IPP>SEC - Minutes of 4/24 call

IPP>SEC - Minutes of 4/24 call

Roger K Debry rdebry at us.ibm.com
Thu Apr 24 18:15:12 EDT 1997


Classification:
Prologue:
Epilogue: Roger K deBry
Senior Techncial Staff Member
Architecture and Technology
IBM Printing Systems
email: rdebry at us.ibm.com
phone: 1-303-924-4080


Minutes of IPP Security Conference call - 4/24/97


Participants: Roger deBry, Keith Carter, Carl-Uno Manros (and
Xerox team - Daniel, Steve, John), Keith Carter, Jerry Hadsell,
Steve Zilles


Carl-Uno reviewed an internal meeting held at Xerox where Dave Crocker,
a long time IETF person, participated in a security discussion. Key
points that came out of the Xerox meeting were


o Need to limit the scope of IPP security to problems that are
  solvable with current or close in technology.  Specifically
  need to exclude secure print by reference from the current scope.
  No work going on in the ietf which will solve this problem.


o Defined four levels of security.
  - No security at all
  - Privacy only, within a trusted environment
  - Client authentication only, mainly for authorization
  - Mutual authentication and privacy, only for highest security


o Some threats are not important enough to try to solve. Others can
  be solved without additional specific security mechanisms. Spamming
  was given as an example of a threat that could easily be solved
  without requiring a specific security mechanism in IPP.


o Two places were mentioned where we would like to see the ietf security
  work:
  - authorization
  - key management


o Two approaches to security were discussed
  - Channel level security
  - Object level security


o There was some discussion on the use of Mime types for IPP.
  Dave Crocker thought that this was a useful idea. Mimes can be
  encrypted and signed. There was also some discussion on the call
  on creating unique mime types for each pdl. We concluded that this
  was a good idea but that each mime-type would have to declare how
  versions of the pdl were to be handled.  The protocol group should
  look into this.


o There was some discussion on firewalls.  Do firewalls trigger off
  port 80? If they do, there may be some benefit to having a unique
  port number for IPP. We agreed that this would also be desired if
  we ended up using some subset of http.


o Dave suggested that some candidates for IPP security not be
  considered:
  - SHTTP - not widely deployed and not favored by the ietf
  - SASL - too new to consider, won't meet our time frame


o For channel security, the following were recommended:
  - RFC 2069, digest authentication for use with http 1.1
  - Transport Layer Security (TLS)


o For object level security the following were recommended:
  - Secure mime (has some problems because of RSA prprietary stuff)
  - PGP-Mime - still a bit new and not yet deployed


o It was agreed that we needed guidance from Netscape and Microsoft on
  which of these protocols we ought to be using for IPP.  Carl-Uno will
  ask Netscape and Microsoft for recommendations.


o Xerox will write up a more formal note on the results of their meeting
  and will make this available to the working group. In the meantime we
  should all review the security mechanisms recommended. For information


  SASL specification is draft-myers-auth-sasl-10.txt
  TSL specification is draft-ietf-tls-protocol-02.txt


o Next call will be Thursday, May 1st
                    1 - 3pm PDT



More information about the Ipp mailing list