[..] I call for a discussion to determine the appropriate response to theI suggest to drop HTTP Digest Authentication in favor of HTTP Basic
proposal to include queryauth method in all FDSN web service specifications,
or alternate solutions.
Dear *,
On Tue, 04 Jul 2023 23:11:00 -0000 "Chad Trabant (via FDSN)"
<fdsn-wg3-products-bounce<at>lists.fdsn.org> wrote:
[..] I call for a discussion to determine the appropriate response to thespecifications,
proposal to include queryauth method in all FDSN web service
or alternate solutions.I suggest to drop HTTP Digest Authentication in favor of HTTP Basic
Authentication over HTTPS.
- Digest Auth is based on the outdated and insure MD5 algorithm, strong
hash
algorithms may not be used.
- Digest Auth is valuable to Man-in-the-middle attacks. SSL allows the
client to
verify the server's identity.
- Basic Auth is easier to implement on the server side and supported by
more
clients.
- HTTPS is the default web protocol. Certificates are easy to obtain. The
SSL
part may be handled by a reverse proxy (e.g., NGINX). A reverse proxy
setup
is typically deployed anyway to
- use one public IP for multiple services
- implement load balancing, caching, traffic shaping
Best regards,
Stephan Herrnkind
--
Stephan Herrnkind phone: +49 [0]331 288 1696
gempa GmbH fax : +49 [0]331 288 2831
Heinrich-Mann-Allee 18/19 email: herrnkind<at>gempa.de
14473 Potsdam web : http://www.gempa.de
----------------------
FDSN Working Group III
Topic home: http://www.fdsn.org/message-center/topic/fdsn-wg3-products/ |
Unsubscribe: fdsn-wg3-products-unsubscribe<at>lists.fdsn.org
Sent from the FDSN Message Center (http://www.fdsn.org/message-center/)
Update subscription preferences at http://www.fdsn.org/account/profile/
Hi
In general I find the trend towards data access requiring login to be
troubling both for moral and efficiency reasons. Any barrier, however
small, to data access reduces the usefulness of that data.
It is still not clear to me why the addition of queryauth for station
metadata is needed. Can CTBO provide more explanation of why? The
issue says "There are practical reasons why one may want to not share
restricted metadata, particularly the precise locations of active
temporary deploys." but I don't see the distinction between an
unauthenticated user seeing a precise location for a temporary vs.
permanent station. What is the concern?
This may be a good opportunity to change the common specification to
allow implementations to support HTTP, HTTPS or both. There are
already cases where FDSN web services are only available via HTTPS
(NCEDC for example) and the general requirement to restrict web
connection to HTTPS-only for institutional web servers is only likely
to increase in the future. Also I feel that any type of
authentication/authorization such as queryauth should only be done
over HTTPS. Doing security correctly is really hard, and trying to do
it over an unencrypted protocol is just asking for trouble.
Lastly, at a more basic level, I wonder if authentication should even
be part of the specification? Not that it isn't important, but it
feels quite orthogonal to the "seismic" part of the protocol. There is
nothing to prevent a client from calling /fdsnws/station/1/query and
passing a HTTP Authorization header and nothing preventing the server
from making use of it to restrict or allow access to some data. The
current spec would also seem to prevent the use of alternatives that
may be easier and/or more secure in certain cases, bearer tokens
instead of digest for example. And of course the current spec does not
allow HTTPS, and so to be secure a server currently must be at least
somewhat non-compliant.
All that said, simply moving queryauth to commonalities and having it
optional may be the easiest way to address this, so if authentication
really is needed, I guess I would not oppose that as long as use of
HTTPS was added to the specification as well.
This is a useful resource I think:
https://stackoverflow.blog/2021/10/06/best-practices-for-authentication-and-authorization-for-rest-apis/
Philip Crotwell
South Carolina Seismic Network
On Wed, Jul 5, 2023 at 5:10 AM Stephan Herrnkind (via FDSN)
<fdsn-wg3-products-bounce<at>lists.fdsn.org> wrote:
Dear *,
On Tue, 04 Jul 2023 23:11:00 -0000 "Chad Trabant (via FDSN)"
<fdsn-wg3-products-bounce<at>lists.fdsn.org> wrote:
[..] I call for a discussion to determine the appropriateresponse to the
proposal to include queryauth method in all FDSN web servicespecifications,
or alternate solutions.I suggest to drop HTTP Digest Authentication in favor of HTTP Basic
Authentication over HTTPS.
- Digest Auth is based on the outdated and insure MD5 algorithm,
strong hash
algorithms may not be used.
- Digest Auth is valuable to Man-in-the-middle attacks. SSL allows
the client to
verify the server's identity.
- Basic Auth is easier to implement on the server side and
supported by more
clients.
- HTTPS is the default web protocol. Certificates are easy to
obtain. The SSL
part may be handled by a reverse proxy (e.g., NGINX). A reverse
proxy setup
is typically deployed anyway to
- use one public IP for multiple services
- implement load balancing, caching, traffic shaping
Best regards,
Stephan Herrnkind
--
Stephan Herrnkind phone: +49 [0]331 288 1696
gempa GmbH fax : +49 [0]331 288 2831
Heinrich-Mann-Allee 18/19 email: herrnkind<at>gempa.de
14473 Potsdam web : http://www.gempa.de
----------------------
FDSN Working Group III
Topic home:
http://www.fdsn.org/message-center/topic/fdsn-wg3-products/ |
Unsubscribe: fdsn-wg3-products-unsubscribe<at>lists.fdsn.org
Sent from the FDSN Message Center
(http://www.fdsn.org/message-center/)
Update subscription preferences at
http://www.fdsn.org/account/profile/
----------------------
FDSN Working Group III
Topic home:http://www.fdsn.org/message-center/topic/fdsn-wg3-products/ | Unsubscribe:fdsn-wg3-products-unsubscribe<at>lists.fdsn.org
Sent from the FDSN Message Center (http://www.fdsn.org/message-center/)
Update subscription preferences athttp://www.fdsn.org/account/profile/