<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=utf-8"><meta name=Generator content="Microsoft Word 15 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
{font-family:Wingdings;
panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:purple;
text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
{mso-style-priority:34;
margin-top:0in;
margin-right:0in;
margin-bottom:0in;
margin-left:.5in;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
p.msonormal0, li.msonormal0, div.msonormal0
{mso-style-name:msonormal;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
span.gmail-gr
{mso-style-name:gmail-gr_;}
span.EmailStyle20
{mso-style-type:personal-reply;
font-family:"Calibri",sans-serif;
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-family:"Calibri",sans-serif;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
/* List Definitions */
@list l0
{mso-list-id:1937974890;
mso-list-type:hybrid;
mso-list-template-ids:-285726520 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;}
@list l0:level1
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l0:level2
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l0:level3
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
@list l0:level4
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l0:level5
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l0:level6
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
@list l0:level7
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l0:level8
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l0:level9
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
ol
{margin-bottom:0in;}
ul
{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=EN-US link=blue vlink=purple><div class=WordSection1><p class=MsoNormal>There’s been some great discussion on this topic. I’d like to suggest the following approach:<o:p></o:p></p><ul style='margin-top:0in' type=disc><li class=MsoListParagraph style='margin-left:0in;mso-list:l0 level1 lfo1'>No auto-redirection at this time<o:p></o:p></li><li class=MsoListParagraph style='margin-left:0in;mso-list:l0 level1 lfo1'>But stop redirecting <a href="https://whois.arin.net">https://whois.arin.net</a> to <a href="http://whois.arin.net/ui/">http://whois.arin.net/ui/</a>, rather redirect them to <a href="https://whois.arin.net/ui">https://whois.arin.net/ui</a>. If they chose to go to the secure site, being redirected to the insecure site does not seem like a good idea.<o:p></o:p></li><li class=MsoListParagraph style='margin-left:0in;mso-list:l0 level1 lfo1'>Make sure that all links from ARIN’s other sites to whois.arin.net are referring to the HTTPS one (that may already be the case, but I don’t know)<o:p></o:p></li><li class=MsoListParagraph style='margin-left:0in;mso-list:l0 level1 lfo1'>Enable HSTS for whois.arin.net – if a web browser hits it intentionally then just keep doing it automatically.<o:p></o:p></li><li class=MsoListParagraph style='margin-left:0in;mso-list:l0 level1 lfo1'>Provide some subtle feedback (perhaps an extra line/bar at the top of the page) to those web browsing the HTTP version of whois.arin.net to alert them that they are searching in the clear and provide a link to the secure version.<o:p></o:p></li><li class=MsoListParagraph style='margin-left:0in;mso-list:l0 level1 lfo1'>Develop a long-term goal to migrate programmatic access to HTTPS<o:p></o:p></li></ul><p class=MsoNormal style='margin-left:.25in'><o:p> </o:p></p><p class=MsoNormal>Frank<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><b>From:</b> ARIN-consult <arin-consult-bounces@arin.net> <b>On Behalf Of </b>David Farmer<br><b>Sent:</b> Friday, March 30, 2018 12:07 PM<br><b>To:</b> Rob Seastrom <rs@seastrom.com><br><b>Cc:</b> <arin-consult@arin.net> <arin-consult@arin.net><br><b>Subject:</b> Re: [ARIN-consult] Consultation on ACSP 2018.3<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><div><p class=MsoNormal><br>See inline;<o:p></o:p></p><div><p class=MsoNormal><o:p> </o:p></p><div><div><p class=MsoNormal>On Thu, Mar 29, 2018 at 9:23 AM, Rob Seastrom <<a href="mailto:rs@seastrom.com" target="_blank">rs@seastrom.com</a>> wrote:<o:p></o:p></p><blockquote style='border:none;border-left:solid #CCCCCC 1.0pt;padding:0in 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in'><p class=MsoNormal><br>> On Mar 29, 2018, at 5:44 AM, Job Snijders <<a href="mailto:job@ntt.net" target="_blank">job@ntt.net</a>> wrote:<br>><br>> On Wed, Mar 28, 2018 at 04:33:22PM -0500, David Farmer wrote:<br>>> On Wed, Mar 28, 2018 at 4:16 PM, ARIN <<a href="mailto:info@arin.net" target="_blank">info@arin.net</a>> wrote:<br>>>> ...<br>>>> Question: Should ARIN automatically redirect user Whois queries made<br>>>> via "http" to "https"?<br>>><br>>> No, ARIN should not automatically redirect Whois queries made via<br>>> "http" to "https". Insecure Whois queries made via "http", need to be<br>>> allowed.<br>><br>> Do you have any supporting arguments for your statement?<o:p></o:p></p></blockquote><p class=MsoNormal><br>That's a fair question and my answer to the question above was probably a little too terse. I intended to not repeat what I had said in the thread regarding the original suggestion and I ended up proving just my answer insufficient justification for it. Rob summarizes my feelings on the subject well. <o:p></o:p></p></div><div><p class=MsoNormal><o:p> </o:p></p></div><div><p class=MsoNormal>More below;<o:p></o:p></p></div><div><p class=MsoNormal><o:p> </o:p></p><blockquote style='border:none;border-left:solid #CCCCCC 1.0pt;padding:0in 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in'><p class=MsoNormal>Hi Job,<br><br>I suppose I wouldn't have any problems with automatic redirects for anything that had a user-agent that looked like a modern browser.