Applicability Statement v1.1 Feedback: DirectTrust May 5, 2015.

Slides:



Advertisements
Similar presentations
Basic Communication on the Internet:
Advertisements

FIPA Interaction Protocol. Request Interaction Protocol Summary –Request Interaction Protocol allows one agent to request another to perform some action.
IETF Trade Working Group January 2000 XML Messaging Overview January 2000.
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Connecticut Ave NW, Washington, DC Understanding Patient Engagement in Stage 2 MU: Direct, HIPAA, VDT, and Patient Engagement.
CCNA – Network Fundamentals
ATTACKING AUTHENTICATION The Web Application Hacker’s Handbook, Ch. 6 Presenter: Jie Huang 10/31/2012.
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
Connecticut Ave NW, Washington, DC September 30, 2014 David C. Kibbe, MD MBA President and CEO, DirectTrust Luis Maas, MD.
Reviewing Papers: What Reviewers Look For Session 19 C507 Scientific Writing.
Instant Message Delivery Notification (IMDN) for Common Presence and Instant Messaging (CPIM) Messages draft-burger-sipping-imdn-02.
Lesson 7: Business, , & Personal Information Management
Chapter 6: Distributed Applications Business Data Communications, 5e.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
DNS-centric PKI Sean Turner Russ Housley Tim Polk.
Series DATA MANAGEMENT. 1 Why ? Alarm/Status Notification –Remote unattended sites »Pumping stations –Pharmaceutical/Plant maintenance.
Chapter 30 Electronic Mail Representation & Transfer
Simple Mail Transfer Protocol (SMTP) Team: Zealous Team: Zealous Presented By: Vishal Parikh ( ) Vishal Parikh ( ) Ribhu Pathria( )
Gursharan Singh Tatla Transport Layer 16-May
SMTP Simple Mail Transfer Protocol. Content I.What is SMTP? II.History of SMTP III.General Features IV.SMTP Commands V.SMTP Replies VI.A typical SMTP.
Understanding and Leveraging MU2 Optional Transports Paul M. Tuten, PhD Senior Consultant, ONC Leader, Implementation Geographies Workgroup, Direct Project.
SIMPLE MAIL TRANSFER PROTOCOL SECURITY Guided By Prof : Richard Sinn Bhavesh Jadav Mayur Mulani.
COEN 351 Non-Repudiation. A non-repudiation service provides assurance of the origin or delivery of data in order to protect the sender against false.
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
CSCI 6962: Server-side Design and Programming
1 Lecture 18: Security issues specific to security key management services –privacy –integrity/authentication –nonrepudiation/plausible deniability.
Secure Data Transmission EDI-INT AS1, AS2, AS3 Kevin Grant.
Requirements for DSML 2.0. Summary RFC 2251 fidelity Represent existing directory protocols with new transport syntax Backwards compatibility with DSML.
Applicability Statement for Secure Health Transport v1.1: Proposed Clarifications & Updates July 21, 2015.
University of Calgary – CPSC 441.  UDP stands for User Datagram Protocol.  A protocol for the Transport Layer in the protocol Stack.  Alternative to.
Chapter 7: Internet-Based Applications Business Data Communications, 6e.
Authentication, Access Control, and Authorization (1 of 2) 0 NPRM Request (for 2017) ONC is requesting comment on two-factor authentication in reference.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
Wicked Problems, Righteous Solutions: Learnings from Two Years of DirectTrust PKI and Interoperability Testing Experiences DirectTrust Technical Break-out.
Encryption Cisco Ironport using Click here to begin Press the ‘F5’ Key to Begin.
Multi-part Messages in KMIP John Leiseboer, QuintessenceLabs.
UNIT IP Datagram Fragmentation Figure 20.7 IP datagram.
Lemonade Requirements for Server to Client Notifications draft-ietf-lemonade-server-to-client-notifications-00.txt S. H. Maes C. Wilson Lemonade Intermediate.
1. I NTRODUCTION TO N ETWORKS Network programming is surprisingly easy in Java ◦ Most of the classes relevant to network programming are in the java.net.
Responsible Submitter An SMTP Service Extension IETF 60 San Diego, CA Harry Katz Microsoft Corp. 8/4/2004.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
1 SeGW Certificate profile (Revised) 3GPP2 TSG-S WG4 /TSG-X WG5 (PDS) S X xx Source: QUALCOMM Incorporated Contact(s): Anand.
SIMPLE MAIL TRANSFER PROTOCOL. Introduction Simple Mail Transfer Protocol is the standard protocol on the Internet and part of the TCP/IP protocol.
Mobile Communication MMS. Mobile Communication The MM7 interface enables interactions between Value Added Service applications and an MMSC. The technical.
Identity Proofing, Signatures, & Encryption in Direct esMD Author of Record Workgroup John Hall Coordinator, Direct Project June 13, 2012.
SIP working group IETF#70 Essential corrections Keith Drage.
SIMPLE MAIL TRANSFER PROTOCOL PRADEEP KOLLIPARA SANDEEP PINNAMANENI.
LinxChix And Exim. Mail agents MUA = Mail User Agent Interacts directly with the end user  Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,
ICOS BOF EAP Applicability Bernard Aboba IETF 62, Minneapolis, MN.
S/MIME (Secure/Multipurpose Internet Mail Extensions) security enhancement to MIME – original Internet RFC822 was text only – MIME provided.
Chapter 16: Distributed Applications Business Data Communications, 4e.
1 draft-sidr-bgpsec-protocol-05 Open Issues. 2 Overview I received many helpful reviews: Thanks Rob, Sandy, Sean, Randy, and Wes Most issues are minor.
Enterprise Network Systems TCP Mark Clements. 3 March 2008ENS 2 Last Week – Client/ Server Cost effective way of providing more computing power High specs.
Downgrading mechanism for Internationalized Address (IMA) draft-yoneya-ima-downgrade-00.txt Kazunori Fujiwara JPRS.
MSRP Again! draft-ietf-simple-message- session-09.
SIP Events: Changes and Open Issues IETF 50 / SIP Working Group Adam Roach
WAWF/UID/RFID Industry Group Meeting Acceptance Transaction Requirements Document Develop a set of requirements for a structured Acceptance/Rejection transaction.
360Exchange (360X) Project 12/06/12. Reminders / announcements 360X Update CEHRT 2014 / MU2 Transition of Care Requirements 1 Agenda.
ADDRESS INTERNATIONALIZATION ( EAI ) ICANN-55 Mar 06, 2016 TF-AIDN Member 35+ Min : 10- Min ( Q & A )
Chapter 9: Transport Layer
Instructor Materials Chapter 9: Transport Layer
SMTP: simple mail transfer protocol
Cryptography and Network Security
draft-ietf-simple-message-session-09
Using SSL – Secure Socket Layer
Chapter 6: Distributed Applications
Net 323 D: Networks Protocols
William Stallings Data and Computer Communications
Unit – 4 Chap - 2 Mail Delivery System
Working Group Draft for TCPCLv4
Presentation transcript:

