Hi Jim, 

for issue#6 http://trac.tools.ietf.org/wg/abfab/trac/ticket/6 you wrote:
"
Has the sentences " Aside from a valuable secret being exposed, a

    synchronization problem can also often develop. Since there is no
    single authentication mechanism that will be used everywhere there
is
    another associated requirement:"

I have a couple of issues here. First there is a problem which is stated
- i.e. synchronization - but the next sentence does not appear to expand
on the problem but rather deals with a different issue. I would like to
have the first thought finished before going onto the second one. I
think this paragraph is supposed to be talking about issues that we have
been taught - but the word Since does not convey this is a separate
issue we have dealing with.
"

Here is the text from the draft:

"
2.2.  Subject To Identity Provider


   Traditional web federation does not describe how a subject
   communicates with an identity provider.  As a result, this
   communication is not standardized.  There are several disadvantages
   to this approach.  It is difficult to have subjects that are machines
   rather than humans that use some sort of programatic credential.  In
   addition, use of browsers for authentication restricts the deployment
   of more secure forms of authentication beyond plaintext username and
   password known by the server.  In a number of cases the
   authentication interface may be presented before the subject has
   adequately validated they are talking to the intended server.  By
   giving control of the authentication interface to a potential
   attacker, then the security of the system may be reduced and phishing
   opportunities introduced.

   As a result, it is desirable to choose some standardized approach for
   communication between the subject's end-host and the identity
   provider.  There are a number of requirements this approach must
   meet.

   Experience has taught us one key security and scalability
   requirement: it is important that the relying party not get in
   possession of the long-term secret of the entity being authenticated
   by the AAA server.  Aside from a valuable secret being exposed, a
   synchronization problem can also often develop.  Since there is no
   single authentication mechanism that will be used everywhere there is
   another associated requirement: The authentication framework must
   allow for the flexible integration of authentication mechanisms.  For
   instance, some identity providers may require hardware tokens while
   others may use passwords.  A service provider would want to support
   both sorts of federations, and others.

   Fortunately, these requirements can be met by utilizing standardized
   and successfully deployed technology, namely by the Extensible
   Authentication Protocol (EAP) framework [RFC3748].  Figure 2
   illustrates the integration graphically.

   EAP is an end-to-end framework; it provides for two-way communication
   between a peer (i.e,service client or principal) through the
   authenticator (i.e., service provider) to the back-end (i.e.,
   identity provider).  Conveniently, this is precisely the
   communication path that is needed for federated identity.  Although
   EAP support is already integrated in AAA systems (see [RFC3579] and
   [RFC4072]) several challenges remain: one is to carry EAP payloads
   from the end host to the relying party.  Another is to verify
   statements the relying party has made to the subject, confirm these
   statements are consistent with statements made to the identity
   provider and confirm all the above are consistent with the federation
   and any federation-specific policy or configuration.  Another
   challenge is choosing which identity provider to use for which
   service.
"

The sentence you are referring to, namely "Aside from a valuable secret
being exposed, a synchronization problem can also often develop." should
be deleted. I understand that there may be a synchronization problem
when you cache your distribute your long term secret everywhere but
that's only secondary (and less important). If we avoid exposing the
long term secret to the RP, which we do in the document by using the AAA
infrastructure, then we do not have to worry about the synchronization
issue. 

There is a problem with the readability of the section in general. Here
the text refers to the authentication protocol executed between the
application used by the data subject and the identity provider, which is
indeed left out-of-scope by many standardized Web identity management
protocols, but it does not refer to any other steps the data subject may
need to take as well in order to actually get the credentials
provisioned at the IdP and to perform the steps for identity proofing.

Ciao
Hannes




_______________________________________________
abfab mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/abfab

Reply via email to