>>>>> "Hannes" == Hannes Tschofenig <[email protected]> writes:

    Hannes> Section 3.2:

    Hannes>    However there are a variety of situations where this
    Hannes> authentication is not checked for policy or usability
    Hannes> reasons.
   
    Hannes> We cannot make the assumption that the software does not do
    Hannes> authentication or check the result of the authentication
    Hannes> process since then the entire security solution does not
    Hannes> work anymore. 

Section 3.2 is all about providing alternatives when this check is not
done.
This check is not done in practice a *lot*. There are lots of
application libraries that do not check server certificates.


Actually the TLS channel bindings have been designed with a couple of
strategies for dealing with load balancers and in general for allowing a
server to securly indicate that it cannot provide channel bindings
and so server certs are all you get.
    Hannes> consistent with the GSS-API specification.  XXXThere is an
    Hannes> open question here as to the details; today RFC 5554
    Hannes> governs.  We could use that and the current draft assumes we
    Hannes> will.  However in Beijing we became aware of some changes to
    Hannes> these details that would make life much better for GSS
    Hannes> authentication of HTTP.  We should resolve this with kitten
    Hannes> and replace this note with a reference to the spec we're
    Hannes> actually following.

    Hannes> Regarding the inline note have we come to a conclusion about
    Hannes> this issue already?

Yeah, we're just using the existing stuff.
Nothing new has materialized in the IETF.

    Hannes> Section 3.3:

    Hannes>    GSS-API provides a pseudo-random function.  While the
    Hannes> pseudo-random function does not involve sending data over
    Hannes> the wire, it provides an algorithm that both the initiator
    Hannes> and acceptor can run in order to arrive at the same key
    Hannes> value.  This is useful for designs where a successful
    Hannes> authentication is used to key some other function.  This is
    Hannes> similar in concept to the TLS extractor.  No current IETF
    Hannes> protocols require this.  However GSS-EAP supports this
    Hannes> service because it is valuable for the future and easy to do
    Hannes> given per- message services.  Non-IETF protocols are
    Hannes> expected to take advantage of this in the near future.


    Hannes> I would delete this paragraph since it is confusing, is not
    Hannes> relevant for the work we are doing, and does not relate to
    Hannes> the previous paragraph either.

How is this not relevant?
GSS-EAP implementations are required to provide gss_pseudo_random.


    Hannes>  Ciao Hannes

    Hannes> _______________________________________________ abfab
    Hannes> mailing list [email protected]
    Hannes> https://www.ietf.org/mailman/listinfo/abfab

_______________________________________________
abfab mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/abfab

Reply via email to