💾 Archived View for gemini.bortzmeyer.org › rfc-mirror › rfc2084.txt captured on 2024-02-05 at 12:20:58.
⬅️ Previous capture (2021-11-30)
-=-=-=-=-=-=-
Network Working Group G. Bossert Request for Comments: 2084 S. Cooper Category: Informational Silicon Graphics Inc. W. Drummond IEEE, Inc. January 1997 Considerations for Web Transaction Security Status of this Memo This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document specifies the requirements for the provision of security services to the HyperText Transport Protocol. These services include confidentiality, integrity, user authentication, and authentication of servers/services, including proxied or gatewayed services. Such services may be provided as extensions to HTTP, or as an encapsulating security protocol. Secondary requirements include ease of integration and support of multiple mechanisms for providing these services. 1. Introduction The use of the HyperText Transport Protocol [1] to provide specialized or commercial services and personal or private data necessitates the development of secure versions that include privacy and authentication services. Such services may be provided as extensions to HTTP, or as encapsulating security protocols; for the purposes of this document, all such enhancements will be referred to as WTS. In this document, we specify the requirements for WTS, with the intent of codifying perceived Internet-wide needs, along with existing practice, in a way that aids in the evaluation and development of such protocols. Bossert, et. al. Informational [Page 1] RFC 2084 Considerations for Web Transaction Security January 1997 WTS is an enhancement to an object transport protocol. As such, it does not provide independent certification of documents or other data objects outside of the scope of the transfer of said objects. In addition, security at the WTS layer is independent of and orthogonal to security services provided at underlying network layers. It is envisioned that WTS may coexist in a single transaction with such mechanisms, each providing security services at the appropriate level, with at worst some redundancy of service. 1.1 Terminology This following terms have specific meaning in the context of this document. The HTTP specification [1] defines additional useful terms. Transaction: A complete HTTP action, consisting of a request from the client and a response from the server. Gatewayed Service: A service accessed, via HTTP or an alternate protocol, by the HTTP server on behalf of the client. Mechanism: An specific implementation of a protocol or related subset of features of a protocol. 2. General Requirements WTS must define the following services. These services must be provided independently of each other and support the needs of proxies and intermediaries o Confidentiality of the HTTP request and/or response. o Data origin authentication and data integrity of the HTTP request and/or response. o Non-repudiability of origin for the request and/or response. o Transmission freshness of request and/or response. o Ease of integration with other features of HTTP. o Support of multiple mechanisms for the above services. 3. Confidentiality WTS must be able to provide confidentiality for both requests and responses. Note: because the identity of the object being requested is potentially sensitive, the URI of the request should be confidential; this is particularly critical in the common case of form data or other user input being passed in the URI. Bossert, et. al. Informational [Page 2] RFC 2084 Considerations for Web Transaction Security January 1997 4. Service Authentication WTS should support the authentication of gatewayed services to the client. WTS should support the authentication of the origin HTTP server or gatewayed services regardless of intermediary proxy or caching servers. To allow user privacy, WTS must support service authentication with user anonymity. Because the identity of the object being requested is potentially sensitive, service authentication should occur before any part of the request, including the URI of the requested object, is passed. In cases where the authentication process depends on the URI (or other header data) of the request, such as gatewayed services, the minimum necessary information to identify the entity to be authenticated should be passed. 5. User Authentication WTS must support the authentication of the client to the server. WTS should support the authentication of the client to gatewayed services. WTS should support the authentication of the client to the origin HTTP server regardless of intermediary proxy servers. 6. Integrity WTS must provide assurance of the integrity of the HTTP transaction, including the HTTP headers and data objects of both client requests and server responses. 7. Integration In order to support integration with current and future versions of HTTP, and to provide extendibility and independence of development, the secure services provided by WTS must be orthogonal to and independent of other services provided by HTTP. Bossert, et. al. Informational [Page 3] RFC 2084 Considerations for Web Transaction Security January 1997 In accordance with the layered model of network protocols, WTS must be: o independent of the content or nature of data objects being transported although special attention to reference integrity of hyperlinked objects may be appropriate o implementable over a variety of connection schemes and underlying transport protocols 8. Multiple Mechanisms WTS must be compatible with multiple mechanisms for authentication and encryption. Support for multiple mechanisms is required for a number of reasons: o Accommodation of variations in site policies, including those due to external restrictions on the availability of cryptographic technologies. o Support for a variety of applications and gatewayed services. o Support for parallel implementations within and across administrative domains. o Accomodation of application-specific performance/security tradeoffs. To allow interoperability across domains, and to support the transition to new/upgraded mechanisms, WTS should provide negotiation of authentication and encryption mechanisms. Bossert, et. al. Informational [Page 4] RFC 2084 Considerations for Web Transaction Security January 1997 References [1] Berners-Lee, T., Fielding, R., and H. Frystyk Nielsen, "Hypertext Transfer Protocol -- HTTP/1.0", RFC 1945, May 1996. [2] G. Bossert, S. Cooper, W. Drummond. "Requirements of Secure Object Transfer Protocols", Work in Progress <URL:http://www-ns.rutgers.edu/www-security/draft/ draft-rutgers-sotp-requirements-00.txt>, March 1995. The revision history of this document can be located at <URL:http://reality.sgi.com/csp/wts-wg/wts-documents.html> Acknowledgments This document is a product of the IETF WTS working group. The working group uses the wts-wg@postofc.corp.sgi.com mailing list for discussion. The subscription address is wts-wg- request@postofc.corp.sgi.com. Eric Rescorla of Terisa <ekr@terisa.com> provided valuable comments on an early draft of a document called "Requirements of Secure Object Transfer" [2], a principal influence on this document. Security Considerations As noted above. Bossert, et. al. Informational [Page 5] RFC 2084 Considerations for Web Transaction Security January 1997 Authors' Addresses Greg Bossert Silicon Graphics, Inc. MS 15-7 2011 North Shoreline Blvd. Mountain View, CA 94043-1389 USA EMail: bossert@corp.sgi.com Simon Cooper Silicon Graphics, Inc. MS 15-7 2011 North Shoreline Blvd. Mountain View, CA 94043-1389 USA EMail: sc@corp.sgi.com Walt Drummond Institute of Electrical and Electronics Engineers, Inc. 445 Hoes Lane Piscataway, NJ 08855-1331 USA Phone: 908-562-6545 Fax: 908-562-1727 EMail: drummond@ieee.org Bossert, et. al. Informational [Page 6]