Applicability Statement v1.1 Feedback: DirectTrust May 5, 2015

Applicability Statement v1.1 Feedback 2 »The following feedback related to the Applicability Statement v1.1 was received from DirectTrust. »Viewpoints and any recommendations suggested are DirectTrust’s own and do not necessarily reflect Direct Project consensus.

3 DirectTrust Feedback

Terms 4 »AS: Applicability Statement »DNIG: Implementation Guide for Delivery Notification in Direct »DSN: Delivery Status Notification »HISP: Health Information Service Provider »MDN: Message Delivery Notification »STA: Security/Trust Agent »TTT: ONC Transport Test Tool

Issue: Sending of Processed MDNs 5 Recommendation: AS Section 3 should clarify when a Processed MDN should be sent. It should clarify that transmission of a Processed MDN indicates that the receiving STA is taking responsibility to attempt delivery to the specified recipient, rather than responsibility to deliver, and that receipt of a Processed MDN does not guarantee that final delivery was made (if such guarantee is required, the mechanisms defined in the DNIG should be used). Background: Some HISPs have cited the AS assertion in Section 3.0 that sending a Processed MDN constitutes accepting responsibility to deliver a message as a reason to delay transmission of the Processed MDN, sometimes until after the recipient reads the message. The AS should be clarified to indicate that the transmission constitutes acceptance of responsibility to attempt delivery, and if guarantees for final delivery are needed, the mechanisms defined in the DNIG should be used.

