On 12/8/10 12:50 PM, =JeffH wrote:
> <snip/>
> 
>> stpete sez..
>>> In Section 4.2.1 we say:
>>>
>>>   The inputs used by the client to construct its list of reference
>>>   identifiers might be a URI that a user has typed into an interface
>>>   (e.g., an HTTPS URL for a web site), configured account information
>>>   (e.g., the domain name of a particular host or URI used for
>>>   retrieving information or connecting to a network, which might be
>>>   different from the server portion of the user's account name), a
>>>   hyperlink in a web page that triggers a browser to retrieve a media
>>>   object or script, or some other combination of information that can
>>>   yield a source domain and a service type.
>>>
>>>   The client might need to extract the source domain and service type
>>>   from the input(s) it has received.  The extracted data MUST include
>>>   only information that can be securely parsed out of the inputs (e.g.,
>>>   extracting the fully-qualified DNS domain name from the "authority"
>>>   component of a URI or extracting the service type from the scheme of
>                            ^^^^^^^^^^
> 
> I suggest we change this to "deriving".

After an IM chat with Jeff, I agree.

>>>   a URI) or information for which the extraction is performed in a
>>>   manner that is not subject to subversion by network attackers (e.g.,
>>>   pulling the data from a delegated domain that is explicitly
>>>   established via client or system configuration, resolving the data
>>>   via [DNSSEC], or obtaining the data from a third-party domain mapping
>>>   service in which a human user has explicitly placed trust and with
>>>   which the client communicates over a connection that provides both
>>>   mutual authentication and integrity checking).  These considerations
>>>   apply only to extraction of the source domain from the inputs;
>>>   naturally, if the inputs themselves are invalid or corrupt (e.g., a
>>>   user has clicked a link provided by a malicious entity in a phishing
>>>   attack), then the client might end up communicating with an
>>>   unexpected application service.
>>>
>>> Do you feel we need to say more about how an application client
>>> determines the source domain? Is there something special about SIP AORs
>>> that this document does not cover (but should be covering)?
> 
> 
> BenC replies..
>>
> <snip/>
>> I am suggesting a soup to nuts example of how a real world input such as
>> that gets converted to a resulting URI reference identity.
> 
> 
> So after the second para quoted above (from [S4.2.1]) how 'bout we add
> this..
> 
> 
> For example, given an input URI of
> "sip:alice:p...@example.net;transport=tcp?subject=project%20x&priority=urgent",
> the client derives the service type "sip" from the scheme, and the
> domain name "example.net" from the authority component. 

Looks good. I love gnarly URIs. :)

> Also, given an
> input URI of "im:al...@example.net", the derived service type is "sip"
> (since the "im" scheme is defined as an abstract scheme in the SIP
> context by [SIP-IM] (RFC 3428)), and the domain name is again
> "example.net".

Well, the im: and pres: URIs can result in a derived service type of
"xmpp", too. It depends on what a service has deployed...

http://tools.ietf.org/html/rfc3860

http://www.iana.org/assignments/im-srv-labels/im-srv-labels.xhtml

Peter

-- 
Peter Saint-Andre
https://stpeter.im/



Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art

Reply via email to