<br><br>I did a cursory look and couldn't find the slide deck, but my recollection from a presentation by Mark Kosters is that there are a significant number of things hitting the REST interface that are not browsers; they may even outnumber the human visitors - and it's the same host, <a href="http://whois.arin.net" target="_blank">whois.arin.net</a>.<br><br>Neither you nor I has any idea how well those clients will handle redirects and https. One would earnestly hope that by and large folks are using standard libraries that will magically do the right thing, yet repeated experiences with password hash dumps wherein a homemade (and cryptographically poor) KDF has been employed shows that the DIY spirit is alive and well and I would not expect it to be any different here.<br><br>So there's a balance of harms argument to be had: is forcibly encrypting traffic that has historically been of marginal privacy concern worth breaking client software in the field? Bear in mind that if someone chooses to use https:// then things will be encrypted just fine; there is nothing forcing the client to be unencrypted when they'd rather be encrypted, and deploying HSTS will make modern browser users sticky to <a href="https://">https://</a>.<br><br>I submit that David has articulated the right balance to strike and that redirects are a poor idea. If we advertise for some number of years that we're sunsetting non-https access to whois (if events haven't been overtaken by RDAP at that point), then I'll probably feel differently about this.<br><br>Note that I'm generally in favor of encryption. In January 2015 I submitted an ACSP proposal asking for HSTS where practicable and in October 2015 I mentioned at the members' meeting that HSTS on the REST-Whois seemed to have been overlooked (see <a href="https://www.rwhois.net/vault/participate/meetings/reports/ARIN_36/mem_transcript.html" target="_blank">https://www.rwhois.net/vault/participate/meetings/reports/ARIN_36/mem_transcript.html</a> ). I'm just not a fan of intentionally breaking things, even if they're crappy software, without a lot of forethought and deliberate intent.<o:p></o:p></p></blockquote><div><p class=MsoNormal><o:p> </o:p></p></div></div><div><div><p class=MsoNormal style='background:white'><span style='font-size:12.0pt;font-family:"Arial",sans-serif;color:#222222;background:white'>Upon reflection, and building on Rob's comments, I'm changing my answer, ARIN should adopt a goal of redirecting all "<span class=gmail-gr>http</span>" traffic to "https" for <a href="http://whois.arin.net/" target="_blank"><span style='color:#1155CC'>whois.arin.net</span></a>. However, I don't think "<span class=gmail-gr>http</span>" access to <a href="http://whois.arin.net/" target="_blank"><span style='color:#1155CC'>whois.arin.net</span></a>, especially programmatic access to the Whois REST API, should be precipitously terminated. Therefore</span><span style='font-size:12.0pt;font-family:"Arial",sans-serif;color:#222222'> a sufficiently generous sunset date needs to be given for the discontinuation of<span style='background:white'> "</span><span class=gmail-gr>http</span><span style='background:white'>" access to </span><a href="http://whois.arin.net/" target="_blank"><span style='color:#1155CC'>whois.arin.net</span></a> and the <span style='background:white'>redirecting all "<span class=gmail-gr>http</span>" traffic to "https", I'd say at least a year. However, the date for final discontinuation of "<span class=gmail-gr>http</span>" access should be driven by data about the amount of use of the "<span class=gmail-gr>http</span>" version of <a href="http://whois.arin.net/" target="_blank"><span style='color:#1155CC'>whois.arin.net</span></a>, and not some inflexible sunset date. On the other hand, I'm not saying access to the "<span class=gmail-gr>http</span>" version of <a href="http://whois.arin.net/" target="_blank"><span style='color:#1155CC'>whois.arin.net</span></a> needs to get to zero before it can be terminated either, but we need to understand and accept the potential damage caused by the event before it happens.</span><o:p></o:p></span></p></div><div><p class=MsoNormal style='background:white'><span style='font-size:12.0pt;font-family:"Arial",sans-serif;color:#222222'><o:p> </o:p></span></p></div><div><p class=MsoNormal style='background:white'><span style='font-size:12.0pt;font-family:"Arial",sans-serif;color:#222222;background:white'>In the meantime providing HSTS policy and redirecting "<span class=gmail-gr>http</span>" traffic for most known browser user agents should begin ASAP.</span><span style='font-size:12.0pt;font-family:"Arial",sans-serif;color:#222222'><o:p></o:p></span></p></div></div><div><p class=MsoNormal><o:p> </o:p></p></div><div><p class=MsoNormal>Thanks<o:p></o:p></p></div><div><p class=MsoNormal><o:p> </o:p></p></div><p class=MsoNormal>-- <o:p></o:p></p><div><p class=MsoNormal>===============================================<br>David Farmer <a href="mailto:Email%3Afarmer@umn.edu" target="_blank">Email:farmer@umn.edu</a><br>Networking & Telecommunication Services<br>Office of Information Technology<br>University of Minnesota <br>2218 University Ave SE Phone: <a href="tel:(612)%20626-0815" target="_blank">612-626-0815</a><br>Minneapolis, MN 55414-3029 Cell: <a href="tel:(612)%20812-9952" target="_blank">612-812-9952</a><br>===============================================<o:p></o:p></p></div></div></div></div></div></body></html>