Independent Submission | J. Élie |
Internet-Draft | December 21, 2016 |
Updates: 4642 (if approved) | |
Intended status: Standards Track | |
Expires: June 24, 2017 |
Use of Transport Layer Security (TLS) in the Network News Transfer Protocol (NNTP)
draft-elie-nntp-tls-recommendations-02
This document provides recommendations for improving the security of the Network News Transfer Protocol (NNTP) when using Transport Layer Security (TLS). It modernizes the NNTP usage of TLS to be consistent with TLS best current practices. If approved, this document updates RFC 4642.
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."
This Internet-Draft will expire on June 24, 2017.
Copyright (c) 2016 IETF Trust and the persons identified as the document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
The Network News Transfer Protocol (NNTP) [RFC3977] has been using Transport Layer Security (TLS) [RFC5246] (along with its precursor, Secure Sockets Layer or SSL) since at least year 2000. The use of TLS in NNTP was formalized in [RFC4642], providing at the same time implementation recommendations. In order to address the evolving threat model on the Internet today, this document provides stronger recommendations regarding that use.
In particular, this document updates [RFC4642] by specifying that NNTP implementations and deployments MUST follow the best current practices documented in the "Recommendations for Secure Use of TLS and DTLS" [RFC7525]. This includes stronger recommendations regarding SSL/TLS protocol versions, fallback to lower versions, strict TLS, TLS-level compression, TLS session resumption, cipher suites, public key lengths, forward secrecy, and other aspects of using TLS with NNTP.
Any term not defined in this document has the same meaning as it does in [RFC4642] or the NNTP core specification [RFC3977].
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].
Please write the first letter of "Elie" with an acute accent wherever possible -- it is U+00C9 ("É" in XML). The third letter of "Stephane" and the penultimate letter of "allee" similarly have an acute accent (U+00E9, "é" in XML). Also, the letters "ae" in "Baeuerle" should be written as an a-umlaut (U+00E4, "ä" in XML).
This document updates [RFC4642] in the following aspects:
Appendix A of this document gives detailed changes with regards to the wording of [RFC4642].
The best current practices documented in the "Recommendations for Secure Use of TLS and DTLS" [RFC7525] are included here by reference. Therefore, NNTP implementations and deployments compliant with this document are REQUIRED to also comply with [RFC7525].
Instead of repeating those recommendations here, this document mostly provides supplementary information regarding secure implementation and deployment of NNTP technologies.
NNTP supports the use of the COMPRESS command, defined in Section 2.2 of [NNTP-COMPRESS], to compress data between an NNTP client and server. Although this NNTP extension might have slightly stronger security properties than TLS-level compression [RFC3749] (since NNTP compression can be activated after authentication has completed, thus reducing the chances that authentication credentials can be leaked via for instance a CRIME attack, as described in Section 2.6 of [CRIME]), this document neither encourages nor discourages the use of the NNTP COMPRESS extension.
NNTP implementations of news servers are encouraged to support options to configure the minimal TLS protocol version to accept, and which cipher suites, signature algorithms or groups (like elliptic curves) to use for incoming connections. Additional options can naturally also be supported. The goal is to enable administrators of news servers to easily and quickly strengthen security, if need be (for instance by rejecting cipher suites considered unsafe with regards to local policy).
News clients may also support similar options, either configurable by the user or enforced by the news reader.
The TLS extension for Server Name Indication (SNI) defined in Section 3 of [RFC6066] MUST be implemented by all news clients. It also MUST be implemented by any news server that is known by multiple names. (Otherwise, it is not possible for a server with several hostnames to present the correct certificate to the client.)
[RFC4642] already provides recommendations and requirements for certificate validation in the context of checking the client or the server's identity.
