home *** CD-ROM | disk | FTP | other *** search
-
-
-
-
-
-
- Network Working Group N. Freed
- Request for Comments: 2480 Innosoft International, Inc.
- Category: Standards Track January 1999
-
-
- Gateways and MIME Security Multiparts
-
- Status of this Memo
-
- This document specifies an Internet standards track protocol for the
- Internet community, and requests discussion and suggestions for
- improvements. Please refer to the current edition of the "Internet
- Official Protocol Standards" (STD 1) for the standardization state
- and status of this protocol. Distribution of this memo is unlimited.
-
- Copyright Notice
-
- Copyright (C) The Internet Society (1999). All Rights Reserved.
-
- 1. Abstract
-
- This document examines the problems associated with use of MIME
- security multiparts and gateways to non-MIME environments. A set of
- requirements for gateway behavior are defined which provide
- facilities necessary to properly accomodate the transfer of security
- multiparts through gateways.
-
- 2. Requirements Notation
-
- This document occasionally uses terms that appear in capital letters.
- When the terms "MUST", "MUST NOT", "SHOULD", "SHOULD NOT", and "MAY"
- appear capitalized, they are being used to indicate particular
- requirements of this specification. A discussion of the meanings of
- the terms "MUST", "SHOULD", and "MAY" appears in RFC 1123 [2]; the
- terms "MUST NOT" and "SHOULD NOT" are logical extensions of this
- usage.
-
- 3. The Problem
-
- Security multiparts [RFC-1847] provide an effective way to add
- integrity and confidentiality services to protocols that employ MIME
- objects [RFC-2045, RFC-2046]. Difficulties arise, however, in
- heterogeneous environments involving gateways to environments that
- don't support MIME. Specifically:
-
- (1) Security services have to be applied to MIME objects in
- their entirety. Failure to do so can lead to security
- exposures.
-
-
-
- Freed Standards Track [Page 1]
-
- RFC 2480 Gateways and MIME Security Multiparts January 1999
-
-
- For example, a signature that covers only object data and not
- the object's MIME labels would allow someone to tamper with
- the labels in an undetectable fashion. Similarly, failure to
- encrypt MIME label information exposes information about the
- content that could facilitate traffic analysis.
-
- Composite MIME objects (e.g., multipart/mixed, message/rfc822)
- also have to be secured as a unit. Again, failure to do so
- may facilitate tampering, reveal important information
- unnecessarily, or both.
-
- (2) Gateways that deal with MIME objects have to be able to
- convert them to non-MIME formats.
-
- For example, gateways often have to transform MIME labelling
- information into other forms. MIME type information may end up
- being expressed as a file extension or as an OID.
-
- Gateways also have to take apart composite MIME objects into
- their component parts, converting the resulting set of parts
- into whatever form the non-MIME environments uses for
- composite objects. Failure to do so makes the objects unusable
- in any environment that doesn't support MIME. In many cases
- this also means that multi-level MIME structures have to be
- converted into a sequential list of parts.
-
- (3) Security services have to be deployed in an end-to-end
- fashion. Failure to do so again can lead to security
- exposures.
-
- An integrity service deployed at something other than a
- connection end point means a region exists between the point
- where the integrity service is applied and the actual end
- point where object tampering is possible. A confidentiality
- service deployed at something other than a connection end
- point means a region exists where the object is transferred in
- the clear. And worse, distributed private keys are usually
- necessary whenever someone other than the originator applies
- an integrity service or someone other than the recipient
- removes a confidentiality service, which in turn may make
- theft of private key information a possibility.
-
- All of these issues can be addressed, of course. For example,
- it may be possible to use multiple overlapping security
- services to assure that no exposure exists even though there
- is no end-to-end security per se. And keys can be distributed
- in a secure fashion. However, such designs tend to be quite
- complex, and complexity in a security system is highly
-
-
-
- Freed Standards Track [Page 2]
-
- RFC 2480 Gateways and MIME Security Multiparts January 1999
-
-
- undesireable.
-
- The preceeding three requirments are fundamentally in conflict: It is
- possible to satisfy two of them at once, but not all three at once.
-
- In fact the conflict is even worse than it first appears. In most
- situations of this sort some sort of compromise is possible which,
- while not satisfying any of the requirements completely, does
- optimize some sort of average of all the requirements. Such a
- solution does not exist in this case, however, because many real
- world situations exist where any one of these requirements absolutely
- must be satisfied.
