>>>>> "Jim" == Jim Schaad <[email protected]> writes:


    Jim> Is the ABNF for "name" still wrong?

I don't think so.
What problem or oddity do you see?
Hmm.
I see that realm is only permitted if host is present. I think I've
fixed that.
I think it's correct now in 04.


    Jim> section 3.4 missing

    Jim> Section 4 - does/should the application get any control ovret
    Jim> the set of allowable EAP methods to be used or is that purely a
    Jim> fucntion of your GSS-API library

Currently no mechanism is provided for an application to enfluence this.
A mechanism probably should have system-level policy configuration.
A mechanism could expose a credential option on the initiator.
If we ever need to standardize a credential option we can, but I don't
see a need for that now.



    Jim> For consistency the paragraph: Tokens from the initiator to
    Jim> acceptor use an outer token type of 06 01; tokens from acceptor
    Jim> to initiator use an outer token type of 06 02.  These token
    Jim> types are registered in the registry of RFC 4121 token types;
    Jim> see Section 8.1.

My understanding is that the ID describes which type of token (token
type) we are dealing with.
So, I've phrased it as token s with from acceptor to initiator use  an
inner token type with ID xxx.
1) token type with ID 
and 2) inner not outer

    Jim> should refer to the "token ID" rather than the "outer token
    Jim> type" either that or the item in the table should be updated.

    Jim> section 5.2 refers to "token type" - I think that maybe this is
    Jim> the most constant phrase to be used.

I've updated the registry to talk about token type identifiers.

    Jim> I will say that this version did harmonize and make the token
    Jim> naming scheme much more consistent and readable.  I think this
    Jim> is a big improvement.
Great!

    Jim> s/secondsubtoken/second subtoken/ (in the table)

    Jim> Section 5.3 - Is there going to be a rule that you should send
    Jim> two error subtokens in the even t\the length is greater than 8?
    Jim> I can understand saying you should ignore the extended bytes
    Jim> but should you really ignore the error code itself?

In 04 we have initiators MUST ignore octets beyond the GSS EAP error
code for future extensibility.  Thanks for the catch.

    Jim> Section 5.4 - you have different names for the acceptor name
    Jim> subtokens in the description of what is permitted and the
    Jim> actual subtoken names - I think you might want to harmonize
    Jim> this.

    Jim> Is there a rason that the EAP request subtoken is not
    Jim> documented in section 5.4 since it is a required subtoken from
    Jim> in the Initial State message from the acceptor?

I've added a reference. However I think it's better to document EAP
request and response near each other.
Note that if we adopt the proposal to reduce a round trip this subtoken
goes away from initial state.

    Jim> Section 5.4.1 - I realize this is a debugging string (Vender
    Jim> Subtoken) but is there any reason in this day and age not make
    Jim> it a UTF8 string?  (Other than it is not one for Kerbros)

It doesn't exist for Kerberos (which has no vendor string I'm aware of)
so I don't think that's a concern.

I've made it UTF-8; I don't care.

    Jim> Section 5.4.3 - Should something be said about what the
    Jim> acceptor should do if the initiator sends an acceptor name
    Jim> which is not completely correct for the specific acceptor.  I
    Jim> am thinking specifically of things like adding a host name or
    Jim> adding some service specifics to the acceptor name.  Is this
    Jim> permitted?  Or is this and error condition or since this is
    Jim> typically not sent is the acceptor name from the client to be
    Jim> used in all events. (unless totally wrong)

I think you mean 5.4.2 not 5.4.3?
My assumption is that you need to send a superset of what the acceptor
 expects, else things will fail at channel binding. I think you want to
 leave it to channel binding to fail unless an IDP wants to implement
 some form of aliasing.



    Jim> para #2 s/this token/This token/

    Jim> Section 5.5 s/ACCEPTOR/acceptor/

    Jim> The first bullet of this section is causing me some mental
    Jim> problems.  The acceptor cannot confirm that the protected
    Jim> result and the final result are consistent - this is hidden
    Jim> from the acceptor.  --- or you need to be passing the protected
    Jim> result as a RADIUS attribute, at which point it is not really
    Jim> protected anymore.

For combined authenticators the acceptor can and should evaluate the
protected result.
For pass-through authenticators the acceptor should confirm there's AAA
success if there is EAP success.

    Jim> The acceptor can confirm that a key has been delivered to it,
    Jim> but it does not know the source of the key - i.e. was it
    Jim> derived or just transmitted inside of the EAP session.

Here, we mean the security claim discussed in section 7.10 of RFC 3748, 
which probably includes transmitting a key.
Their term, not mine.
I've added a reference.



    Jim> Should the acceptor or the initiator send the error subtoken -
    Jim> or should the acceptor be looking for clear EAP messages and
    Jim> generate a failure?

I don't understand.

    Jim> I think you need to carefully re-read the section and verify
    Jim> that you think it is correct.

I think it is consistent with what EAP does and what our implementation
does.
There are some disadvantages to how EAP handles failures.
We can discuss at IETF 82 if you like.

    Jim> Setion 5.6 - Please tell me which type of channel binding I am
    Jim> getting at this point. (I know it is GSS-API channel binding,
    Jim> but given that two different types are discussed in the
    Jim> document I think being explcit would be good.)

Also added a forward reference.

    Jim> Section 6 - Is the KMSK in the "Tn = " line supposed to be
    Jim> GMSK?
Yes.


    Jim> Section 6.1 - I am unclear what the extension option field is
    Jim> referring to please clarify.

This was all wrong and has been fixed. Thanks for the reality check.


_______________________________________________
abfab mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/abfab

Reply via email to