Wherever possible, it is best to prefer certificate-based authentication (along with SASL [RFC4422]), and ensure that:
This document does not mandate certificate-based authentication, although such authentication is strongly preferred. As mentioned in Section 2.2.2 of [RFC4642], the AUTHINFO SASL command (Section 2.4 of [RFC4643]) with the EXTERNAL mechanism (Appendix A of [RFC4422]) MAY be used to authenticate a client once its TLS credentials have been successfully exchanged.
Given the pervasiveness of eavesdropping [RFC7258], even an encrypted but unauthenticated connection might be better than an unencrypted connection (this is similar to the "better-than-nothing security" approach for IPsec [RFC5386]). Encrypted but unauthenticated connections include connections negotiated using anonymous Diffie‑Hellman mechanisms or using self-signed certificates, among others.
Note: when an NNTP server receives a Netnews article, it MAY add a <diag‑match> (Section 3.1.5 of [RFC5536]), which appears as "!!" in the Path header field of that article, to indicate that it verified the identity of the client or peer server. This document encourages the construction of such Path header fields, as described in Section 3.2.1 of [RFC5537].
It is strongly encouraged that NNTP clients provide ways for end users (and that NNTP servers provide ways for administrators) to complete the following tasks:
Note that the last two tasks cannot occur when strict TLS is used.
Beyond the security considerations already described in [RFC4642] and [RFC7525], the author wishes to add the following caveat when not using strict TLS.
NNTP servers need ensure that they are not vulnerable to the STARTTLS command injection vulnerability (Section 2.2 of [RFC7457]). Though this command MUST NOT be pipelined, an attacker could pipeline it. Therefore, NNTP servers MUST discard any NNTP command received between the use of STARTTLS and the end of TLS negotiation.
This document has no actions for IANA.
[RFC2119] | Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997. |
[RFC3977] | Feather, C., "Network News Transfer Protocol (NNTP)", RFC 3977, DOI 10.17487/RFC3977, October 2006. |
[RFC4642] | Murchison, K., Vinocur, J. and C. Newman, "Using Transport Layer Security (TLS) with Network News Transfer Protocol (NNTP)", RFC 4642, DOI 10.17487/RFC4642, October 2006. |
[RFC5246] | Dierks, T. and E. Rescorla, "The Transport Layer Security (TLS) Protocol Version 1.2", RFC 5246, DOI 10.17487/RFC5246, August 2008. |
[RFC6066] | Eastlake 3rd, D., "Transport Layer Security (TLS) Extensions: Extension Definitions", RFC 6066, DOI 10.17487/RFC6066, January 2011. |
This section lists detailed changes this document applies to [RFC4642].
The second sentence in the Abstract of [RFC4642] is replaced with the following text:
The second sentence of the first paragraph in Section 2.2.2 of [RFC4642] is replaced with the following text:
The third and fourth paragraphs in Section 1 of [RFC4642] are replaced with the following text:
The third paragraph in Section 5 of [RFC4642] is removed. Consequently, NNTP no longer requires to implement any cipher suites, other than those prescribed by TLS (Section 9 of [RFC5246]) and Sections 4.2 and 4.2.1 of [RFC7525].
The last two sentences of the seventh paragraph in Section 2.2.2 of [RFC4642] are removed. Section 3.6 of [RFC7525] apply.
The first two sentences of the seventh paragraph in Section 2.2.2 of [RFC4642] are removed. There is no special requirement for NNTP with regards to TLS Client Hello messages. Section 7.4.1.2 and Appendix E of [RFC5246] apply.
This document draws heavily on ideas in [RFC7590] by Peter Saint‑Andre and Thijs Alkemade; a large portion of this text was borrowed from that specification.
The author would like to thank the following individuals for contributing their ideas and support for writing this specification: Michael Bäuerle, Stéphane Bortzmeyer, Sabahattin Gucukoglu, Richard Kettlewell, Jouni Korhonen, David Eric Mandelberg, and Chris Newman.
Many thanks to the Responsible Area Director, Alexey Melnikov, for reviewing and sponsoring this document.