Ben,
I believe I found the topic and the proposed text associated with identifying
the nature of the need, which is outlined below. I propose adding the sentence
" EPP [RFC 5730] includes a maximum password length of 16 characters that
inhibits implementing stronger password security policies with higher entropy."
as the second sentence of the introduction. This can be added to
draft-ietf-regext-login-security-10. Do you agree with this change? Are there
any other changes that are needed prior to the posting of
draft-ietf-regext-login-security-10?
Thanks for pointing to the list discussion of potential alternative
authentication approaches, and I'll see if I can make time to write
something down. I'm not opposed to publishing an evolutionary improvement
while revolutionary changes are immature, but I do think that the document
should be more explicit about the nature of the need. Yes, artificial
password-length limitations are bad and I'm happy to see this work to
remove them from EPP, but are there particular security deployment
considerations driving this, such as a desire to support memorable
passphrases that contain sufficent entropy? From a purely
information-theoretic perspective, if we limit ourselves to the ASCII
alphabet from 0x20 to 0x7e, 16 charcters gives roughly 104 bits of entropy
available, which is not catastrophically bad; in combination with the
prerequirement for TLS client-certificate authentication, a server could
block or rate-limit brute-force guessing attacks and achieve a level of
security that is reasonable for many if not most web-available services
today. Even if the perceived need is just "artificial limitations on
password length are detrimental to future evolution in security practice"
(which seems unlikely to me based on my bayesian prior), it seems worth
saying. I suspect that there's more motivation in play, and would like to
better understand it.
JG2 - The only deployment consideration is being able to set passwords beyond
the 16 character limit of RFC 5730 for the critical domain name registry
systems. Yes, there is multi-factor authentication with EPP (user
name/password and client certificate, and optionally client IP address), but
there is the operational need to enhance the security of the passwords with
longer lengths and higher entropy (e.g., at least 128 bits). Are you looking
for a sentence being added to the introduction that identifies the problem more
explicitly, such as:
EPP [RFC 5730] includes a maximum password length of 16 characters that
inhibits implementing stronger password security policies with higher entropy.
--
JG
James Gould
Distinguished Engineer
[email protected]
<applewebdata://13890C55-AAE8-4BF3-A6CE-B4BA42740803/[email protected]>
703-948-3271
12061 Bluemont Way
Reston, VA 20190
Verisign.com <http://verisigninc.com/>
On 2/24/20, 6:02 PM, "Benjamin Kaduk" <[email protected]> wrote:
This text regarding internationalization/normalization works for me.
Looking at the diff from -07 to -09, we seem in pretty good shape overall;
were we going to add a note to abstract and/or introduction about "this
extension allows for the use of strong passwords with EPP"? (I think Jim
had proposed actual text at some point that's better than my paraphrased
version here.)
-Ben
On Mon, Feb 24, 2020 at 07:43:47AM -0800, Barry Leiba wrote:
> Great; thanks, Jim. Ben, are you OK with this now?
>
> Barry
>
> On Mon, Feb 24, 2020 at 5:28 AM Gould, James <[email protected]> wrote:
> >
> > Barry & Ben,
> >
> > Thanks for the detailed discussion. I will change the "recommended" to
the normative "RECOMMENDED" and change the PRECIS sentence to match Ben's
proposal. The end result will be:
> >
> > It is RECOMMENDED that the plain text password in the <loginSec:pw> and
<loginSec:newPw> elements use printable ASCII characters #x20 (space) - #x7E
(~), with high entropy, such as 128 bits. If non-ASCII characters are supported
with the plain text password, then use a standard for passwords with
international characters; the OpaqueString PRECIS profile in [RFC8265] is
recommended in the absence of other considerations.
> >
> > I'll include this change in the posting of
draft-ietf-regext-login-security-09.
> >
> > Thanks,
> >
> > --
> >
> > JG
> >
> >
> >
> > James Gould
> > Distinguished Engineer
> > [email protected]
<applewebdata://13890C55-AAE8-4BF3-A6CE-B4BA42740803/[email protected]>
> >
> > 703-948-3271
> > 12061 Bluemont Way
> > Reston, VA 20190
> >
> > Verisign.com <http://verisigninc.com/>
> >
> > On 2/22/20, 6:15 PM, "Barry Leiba" <[email protected]> wrote:
> >
> > Thanks, Ben; this helps a lot.
> >
> > Jim, are you good with Ben's suggestion or a variation of that?
It's
> > just a small update to what you have, and makes it clearer that if
you
> > need I18N, PRECIS is the weay to do it.
> >
> > Barry
> >
> > On Fri, Feb 21, 2020 at 10:08 PM Benjamin Kaduk <[email protected]>
wrote:
> > >
> > > Hi Barry,
> > >
> > > On Sat, Feb 15, 2020 at 12:12:29AM -0500, Barry Leiba wrote:
> > > > Hi, all...
> > > >
> > > > I'm sorry if I'm not completely clear about where the
discussion is,
> > > > but what Jim's mail system does to the quoting is horrendous
(as is
> > > > the case with most HTML-based mail systems), and I can't easily
follow
> > > > the thread.
