Skip to main content

Encrypted Content-Encoding for HTTP
draft-ietf-httpbis-encryption-encoding-09

Revision differences

Document history

Date Rev. By Action
2017-06-21
09 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2017-06-05
09 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2017-05-17
09 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2017-05-05
09 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2017-04-18
09 (System) IANA Action state changed to Waiting on RFC Editor from Waiting on Authors
2017-04-18
09 (System) IANA Action state changed to Waiting on Authors
2017-04-18
09 (System) RFC Editor state changed to EDIT
2017-04-18
09 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2017-04-18
09 (System) Announcement was received by RFC Editor
2017-04-18
09 Amy Vezza IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2017-04-18
09 Amy Vezza IESG has approved the document
2017-04-18
09 Amy Vezza Closed "Approve" ballot
2017-04-18
09 Amy Vezza Ballot approval text was generated
2017-04-18
09 Amy Vezza IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2017-04-18
09 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2017-04-18
09 Martin Thomson New version available: draft-ietf-httpbis-encryption-encoding-09.txt
2017-04-18
09 (System) New version approved
2017-04-18
09 (System) Request for posting confirmation emailed to previous authors: Martin Thomson
2017-04-18
09 Martin Thomson Uploaded new revision
2017-04-14
08 Eric Rescorla [Ballot Position Update] Position for Eric Rescorla has been changed to No Objection from Discuss
2017-04-14
08 Eric Rescorla
[Ballot discuss]

  The "aes128gcm" content coding uses a fixed record size.  The final
  encoding consists of a header (see Section 2.1) and zero …
[Ballot discuss]

  The "aes128gcm" content coding uses a fixed record size.  The final
  encoding consists of a header (see Section 2.1) and zero or more
  fixed size encrypted records; the final record can be smaller than
  the record size.

This restriction seems to be an artifact of your previous design which
used short records as an end marker.  With the new padding delimeter
structure (which I note is isomorphic to the TLS 1.3 structure), I'm
not seeing any reason to require that the records be fixed length (as
they are not in TLS). I didn't see any discussion of this point in the
thread where this structure was designed, so I'd like to get
confirmation that the WG considered this point and decided to continue
with the above restriction. I'll clear this discuss upon either such confirmation
or removal of the restriction.


UPDATE: James Manger points out that you need fixed record sizes
for random access and header-freeness, though not for security. I will
clear this.
2017-04-14
08 Eric Rescorla Ballot discuss text updated for Eric Rescorla
2017-04-13
08 Cindy Morgan IESG state changed to IESG Evaluation::AD Followup from Waiting for Writeup
2017-04-13
08 Kathleen Moriarty [Ballot comment]
Thanks for addressing the SecDir review comments:
https://mailarchive.ietf.org/arch/msg/secdir/6TCbjRD3sEBNmZxEhxN7Q4LA0aI
2017-04-13
08 Kathleen Moriarty [Ballot Position Update] New position, No Objection, has been recorded for Kathleen Moriarty
2017-04-12
08 Alia Atlas [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas
2017-04-12
08 Spencer Dawkins [Ballot comment]
Thanks for producing this specification.
2017-04-12
08 Spencer Dawkins [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins
2017-04-12
08 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2017-04-12
08 Ben Campbell [Ballot Position Update] New position, Yes, has been recorded for Ben Campbell
2017-04-11
08 Eric Rescorla
[Ballot discuss]
  The "aes128gcm" content coding uses a fixed record size.  The final
  encoding consists of a header (see Section 2.1) and zero …
[Ballot discuss]
  The "aes128gcm" content coding uses a fixed record size.  The final
  encoding consists of a header (see Section 2.1) and zero or more
  fixed size encrypted records; the final record can be smaller than
  the record size.