Issue: Other Notifications After Processed MDN 6 Recommendation: AS Section 3 should clarify the notification requirements and mechanisms when message delivery does not succeed, including notifications that may arise after an initial Processed MDN is sent, or when message payload cannot be processed. Cases where a message contains more than one payload or payload type, and not all content could be understood, should also be considered. Background: »Many HISP and/or edge systems will handle a delayed failure such as subsequent rejection of a message by the edge client by sending a Failed MDN or DSN at the time that the subsequent failure occurs. However, the AS does not provide a mechanism for the confirmation of receipt of such delayed failure notifications, and unlike the initial Processed MDN, the original sender is not expecting it as a guaranteed part of the protocol, so there is no way to be certain that the original sender ever receives it. For example, if a delayed, Failed MDN or DSN is lost in transit, there would be no way for the original sender to know it was sent by the recipient or the recipient’s HISP, nor for the recipient to know it was not received by the original sender. Extending the AS to address this limitation would improve the robustness of these delayed notification mechanisms. »A Processed MDN may be returned even when the message payload is delivered but cannot be consumed, which may be misleading to the sending system, and may even lead to failures in care coordination among providers. Some HISPs and edge systems are actively communicating payload- related failure notifications, but this is not yet standardized. Additional clarification on when to return a Processed MDN or the communication of failures after a Processed MDN has been sent is necessary, to eliminate this ambiguity.

Issue: MDNs and null envelope sender 7 Recommendation: AS Section 3 should clarify if a null SMTP MAIL FROM envelope is acceptable for MDNs. Background: MDNs in the field commonly have the original recipient's Direct address in the SMTP MAIL FROM envelope (per recommendation for Direct messages in AS Section 2.2), whereas RFC 3798 Section 3 requires a null SMTP MAIL FROM envelope for all MDNs. TTT used to (probably still does) break if MDN with spec- compliant null envelope sender is received. AS IGW group may wish to formalize whether this is ok or not ok.

Issue: Use of AIA certificate extension 8 Recommendation: The use of the Authority Information Access (AIA) extension in Direct certificates should be upgraded in Section from a recommendation to a requirement (i.e., from RECOMMENDED to MUST), at least for certification hierarchies that include intermediate Certification Authorities (CAs) that may not initially be known to counter parties. Background: Interoperability problems can occur when CAs omit or do not properly populate the Authority Information Access (AIA) extension of a certificate such that a relying party does not have sufficient information to build a certificate chain from an end entity certificate to an issuing CA when intermediate CA certificates are not known to the relying party. AS Section currently recommends inclusion of AIA information but could be revised to require it in cases where intermediate CAs are used.

Additional Items for Discussion 9 1.While well-defined by the specs, we see miscomputed message digests in the field sometimes when messages contain text/* parts. Don't know if this warrants an AS change but is worth mentioning in the AS IGW call for comment or reference. 2.Confusion in field about what it means to perform revocation checking as per AS Section 4. Might require clarification. 3.Mixed use domains (e.g., domain-bound cert for jack.direct.com and address- bound cert for can cause ambiguities - worth mentioning in the AS practice note that talks about addresses with periods in them? 4.Specific call out of self-signed certs in trust section -- necessary/useful? 5.Unwrapped messages are subject to header re-writing attacks and exposure of unencrypted headers including Subject header text or potentially sensitive routing info. DirectTrust requires wrapping for all sent messages. Should the AS try to close this security issue by requiring wrapping?

10 Parking Lot

Open Items 11 Items 1-2 are from DCDT feedback discussion. 1.Continued use of SHA-1? 2.Change “organizationally-bound” to “domain-bound” throughout AS?