> > >
> > > I sympathize; I find that with some regularity I end up saving the
> > > text/html component to a file and opening it in a browser in
order to have
> > > a chance of figuring out what's going on.
> > >
> > > > So I'm just picking up this recent bit from Ben:
> > > >
> > > > > I think it would probably be helpful for the responsible AD
to chime in; my
> > > > > understanding is still that the PRECIS profiles are to be
used as part of a
> > > > > protocol as opposed to part of a deployment, and that
allowing for
> > > > > different rules to be used in different sites is risky. I
understand that
> > > > > there's the extra context here of the potential for
preexisting deployments
> > > > > that started using non-ASCII passwords in the absence of any
guidance from
> > > > > the IETF on how to do so, and we have to consider whether
what we do will
> > > > > break them, and so hearing from someone versed in the matter
who has
> > > > > thought about this particular case would help assuage my
concerns. One
> > > > > possible route (given that, as I understand it, a lot of EPP
deployments
> > > > > involve exchange of configuration and deployment information
between peers
> > > > > out of band) would be to say that the PRECIS profile is used
as a default
> > > > > in the absence of other configuration knowledge for a given
deployment,
> > > > > though I acknowledge that this is not without flaws.
> > > >
> > > > I had discussed the PRECIS issue with Jim, which is what
resulted in this text:
> > > >
> > > > It is recommended that the plain text password in the
<loginSec:pw>
> > > > and <loginSec:newPw> elements use printable ASCII characters
#x20
> > > > (space) - #x7E (~), with high entropy, such as 128 bits. If
non-
> > > > ASCII characters are supported with the plain text password,
then use
> > > > a standard for passwords with international characters, such
as the
> > > > OpaqueString PRECIS profile in [RFC8265].
> > > >
> > > > I think that's adequate, given that (1) we really are expecting
that
> > > > almost all passwords out there are ASCII, and we're recommending
> > > > keeping it that way, (2) we need to allow, but discourage,
non-ASCII
> > > > UTF-8 passwords for the (expectedly rare) cases where they
might be
> > > > used, and (3) these are stored passwords that are passed around,
> > > > rather than passwords entered by users and subject to issues
created
> > > > by different input mechanisms and effects on eyeballs.
> > > >
> > > > I can see that we might want to change "recommended" to
"RECOMMENDED",
> > > > and I don't object to that (Jim?). Beyond that, I'm not sure
where
> > > > you're going with "PRECIS profiles are to be used as part of a
> > > > protocol as opposed to part of a deployment." It's really both,
> > > > depending upon the situation. In this case, it's saying that
if your
> > > > server supports non-ASCII passwords, you'd better use the
OpaqueString
> > > > profile to handle them. If your server doesn't (it supports
only
> > >
> > > I'm much happier with your prose description here than the
snippet quoted
> > > from the document -- what's in the document now seems to be
weaker than
> > > what you say ("pick a standard; PRECIS is a standard" vs "you
should use
> > > PRECIS, though here's an out if you can't for some reason").
> > >
> > > My primary concern here is that the client and server need to
know to use
> > > the same standard (whatever it is). Making this RFC say flatly
"use
> > > PRECIS" is IMO the easiest way to do that, though given how much
other
> > > stuff in EPP has to be set by out-of-band configuration I won't
raise a
> > > fuss if this ends up being another one. If it does need to be
known out of
> > > band, though, my preference is always for that need to be stated
in the
> > > RFC.
> > >
> > > > ASCII passwords), we're good. From a PRECIS point of view, I
don't
> > > > see more that needs to be done with this.
> > > >
> > > > I think a large part of the point of the text that Jim added is
an
> > > > acknowledgement that in the common case of ASCII-only
passwords, we
> > > > don't have to worry about normalization/canonicalization of
password
> > > > strings at all, and just doing straight byte-string comparisons
works.
> > > > And the OpaqueString profile is there for cases where it's
needed.
> > > >
> > > > Now, it's certainly true that if a server *supports* non-ASCII
> > > > passwords, then *all* password processing on that server has to
use
> > > > the OpaqueString profile, even if there are not any actual
non-ASCII
> > > > passwords present... just in case one might show up. And I
think the
> > > > text does say that.
> > >
> > > (repeating myself, but I think the text says "all password
processing on
> > > that server has to use the chosen standard for non-ASCII
passwords" [which
> > > is not necessarily the OpaqueString PRECIS profile])
> > >
> > > > Is there something in this discussion that I'm missing that I
need to
> > > > address? Is there specific text you might suggest? Are there
other
> > > > issues beyond this one that are still open? How close are we to
> > > > resolving this?
> > >
> > > I think just adding the extra background and your sense of what
the text is
> > > trying to convey has been a big help. I would suggest rewording
to:
> > >
> > > [...]. If non-
> > > ASCII characters are supported with the plain text password,
then use
> > > a standard for passwords with international characters; the
> > > OpaqueString PRECIS profile in [RFC8265] is recommended in the
absence of
> > > other considerations.
> > >
> > > Your explanation suffices such that I will not require this
change to clear
> > > my Discuss, though.
> > >
> > > -Ben
> >
> >
_______________________________________________
regext mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/regext