This restriction seems to be an artifact of your previous design which
used short records as an end marker.  With the new padding delimeter
structure (which I note is isomorphic to the TLS 1.3 structure), I'm
not seeing any reason to require that the records be fixed length (as
they are not in TLS). I didn't see any discussion of this point in the
thread where this structure was designed, so I'd like to get
confirmation that the WG considered this point and decided to continue
with the above restriction. I'll clear this discuss upon either such confirmation
or removal of the restriction.
2017-04-11
08 Eric Rescorla
[Ballot comment]

S 2.1.
You should say what idlen is. The QUIC notation here isn't defined :)

S 2.2/2.3.
Can you make clearer that the …
[Ballot comment]

S 2.1.
You should say what idlen is. The QUIC notation here isn't defined :)

S 2.2/2.3.
Can you make clearer that the strings don't have their own null
termination. I.e, that what is fed into the CEK generation function
is  .... 32  38  67  63  6d 00 01
not .... 32  38  67  63  6d 00 00 01


S 4.6.
 
  This mechanism only offers encryption of content; it does not perform
  authentication or authorization, which still needs to be performed
  (e.g., by HTTP authentication [RFC7235]).

This text is kind of confusing, because the mechanism does provide
data origin authentication. I think you mean that if the server is
just going to process this as an opaque and stuff it somewhere, then
it needs extra authentication? This seems like a layering issue.


S 4.7.
Some citations to some of the various padding traffic analysis papers
might be useful.

  Distributing non-padding data is recommended to avoid
  leaking size information.

I think you mean "distributing this across the records".
2017-04-11
08 Eric Rescorla [Ballot Position Update] New position, Discuss, has been recorded for Eric Rescorla
2017-04-11
08 Suresh Krishnan [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan
2017-04-11
08 Warren Kumari [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari
2017-04-11
08 Alissa Cooper
[Ballot comment]
From Pete's Gen-ART review:

Nits/editorial comments: Looks fine from a non-security-expert's perspective. It is my duty to ask about keyid in section 2.1: …
[Ballot comment]
From Pete's Gen-ART review:

Nits/editorial comments: Looks fine from a non-security-expert's perspective. It is my duty to ask about keyid in section 2.1:

      A "keyid" parameter SHOULD be a UTF-8
      [RFC3629] encoded string, particularly where the identifier might
      need to appear in a textual form.

I presume that simply means "might need to be rendered" and does not include "might need to be typed in by someone", correct? The former is easy; the latter probably requires a bit more text.
2017-04-11
08 Alissa Cooper [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper
2017-04-11
08 Mirja Kühlewind [Ballot comment]
section 3.1: "plaintext = SSBhbSB0aGUgd2FscnVzAg" ?
2017-04-11
08 Mirja Kühlewind [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind
2017-04-10
08 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2017-04-09
08 Alexey Melnikov Ballot has been issued
2017-04-09
08 Alexey Melnikov [Ballot Position Update] New position, Yes, has been recorded for Alexey Melnikov
2017-04-09
08 Alexey Melnikov Created "Approve" ballot
2017-04-09
08 Alexey Melnikov Ballot writeup was changed
2017-04-06
08 (System) IESG state changed to Waiting for Writeup from In Last Call
2017-04-05
08 Pete Resnick Request for Last Call review by GENART Completed: Ready. Reviewer: Pete Resnick. Sent review to list.
2017-04-05
08 Robert Sparks Request for Last Call review by SECDIR Completed: Ready. Reviewer: Robert Sparks. Sent review to list.
2017-04-04
08 (System) IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed
2017-04-04
08 Sabrina Tanamal
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Services Operator has completed its review of draft-ietf-httpbis-encryption-encoding-08.txt. If any part of this review is inaccurate, please let …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Services Operator has completed its review of draft-ietf-httpbis-encryption-encoding-08.txt. If any part of this review is inaccurate, please let us know.

The IANA Services Operator understands that, upon approval of this document, there is a single action which we must complete.

In the HTTP Content Coding Registry located in the Hypertext Transfer Protocol (HTTP) Parameters registry located at:

https://www.iana.org/assignments/http-parameters/

a single, new entry is to be added as follows:

Name: aes128gcm
Description: AES-GCM encryption with a 128-bit content encryption key
Reference: [ RFC-to-be ]
Notes:

The IANA Services Operator understands that this is the only action required to be completed upon approval of this document.

