Skip to main content

IETF conflict review for draft-warden-appsawg-vnc-scheme
conflict-review-warden-appsawg-vnc-scheme-00

Yes

(Barry Leiba)

No Objection

(Benoît Claise)
(Deborah Brungard)
(Jari Arkko)
(Martin Stiemerling)

Abstain


Note: This ballot was opened for revision 00 and is now closed.

Ballot question: "Is this the correct conflict review response?"

Barry Leiba Former IESG member
Yes
Yes () Unknown

                            
Alvaro Retana Former IESG member
No Objection
No Objection (2016-02-16) Unknown
In line with Stephen's DISCUSS, I'm in favor of adding a note (from the authors or the IESG) about the security risks.
Ben Campbell Former IESG member
No Objection
No Objection (2016-02-17) Unknown
I would also support a note about the cleartext password concern.
Benoît Claise Former IESG member
No Objection
No Objection () Unknown

                            
Brian Haberman Former IESG member
No Objection
No Objection (2016-02-15) Unknown
I share Stephen's concern about this document. I do find it interesting that the Security Considerations section talks about potentially protecting sensitive parameters within the URI with SSH... when SSH parameters are one of those pieces of sensitive information. And while, I understand that VNC has protections built into it, I think we are beyond the point where we can pretend that information sharing constructs will not be leaked in ways that were not expected or designed for.
Deborah Brungard Former IESG member
No Objection
No Objection () Unknown

                            
Jari Arkko Former IESG member
No Objection
No Objection () Unknown

                            
Joel Jaeggli Former IESG member
No Objection
No Objection (2016-02-15) Unknown
URIs with secrets embedded in them seem like spectacularly bad ideas that hearken back to 4248.

I think the conflict review accurate though iesg text that says you really shouldn't  do this might well be appropiate.
Martin Stiemerling Former IESG member
No Objection
No Objection () Unknown

                            
Spencer Dawkins Former IESG member
No Objection
No Objection (2016-02-15) Unknown
I'll be listening to the discussion on Stephen's Discuss with interest.
Alissa Cooper Former IESG member
Abstain
Abstain (2016-02-17) Unknown
Given that RFC 3986 says "URI producers should not provide a URI that contains a username or password that is intended to be secret" and that RFC 7595 says "Definitions of schemes MUST be accompanied by a clear analysis of the security and privacy implications for systems that use the scheme" and points to RFC 3986, I do not feel comfortable balloting any other position on the narrow question of whether this document conflicts with other IETF work.
Stephen Farrell Former IESG member
(was Discuss) Abstain
Abstain (2016-02-25) Unknown
Thanks for adding the text about sensitive data in URIs. I still wish
the scheme showed how to do something better.
Terry Manderson Former IESG member
Abstain
Abstain (2016-02-17) Unknown
I agree with Alissa. This document naively heads in a direction opposite to RFC3986 and RFC7595.