#29: More explicity discussions of the communication channels with the end-
points, cryptography and channel binding

Changes (by hannes.tschofenig@…):

 * cc: hannes.tschofenig@… (added)
 * owner:  draft-ietf-abfab-arch@… => hannes.tschofenig@…


Comment:

 I think that this comment can be addressed in the security consideration
 section.

 Here is a proposal what I plan to put into the -01 version of the draft:

 Security Considerations

    This document describes the architecture for Application Bridging for
    Federated Access Beyond Web (ABFAB) and security is therefore the
    main focus.  This section highlights the main communication channels
    and their security properties:

    Client-to-RP Channel:

       This communication channel is secured by TLS executed between the
       client and the RP.  The channel binding material is provided by
       any certificates and the final message (i.e., a cryptographic
       token for the channel).  Authentication may be provided by the RP
       to the client but a deployment without authentication at the TLS
       layer is possible as well.  In addition, there is a channel
       between the GSS requestor and the GSS acceptor, but the keying
       material is provided by a "third party" to both entities.  The
       client can derive keying material locally, but the RP gets the
       material from the IdP.  There is no cryptographic binding on this
       channel until the EAP processing has finished and the MSK is
       transferred from the IdP to the RP.

    RP-to-IdP Channel:

       The security of this communication channel is mainly provided by
       the functionality offered via RADIUS and Diameter.  At the time of
       writing there are no end-to-end security mechanisms standardized
       and thereby the architecture has to rely on hop-by-hop security
       with trusted AAA entities or, as an alternative but possible
       deployment variant, direct communication between the AAA client to
       the AAA server.  Note that the authorization result the IdP
       provides to the RP in the form of a SAML assertion may, however,
       be protected such that the SAML related components are secured
       end-to-end.

    Client-to-IdP Channel:

       This communication interaction is accomplished with the help of
       EAP and EAP methods.  The offered security protection will depend
       on the EAP method that is chosen but a minimum requirement fis to
       offer mutual authentication, and key derivation.  The IdP is
       responsible during this process to determine that the RP that is
       communication to the client over the RP-to-IdP channel is the same
       one talking to the IdP.  This is accomplished via the EAP channel
       binding.

-- 
--------------------+----------------------------------
 Reporter:  ietf@…  |       Owner:  hannes.tschofenig@…
     Type:  defect  |      Status:  new
 Priority:  major   |   Milestone:
Component:  arch    |     Version:
 Severity:  -       |  Resolution:
 Keywords:          |
--------------------+----------------------------------

Ticket URL: <http://trac.tools.ietf.org/wg/abfab/trac/ticket/29#comment:1>
abfab <http://tools.ietf.org/abfab/>

_______________________________________________
abfab mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/abfab

Reply via email to