#29: More explicity discussions of the communication channels with the end-
points, cryptography and channel binding

 On May 1 I wrote a message with the following text:

 I think that I am getting some of the terms straight.  What I think I have
 problems with is the requirements and points at which things occur.

 The following is a list of the "channels" that I believe exist in the
 current abfab architecture  (Please forgive the names that I am using as
 they are made up on the spot):

 1.  Client to RP transport channel - This would be the TLS channel that
 exists between the client and the RP.  The channel binding material is
 provided by any certificates and the final message (i.e. a cryptographic
 token for the channel).  This will normally be either a one-way
 authentication of identity (i.e. the client knows who the RP is) or a
 zero-way authentication of identity (i.e. anonymous on both sides).  It
 could be a mutual authentication, but in that case there would be no
 reason to involve the entire abfab  architecture except potentially for
 assignment of privileges.

 2.  Client to RP GSS-API channel - This is slightly weird to think of as a
 channel as it is going to be a channel between  the requestor and the
 acceptor, but the keying material is provided by a "third party" to both
 entities.  (My understanding is that the client can derive this material
 on its own, but the RP gets the material from the IdP.)  There is no
 cryptographic binding on this channel until the EAP processing has totally
 finished and the MSK is transferred from the IdP to the RP - i.e. after
 the client/IdP authentication has completed.

 3.  RP to IdP channel - This is the weakest of the communication channels
 in terms of authentication and security.  Most of these hops are going to
 be point-to-point and anybody in the middle can play with the data that is
 being transferred in either direction.  The base architecture is
 responsible for providing any authentication assurances between the RP and
 the IdP.  All authentication is fully established prior to the EAP
 conversation between the client and the IdP.

 4. Client to IdP - This is the EAP channel.  It has the strongest mutual
 authentication between that exists.  We have stated that the IdP is
 responsible during this processing to determine that the RP that is
 communication to the client over channel #3 (Rp to IdP) and the one
 talking between the client the RP (channel #1?) are going to be the same
 entity as the client provides the IdP it's version of the RP name during
 the EAP conversation.  Thus it needs to reconcile the name forms between
 channel #1 and channel #3 during this authentication process.

 At this point channel #2 and channel #4 are known to have cryptographic
 protections.  Channel #1 and channel #3 may or may  not have cryptographic
 protections.  We need to specify what level of services are provided in
 these channels and how important those services are.


 **

 It was followed up by a couple of notes by sam, myself and nico.  I
 believe that the outcome was that we should get a clear discription of the
 different communication channels, the set of cryptographic operations/keys
 offered by each, and the channel binding opertions (type of binding and
 what it accomplishes) for each channel would be useful.

-- 
--------------------+-------------------------------------
 Reporter:  ietf@…  |      Owner:  draft-ietf-abfab-arch@…
     Type:  defect  |     Status:  new
 Priority:  major   |  Milestone:
Component:  arch    |    Version:
 Severity:  -       |   Keywords:
--------------------+-------------------------------------

Ticket URL: <http://trac.tools.ietf.org/wg/abfab/trac/ticket/29>
abfab <http://tools.ietf.org/abfab/>

_______________________________________________
abfab mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/abfab

Reply via email to