>>>>> "James" == James Schaad <[email protected]> writes:


    James> 1.  Introduction para 3 - I want to make sure that your
    James> definition of federation is one that you want to make.
    James> Specifically it would appear that there can be federations
    James> even within a single entity in the event that actor providing
    James> the identity information is not the same as the RP.  Would
    James> you consider a single Kerberos or Windows enterprise to be a
    James> federation.  In these cases the IdP being the login service
    James> and the RP being somebody granting access to a resource (in
    James> windows possibly by an RPC).  I generally think of federation
    James> as being between two different entities rather than within a
    James> single entity but using multiple servers.

I tend to agree with you that a lot of problems show up in the
cross-organization case.  I think it's important to make it clear we're
signing up to that and a solution working within a single organization
is not sufficient.  I also think it would be honest to indicate we're
optimizing for the cross organization case.  I don't think we should
forbid our technology being used within a single organization nor ignore
concerns that happen when that is done.  What are your thoughts?


    James> 3. Section 1.1 - I am still AAA challenged.  Is it more
    James> correct to say 'a radius or diameter server'?  Do you want to
    James> put in a generalized statement that says you use radius but
    James> it also applies to diameter?

We're using RADIUS for the example here.  Project Moonshot is only
focusing on RADIUS, but ABFAB needs to be/people are working on making
it technology neutral.
We should clarify in the doc if is this not clear.
(And obviously there is no need to mention Moonshot's implementation
choices at all in the doc.)
    James> 10.  Possible issue to include here.  In the presence of
    James> multiple federations, the naming of individuals can become
    James> murky especially if one is trying to associate a single
    James> individual from different federations.  Asking a question
    James> such as does John Doe belong to an IdP (in the absence of
    James> authentication) may get an answer for the wrong John Doe.

Yes.
This is worth mentioning in my opinion.

    James> 11.  Section 1.4 - Overview a) I think you might need to have
    James> a step 2a - Client Application creates a channel to the RP.
    James> This is not done by the GSS-EAP mechanism as I had originally
    James> assumed.  Let's make it clear additionally that fact will be
    James> needed in order to setup the channel binding at a later time.

    James>  b) in step 5 either /forward a RADIUS request/ or /forward
    James> RADIUS requests/.  AAA ignorance - would message be better
    James> than request to avoid confusion between RADISU request and
    James> GSS/EAP request?  - 

I think RADIUS message would be OK. The particular type of message is
called a request, but we don't need to say that.

    James> I would ignore how the SAML request is
    James> encoded at this point.  So maybe s/SAML request as a series
    James> of attributes/ SAML request for a set of attributes/ s/.././

I'd personally just leave it as SAML request.
After talking to Rhys and Josh about what you can and cannot do with
various types of SAML requests it is better not to get into details
here.

    James> c) request that you go back and use subject rather than
    James> principal in this section.  The change in terminology is not
    James> introduced.

OK.

    James> d) in step 9, I think I have a problem with the last
    James> sentence.  These policy checks would have been done by the
    James> AAA system or the RP and not by the IdP.  As such I don't
    James> think the title for the paragraph makes sense.
No, I think the IDP makes these checks as well.

Consider  the PLASMA example.
An IDP may well know exactly who its organization permits to be a PLASMA
policy point and may forbid others from providing that service.
Some IDPs will have very open policy here; some will not.

I agree that the AAA and RP may also apply policy.


    James> e) Step 10, Do we need to be explicit that the MSK return
    James> must be encrypted somehow?  Based on the conversations last
    James> week there appears to be a problem in that while RADIUS has
    James> the ability to return encrypted responses, it is not native
    James> to Diameter.  Also does this need to be a new attribute or
    James> does the attribute already exist (in both systems).  

AAA keywrap is probably not something we want to go into here.
There are a lot of AAA deployments where the attribute is not encrypted
at all.
I think in our mechanism document we want to make support for encryption
mandatory  in the GSS acceptor. I think our BCPs we definitely want to
make support for implementing this attribute mandatory.
I don't think we want to go into that detail here, although if someone
provided text discussing the issue for elsewhere in the document that
would be good.

    James> Is the
    James> sentence at the end of the paragraph wrong?  Is it returned
    James> to the subject (not covered by the title) or the RP?  The
    James> subject should already have the MSK

Here it is returned to the RP; the subject definitely already has it.

    James> f) I don't understand part of step 11 -- It may have
    James> information that leads it to make additional attribute
    James> queries.  I can see it needing to make additional attributes
    James> because it needs more information, but not because it has the
    James> information it needs.
I agree with your confusion but don't know what was intended here.

    James> 13. Section 2 - What is this "end host" that is referred to
    James> in the second paragraph?  Is this the IdP, the subject or
    James> some new entity.  - Getting all of these names straight
    James> without having a glossary is going to kill me eventually.''

The subject.
I think end-host probably wants to get collapsed into subject.

    James> s/connumication/communication/

    James> 14. Section 2.1.1 - discovery --- I don't know that I don't
    James> have a slight problem with the first sentence in this
    James> section.  If you are going to tell me that I need to properly
    James> identify the end points of the communication, 
    James> then I want to
    James> see more details on what is considered to be proper here.
    James> For one thing, I assume that this identification is only true
    James> as far as the AAA substrate is concerned.  This means that
    James> asking for a service at a realm would be considered to be
    James> sufficient as oppose to having to know who is providing the
    James> service.  (i.e. I want some [email protected] as oppose to a
    James> specific one.  It might be that additional restrictions are
    James> required for a type of idp, but that is not covered here.).

