>>>>> "Jim" == Jim Schaad <[email protected]> writes:
Jim> In step 2 A couple of questions come to mind here - which
Jim> authentication mechanism are selecting? The End Host to IdP or
Jim> the End Host to the Relying Part? Are there any options here
Jim> or is there only a single possibility?
There is no authentication of the end-host to the RP.
The end-host authenticates to the IDP.
There is a key confirmation step where the end-host and RP prove they
have the same session key.
In some sense, that performs an authentication function; it definitely
binds the RP->IDP authentication with the end-host->IDP authentication.
Jim> In Step 3 For various reasons, I think one will want to
Jim> establish a secure link to from the Client Application to the
Jim> RP either before - or as - it is supplying the NAI to the RP.
Jim> It might however been that you are really only saying that you
Jim> are sending the realm portion of the NAI to the RP. That would
Jim> be a different story, but you may still want to get some type
Jim> of secure link.
You're typically only sending the realm portion if your EAP method uses
privacy identifiers (the good ones do).
A secure link to the RP at this stage is out of scope for a GSS
substrate for abfab in my opinion.
It adds a lot of mess, and there are better ways of doing most of what
you are probably trying to do.
Also, note that since the end-host has no credential for the RP, and
this is a huge feature of the architecture, your options are limited.
Jim> Section 3.1 - in Paragraph 3 - It specifies that we are going
Jim> to put the NAI in the GSS_C_NT_USER_NAME field of GSS-API, is
Jim> it going to be the responsibility of the GSS-API layer to
Jim> fragment the realm portion of name from the full NAI depending
Jim> on if it is talking to the RP or the IdP?
Um.
I think you're a bit confused about what role GSS-API fills here.
The NAI is an input to the GSS-API, which locally on the end-host feeds
it to a specific EAP method.
That method will hide it if that method hides identity.
Jim> There is no mention in this section that there may be multiple
Jim> IdPs for a single realm that could be used by the RP and the
Jim> selection of which IdP it wants to use is going to be based on
Jim> the set of attributes that the RP needs or a level of
Jim> authentication that is required by the RP (see [sp800-63-1]
Jim> NIST SP 800-63-1 "Electronic Authentication Guideline",
Jim> December 2008 as examples).
True, basically because there's no existing protocol mechanism to
accomplish the end-host finding out what the RP wants.
This is kind of a GSS failing; there is some Microsoft work that could
expand GSS in some ways.
Abfab can take advantage of this whenever GSS gains the feature.
I think I have an action item to discuss federation and IDP selection
(although someone else may have the action item for IDP selection--can't
remember). However it's more going to be about future extensions and
directions for expansion.
Jim> Section 3.2 Has the sentences " Aside from a valuable secret
Jim> being exposed, a synchronization problem can also often
Jim> develop. Since there is no single authentication mechanism
Jim> that will be used everywhere there is another associated
Jim> requirement:" I have a couple of issues here. First there is a
Jim> problem which is stated - i.e. synchronization - but the next
Jim> sentence does not appear to expand on the problem but rather
Jim> deals with a different issue. I would like to have the first
Jim> thought finished before going onto the second one. I think
Jim> this paragraph is supposed to be talking about issues that we
Jim> have been taught - but the word Since does not convey this is a
Jim> separate issue we have dealing with.
Help with wording would be greatly appreciated here.
Jim> In the sentence "through the authenticator (i.e., service
Jim> provider)" - s/service provider/relying party/
Jim> Section 3.5 In this picture - I believe that it would be more
Jim> accurate to have the EAP stream go directly through the
Jim> Federation layer - this would not be routed as it is E2E.
No, I think the EAP stream is routed.
Just as TLS is routed over IP.
Jim> Section 4.3 Given that you have stated that we are going to use
Jim> the Kerberos realm naming, on which I have no opinion, I think
Jim> that there should be some text about how the end host is going
Jim> to make a decision that it is talking to the correct RP to
Jim> begin with. It does not have any pre-existing security
Jim> relationship with the realm of the RP.
It kind of needs to trust the RP for some of this.
It needs to derive a name for the RP from input it gets from the user
or a trusted referral.
Then, the IDP and some proxy goo is responsible for making sure that the
RP it is talking to is the RP it names.
Jim> Additional Issues:
Jim> 1. The document is currently written in terms of dealing with
Jim> an Identity provider, and I can understand why that is so as
Jim> without an identity not much will happen. However it seems to
Jim> me that there is also a desire to be able to talk to an
Jim> attribute service in much the same way. However it is not
Jim> clear that there is a need for the End Host to talk to the
Jim> attribute provider - that communication should be thought of as
Jim> passing between the IdP, the RP and the AtP. The IdP may need
Jim> to get a different or better identity proof as part of that
Jim> conversation.
Hmm.
Jim> 2. I am not sure if there needs to be a discussion on what
Jim> needs to be a part of a federation agreement. One of the
Jim> issues that I can see as being troublesome as it does not seem
Jim> to be vastly expandable is the question of what makes for an
Jim> equivalent statement. Is it to be expected that the SASL
Jim> statements are going to be made in terms of the federation
Jim> agreement attributes, or does there need to be available to the
Jim> RP some type of mapping statement?
I hope we can avoid discussions of what goes in a federation agreement.
_______________________________________________
abfab mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/abfab