Note:  The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is only to confirm what actions will be performed.

Thank you,

Sabrina Tanamal
IANA Services Specialist
PTI
2017-04-03
08 Al Morton Request for Last Call review by OPSDIR Completed: Ready. Reviewer: Al Morton. Sent review to list.
2017-03-31
08 Alexey Melnikov Placed on agenda for telechat - 2017-04-13
2017-03-30
08 Tero Kivinen Request for Last Call review by SECDIR is assigned to Robert Sparks
2017-03-30
08 Tero Kivinen Request for Last Call review by SECDIR is assigned to Robert Sparks
2017-03-27
08 Jean Mahoney Request for Last Call review by GENART is assigned to Pete Resnick
2017-03-27
08 Jean Mahoney Request for Last Call review by GENART is assigned to Pete Resnick
2017-03-27
08 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Al Morton
2017-03-27
08 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Al Morton
2017-03-23
08 Amy Vezza IANA Review state changed to IANA - Review Needed
2017-03-23
08 Amy Vezza
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC: httpbis-chairs@ietf.org, draft-ietf-httpbis-encryption-encoding@ietf.org, Mark Nottingham , mnot@mnot.net, ietf-http-wg@w3.org, …
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC: httpbis-chairs@ietf.org, draft-ietf-httpbis-encryption-encoding@ietf.org, Mark Nottingham , mnot@mnot.net, ietf-http-wg@w3.org, alexey.melnikov@isode.com
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (Encrypted Content-Encoding for HTTP) to Proposed Standard


The IESG has received a request from the Hypertext Transfer Protocol WG
(httpbis) to consider the following document:
- 'Encrypted Content-Encoding for HTTP'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2017-04-06. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  This memo introduces a content coding for HTTP that allows message
  payloads to be encrypted.

Note to Readers

  Discussion of this draft takes place on the HTTP working group
  mailing list (ietf-http-wg@w3.org), which is archived at
  https://lists.w3.org/Archives/Public/ietf-http-wg/ .

  Working Group information can be found at http://httpwg.github.io/ ;
  source code and issues list for this draft can be found at
  https://github.com/httpwg/http-extensions/labels/encryption .




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-httpbis-encryption-encoding/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-httpbis-encryption-encoding/ballot/

The following IPR Declarations may be related to this I-D:

  https://datatracker.ietf.org/ipr/2777/



The document contains these normative downward references.
See RFC 3967 for additional information:
    rfc5869: HMAC-based Extract-and-Expand Key Derivation Function (HKDF) (Informational - IETF stream)
Note that some of these references may already be listed in the acceptable Downref Registry.


2017-03-23
08 Amy Vezza IESG state changed to In Last Call from Last Call Requested
2017-03-23
08 Alexey Melnikov Last call was requested
2017-03-23
08 Alexey Melnikov Last call announcement was generated
2017-03-23
08 Alexey Melnikov Ballot approval text was generated
2017-03-23
08 Alexey Melnikov Ballot writeup was generated
2017-03-23
08 Alexey Melnikov IESG state changed to Last Call Requested from AD Evaluation
2017-03-23
08 Alexey Melnikov IESG state changed to AD Evaluation from Publication Requested
2017-03-02
08 Mark Nottingham
# Shepherd Writeup for draft-ietf-httpbis-encryption-encoding

## 1. Summary

Mark Nottingham is the document shepherd; Alexey Melnikov is the responsible Area Director.

This memo introduces a …
# Shepherd Writeup for draft-ietf-httpbis-encryption-encoding

## 1. Summary

Mark Nottingham is the document shepherd; Alexey Melnikov is the responsible Area Director.

This memo introduces a content-coding for HTTP that allows message payloads to
be encrypted.

The intended status is Proposed Standard.

## 2. Review and Consensus

This document has been discussed for some time in the Working Group, going through several
revisions and reviews. The editor is primarily responsible for the design, but reviews by a number
of other people have shaped its design over time.

The most immediate use case comes from the WEBPUSH WG.

A list of implementations can be found at:
  https://github.com/httpwg/wiki/wiki/EncryptedContentEncoding
Note that some need to be updated to reflect the latest draft.