The following sentences attempt to clarify.
The realm portion of a NAI identifies a conceptual endpoint for sending
a request in AAA.
Identifying the endpoint making the request is more complex; how that is
handled kind of depends on the specific technical trust mechanism in
play.


    James> How much of the rules determination is to be done by the RP
    James> and how much by the AAA substrate?

This is probably an implementation detail.
An RP that has multiple places it can start in the AAA substrate needs
to pick one.
However conceptually you can think of that combination as an RP plus AAA
proxy (possibly all within one process) so I think this is an
implementation matter.

    James> Looking at para 3 - I am wondering if sentence two should be
    James> stated as "One of these is whether the given RP is permitted
    James> to rely on the IDP using a given federation at all,...".  The
    James> question is one of does the RP trust the IdP as oppose to
    James> does the IdP allow the RP to talk to it.  The rules
    James> determination is going to be done differently for the two
    James> sides.

I think either party can decide not to talk to the other party.
The use case motivating that sentence was explicitly a case where an IDP
was selective in what RPs it permitted and where a federation did not
allow all RPs to talk to all IDPs, not the case where the RP had a
trust decision to make.
Obviously, though, both parties may need to decide something.

    James> For the AAA Proxy - the last sentence needs to be motivated.
    James> I can see flooding routing information but the reason for
    James> doing name constraints escapes me at the moment.

Routing information in an AAA fabric is effectively name constraints in
both directions. "This way for FOO.COM!" "Messages coming from that
direction can claim RPs in realms A, B, C and D!"


    James> 15.  Section 2.3 - Application to Service -- This section
    James> discusses the use of GSS-API, however I believe that it also
    James> needs to include a discussion of the channel that is to be
    James> used between the application and the server as this is not an
    James> implicit part of the GSS-API system.  This channel may have
    James> some specific requirements that need to be discussed as well.

I'd really need to see text here, because I don't know what we'd want to
say about the channel.

    James> 16. Section 2.4 - I don't understand the title of this
    James> section.  What does this have to do with personalization?
    James> Perhaps Attribute or similar word would be better than
    James> personalization.  A look forward in this section to the one
    James> on privacy might be indicated as this would be a good
    James> location to talk about the issues of what information should
    James> be released from the IdP to the RP and how much it should be
    James> under the control of the federation agreement and how much
    James> under the control the subject.

I would be fine with both of these changes.

    James> 17.  Section 2.5 - what happened to the text in this section?

I don't know. Did it ever have text?


    James> 19 - section 3.1 - I would suggest a new title as it would be
    James> good to suggest who is being mutually authenticated -- yet
    James> another name for somebody - who are the initiator and the
    James> acceptor

Section 3 is all about GSS-API, which only has two endpoints, so I don't
 see any other options than these two endpoints.

initiator is the GSS name for subject; acceptor is the GSS name for RP.

    James> Please expand on the difference between bullets 1 and 2 in
    James> this section.  It appears to me that the first sentence in
    James> both sections are saying the same thing - that the initiator
    James> trusts that the name it has given for the target
    James> name/acceptor correctly names and describes the acceptor.  If
    James> there is a difference in these concepts I for one don't
    James> understand it from the text.

The second bullet covers the case where the initiator does not supply a
 target name.
I'd be happy to add a sentence to the second bullet that the second
 bullet is a subset of the first when a target name is provided or
 otherwise clarify.

    James> 20 - section 3.3 - In the next to last paragraph, would host
    James> names work better in the case that secure SRV records w/
    James> DNSSEC are used?  

If you were willing to trust DNS both on the initiator and the RP  and
do some work on how applications handle these names, you could improve
the situation.
To me, it seems a big assumption to assume that your application
authentication trust and your DNS trust are aligned, especially when
you'd need to make that assumptions on both sides of a federation.
It's true sometimes and possibly enough of the time to support, but not
enough of the time to rely on.

    James> I also do not understand how to resolve the
    James> decision in paragraph two to say we need to use realm names,
    James> but the last paragraph says that we need to support
    James> host-based service names.  How am I supposed to reconcile
    James> these differences.  

Putting hosts into a realms is a mechanism for more easily supporting
host names.
There is more detail on this in the actual mechanism document.

    James> Also does it make a difference in how the
    James> channel to the service is created?  I.e. it makes much more
    James> sense to use host-based server names if one is using TLS as
    James> the channel between the application and the channel, but how
    James> the RP decides which IdP or federation to use is not going to
    James> be based on host-based service names.  I guess part of my
    James> question is going to be is naming different for the RP (from
    James> the point of view of the client) as oppose to the naming of
    James> other entities in the system.

This section is discussing support for host-based names of GSS
acceptors.  At least as described currently an IDP is not a GSS
acceptor.  In the KMP presentation we gave in Prague, we proposed
creating a GSS acceptor service associated with an IDP, but that is not
discussed at all in this document.

    James> 21 - Section 3.4 - I need to have an idea of what entities
    James> are going to be using the GSS-API per-message security
    James> services.  There is a difference in how I think about this if
    James> this is done between the subject and the RP as oppose to
    James> between the RP and the IdP or the subject and the IdP.  I
    James> also need to come to grips with how many different MSKs are
    James> going to be generated in this system.  I don't have a good
    James> idea of this from this section.

GSS initiator and acceptor use the per-message services. I.E. the IDP
and RP.
Only one MSK in the entire system.



    James> _______________________________________________ abfab mailing
    James> list [email protected]
    James> https://www.ietf.org/mailman/listinfo/abfab

_______________________________________________
abfab mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/abfab

Reply via email to