointing to https://datatracker.ietf.org/doc/draft-saintandre-tls-server-id-check/ for the name checking text. |
2010-06-02
|
03 | Sean Turner | [Ballot Position Update] New position, Discuss, has been recorded by Sean Turner |
2010-06-01
|
03 | Peter Saint-Andre | [Ballot discuss] The security considerations specify the following: RID systems SHOULD additionally verify the fully qualified domain name (FQDN) of a connected RID … [Ballot discuss] The security considerations specify the following: RID systems SHOULD additionally verify the fully qualified domain name (FQDN) of a connected RID system peer against the presented Subject identity. The fully qualified domain name used to identify a RID system may be stored either in a subjectAltName extension of type dNSName, or in the most specific Common Name field of the Subject identity of the RID system's X.509 certificate. Internationalized FQDNs MUST be encoded using Punycode [RFC3492]. If both a Common Name and subjectAltName FQDN are present, the subjectAltName is to be given preference. A few questions and comments: 1. Must a RID system be identified by an FQDN (instead of, say, an IP address)? 2. Why is identity checking a SHOULD instead of a MUST? Good security practices indicate that an entity MUST attempt to verify the identity of the peer (although naturally identity verification might fail). 3. Much more detailed rules for identity verification are provided in draft-saintandre-tls-server-id-check; perhaps it makes sense to simply profile that specification here? |
2010-06-01
|
03 | Peter Saint-Andre | [Ballot Position Update] New position, Discuss, has been recorded by Peter Saint-Andre |
2010-05-31
|
03 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley |
2010-05-28
|
03 | Stewart Bryant | [Ballot comment] Nits points out that the references have not been split in Normative/Invormative. |
2010-05-28
|
03 | Stewart Bryant | [Ballot Position Update] New position, No Objection, has been recorded by Stewart Bryant |
2010-05-27
|
03 | Samuel Weiler | Request for Telechat review by SECDIR Completed. Reviewer: Barry Leiba. |
2010-05-27
|
03 | Tim Polk | State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Tim Polk |
2010-05-27
|
03 | Tim Polk | [Ballot Position Update] New position, Yes, has been recorded for Tim Polk |
2010-05-27
|
03 | Tim Polk | Ballot has been issued by Tim Polk |
2010-05-27
|
03 | Tim Polk | Created "Approve" ballot |
2010-05-14
|
03 | Samuel Weiler | Request for Telechat review by SECDIR is assigned to Barry Leiba |
2010-05-14
|
03 | Samuel Weiler | Request for Telechat review by SECDIR is assigned to Barry Leiba |
2010-05-13
|
03 | Tim Polk | Placed on agenda for telechat - 2010-06-03 by Tim Polk |
2010-05-13
|
03 | Tim Polk | Note field has been cleared by Tim Polk |
2010-05-03
|
03 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2010-04-19
|
03 | Samuel Weiler | Request for Last Call review by SECDIR Completed. Reviewer: Barry Leiba. |
2010-04-13
|
03 | Amanda Baber | IANA questions/comments: QUESTIONS: - Do you require a WELL KNOWN PORT NUMBER, or can you use a REGISTERED PORT NUMBER? - Do you want or … IANA questions/comments: QUESTIONS: - Do you require a WELL KNOWN PORT NUMBER, or can you use a REGISTERED PORT NUMBER? - Do you want or need a registry for the Result/Response codes? Upon approval of this document, IANA will make the following assignment in the "PORT NUMBERS" registry at http://www.iana.org/assignments/port-numbers Keyword Decimal Description References ------- ------- ----------- ---------- rid TBD/tcp RID over HTTP/TLS [RFC-moriarty-post-inch-rid-transport-02] We understand the above to be the only IANA Action for this document. |
2010-04-05
|
03 | Amy Vezza | Last call sent |
2010-04-05
|
03 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2010-04-02
|
03 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Barry Leiba |
2010-04-02
|
03 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Barry Leiba |
2010-04-02
|
03 | Tim Polk | Last Call was requested by Tim Polk |
2010-04-02
|
03 | (System) | Ballot writeup text was added |
2010-04-02
|
03 | (System) | Last call text was added |
2010-04-02
|
03 | (System) | Ballot approval text was added |
2010-04-02
|
03 | Tim Polk | State Changes to Last Call Requested from Publication Requested by Tim Polk |
2010-04-02
|
03 | Tim Polk | Earlier history may be found in the Comment Log for draft-moriarty-post-inch-rid-soap. |
2010-03-26
|
02 | (System) | New version available: draft-moriarty-post-inch-rid-transport-02.txt |
2010-01-21
|
01 | (System) | New version available: draft-moriarty-post-inch-rid-transport-01.txt |
2009-07-28
|
03 | (System) | Earlier history may be found in the Comment Log for draft-moriarty-post-inch-rid-soap. |
2009-07-28
|
03 | (System) | Draft Added by the IESG Secretary in state 0. by system |
2009-06-02
|
00 | (System) | New version available: draft-moriarty-post-inch-rid-transport-00.txt |