## 3. Intellectual Property

Martin has confirmed that, to his direct, personal knowledge, all IPR related to this document has
already been disclosed, in conformance with BCPs 78 and 79.

One IPR disclosure has been made for this document; see .
The Working Group was informed of this (see
), but no changes to the draft
resulted.

## 4. Other Points

This document has a downward reference to RFC5869, which is already in the DOWNREF Registry.
2017-03-02
08 Mark Nottingham Responsible AD changed to Alexey Melnikov
2017-03-02
08 Mark Nottingham IETF WG state changed to Submitted to IESG for Publication from In WG Last Call
2017-03-02
08 Mark Nottingham IESG state changed to Publication Requested
2017-03-02
08 Mark Nottingham IESG process started in state Publication Requested
2017-03-02
08 Mark Nottingham Changed document writeup
2017-03-02
08 Martin Thomson New version available: draft-ietf-httpbis-encryption-encoding-08.txt
2017-03-02
08 (System) New version approved
2017-03-02
08 (System) Request for posting confirmation emailed to previous authors: Martin Thomson
2017-03-02
08 Martin Thomson Uploaded new revision
2017-02-15
07 Mark Nottingham IETF WG state changed to In WG Last Call from WG Document
2017-02-13
07 Martin Thomson New version available: draft-ietf-httpbis-encryption-encoding-07.txt
2017-02-13
07 (System) New version approved
2017-02-13
07 (System) Request for posting confirmation emailed to previous authors: "Martin Thomson"
2017-02-13
07 Martin Thomson Uploaded new revision
2016-12-22
06 Martin Thomson New version available: draft-ietf-httpbis-encryption-encoding-06.txt
2016-12-22
06 (System) New version approved
2016-12-22
06 (System) Request for posting confirmation emailed to previous authors: "Martin Thomson"
2016-12-22
06 Martin Thomson Uploaded new revision
2016-12-21
05 Martin Thomson New version available: draft-ietf-httpbis-encryption-encoding-05.txt
2016-12-21
05 (System) New version approved
2016-12-21
05 (System) Request for posting confirmation emailed to previous authors: "Martin Thomson"
2016-12-21
05 Martin Thomson Uploaded new revision
2016-11-13
04 Patrick McManus Added to session: IETF-97: httpbis  Tue-1330
2016-10-31
04 Martin Thomson New version available: draft-ietf-httpbis-encryption-encoding-04.txt
2016-10-31
04 (System) New version approved
2016-10-31
03 (System) Request for posting confirmation emailed to previous authors: "Martin Thomson"
2016-10-31
03 Martin Thomson Uploaded new revision
2016-10-09
03 Martin Thomson New version available: draft-ietf-httpbis-encryption-encoding-03.txt
2016-10-09
03 (System) New version approved
2016-10-09
02 (System) Request for posting confirmation emailed to previous authors: "Martin Thomson"
2016-10-09
02 Martin Thomson Uploaded new revision
2016-06-29
02 Martin Thomson New version available: draft-ietf-httpbis-encryption-encoding-02.txt
2016-06-06
01 Mark Nottingham Changed consensus to Yes from Unknown
2016-06-06
01 Mark Nottingham Intended Status changed to Proposed Standard from None
2016-06-06
01 Mark Nottingham Notification list changed to "Mark Nottingham" <mnot@mnot.net>
2016-06-06
01 Mark Nottingham Document shepherd changed to Mark Nottingham
2016-03-22
Naveen Khan Posted related IPR disclosure: Glassey?McNeil's Statement about IPR related to draft-ietf-httpbis-encryption-encoding, draft-ietf-pkix-x509-ipaddr-as-extn, and draft-mm-wg-effect-encrypt-01
2016-03-20
01 Martin Thomson New version available: draft-ietf-httpbis-encryption-encoding-01.txt
2015-12-23
00 Mark Nottingham This document now replaces draft-thomson-http-encryption instead of None
2015-12-23
00 Martin Thomson New version available: draft-ietf-httpbis-encryption-encoding-00.txt