-
- 4. Solving the Problem
-
- Since the previously described problem doesn't allow for a single
- solution the only viable approach is to require that gateways provide
- multiple solutions. In particular, gateways
-
- (1) MUST provide the ability to tunnel multipart/signed and
- multipart/encrypted objects as monolithic entities if there is
- any chance whatsoever that MIME capabilities exist on the
- non-MIME side of the gateway. No changes to content of the
- multipart are permitted, even when the content is itself a
- composite MIME object.
-
- This option must be provided so that entities behind the
- gateway that are capable of processing security multiparts and
- their MIME content will work properly. As mentioned
- previously, situations exist where application security
- requirements are absolute and must be accomodated, even when
- meeting them causes problems for other agents.
-
- Exceptions are allowed only when there is no possibility of
- MIME support on one side of the gateway. For example, a
- gateway to a voice messaging system may have no useful way to
- represent a signed MIME object.
-
- (2) MUST provide the ability to take apart multipart/signed
- objects, exposing the content (and in the process ruining the
- signature). When this approach is selected, gateways SHOULD
- NOT remove the signature. Instead, gateways SHOULD keep the
- signature intact and add to it a note that it will probably be
- invalid for checking the message contents, but may still be
- contain valuable information about the sender.
-
-
-
-
-
-
- Freed Standards Track [Page 3]
-
- RFC 2480 Gateways and MIME Security Multiparts January 1999
-
-
- This option must be provided so that entities behind the
- gateway which are incapable of processing MIME will work
- properly.
-
- (3) SHOULD provide the ability to select between the previous two
- options on per-user basis.
-
- (4) MAY provide facilities to check signatures and decrypt
- encrypted content. Such facilities MUST NOT be enabled by
- default; the potential security exposure involved has to be
- assessed before such capabilities can be used.
-
- (5) MAY provide facilities to sign and/or encrypt material passing
- from the non-MIME side to the MIME side of the gateway. Again,
- such facilities MUST NOT be enabled by default; the potential
- security exposure involved in the transfer of unsecured
- content within the application domain behind the gateway has
- to be assessed before such capabilities can be used.
-
- A gateway which complies with the above requirements is considered to
- be security multiparts compliant.
-
- 5. Security Considerations
-
- This entire document is about security.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Freed Standards Track [Page 4]
-
- RFC 2480 Gateways and MIME Security Multiparts January 1999
-
-
- 6. References
-
- [RFC-822] Crocker, D., "Standard for the Format of ARPA Internet
- Text Messages", STD 11, RFC 822, August, 1982.
-
- [RFC-1847] Galvin, J., Murphy, S., Crocker, S. and N. Freed,
- "Security Multiparts for MIME: Multipart/Signed and
- Multipart/Encrypted", RFC 1847, October 1995.
-
- [RFC-1123] Braden, R., Ed., "Requirements for Internet Hosts --
- Application and Support", STD 3, RFC 1123, October 1989.
-
- [RFC-2045] Freed, N. and N. Borenstein, "Multipurpose Internet Mail
- Extensions (MIME) Part One: Format of Internet Message
- Bodies", RFC 2045, December 1996.
-
- [RFC-2046] Freed, N. and N. Borenstein, "Multipurpose Internet Mail
- Extensions (MIME) Part Two: Media Types", RFC 2046,
- December 1996.
-
- [RFC-2049] Freed, N. and N. Borenstein, "Multipurpose Internet Mail
- Extensions (MIME) Part Five: Conformance Criteria and
- Examples", RFC 2049, December 1996.
-
- 7. Author's Address
-
- Ned Freed
- Innosoft International, Inc.
- 1050 Lakes Drive
- West Covina, CA 91790
- USA
-
- Phone: +1 626 919 3600
- Fax: +1 626 919 3614
- EMail: ned.freed@innosoft.com
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Freed Standards Track [Page 5]
-
- RFC 2480 Gateways and MIME Security Multiparts January 1999
-
-
- 8. Full Copyright Statement
-
- Copyright (C) The Internet Society (1999). All Rights Reserved.
-
- This document and translations of it may be copied and furnished to
- others, and derivative works that comment on or otherwise explain it
- or assist in its implementation may be prepared, copied, published
- and distributed, in whole or in part, without restriction of any
- kind, provided that the above copyright notice and this paragraph are
- included on all such copies and derivative works. However, this
- document itself may not be modified in any way, such as by removing
- the copyright notice or references to the Internet Society or other
- Internet organizations, except as needed for the purpose of
- developing Internet standards in which case the procedures for
- copyrights defined in the Internet Standards process must be
- followed, or as required to translate it into languages other than
- English.
-
- The limited permissions granted above are perpetual and will not be
- revoked by the Internet Society or its successors or assigns.
-
- This document and the information contained herein is provided on an
- "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
- TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
- BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
- HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
- MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Freed Standards Track [Page 6]
-
-