> -----Original Message-----
> From: Sam Hartman [mailto:[email protected]]
> Sent: Wednesday, August 15, 2012 1:17 AM
> To: Jim Schaad
> Cc: [email protected]
> Subject: Re: [abfab] draft-ietf-abfab-gss-eap-naming believed ready for
last
> call
>
> >>>>> "Jim" == Jim Schaad <[email protected]> writes:
>
> Jim> 1. Just because I keep having to go and read the SAML document
> Jim> every time, it might be useful to provide an example in
> Jim> paragraph 1 of section 3 about what makes a first part and a
> Jim> second part. I would pass the document without this, it is
> Jim> just a suggestion.
>
> I'd love to include an example here.
> I'll try to update code prior to IETF LC ending.
Hope to see it.
>
>
> Jim> 3. In section 5, I thought we had agreed that there should be
> Jim> a statement that "The values, prior to receiving the
> Jim> access-accept message, are undefined."
>
> I thought the first paragraph was adequate, but expanded it somewhat.
> Let me know how we're doing now.
Yes this looks better.
>
> Jim> 4. Section 6.1 - I think this is correct. s/is always
> Jim> authentic when present/is always authenticated when present/ If
> Jim> I am wrong (which is possible) then I am not sure what the word
> Jim> authentic is supposed to be. I don't think it currently makes
> Jim> sense. The argument against the above is the following on
> Jim> sentence which states that a new GSS-API mechanism may allow it
> Jim> to be unauthenticated.
>
> Added hopeful clarity to this paragraph.
Better
>
> Jim> 5. Section 6.1 - unclear if this is useful information or not.
> Jim> Might want to say that for GSS-API-EAP, it is the same as
> Jim> "urn:ietf:gss:radius-attribute TBD".
>
> I don't want to trod on draft-ietf-abfab-aaa-saml's toes.
I understand that you don't want to trod on the SAML document. I might
suggest that the following text be added instead.
For the GSS-API mechanism this attribute is an alias for a RADIUS attribute,
however it is recommended that this attribute name be used as other
mechanism could transport the SAML statement by a different method that
RADIUS.
>
> Jim> 6. Section 5 - the above note just nudged a new one. Does
> Jim> there need to be a DIME attribute as the number space can be
> Jim> larger. Perhaps just a comment to the effect that some DIME
> Jim> space may not be reachable?
>
> If we want diameter support there does need to be an attribute.
> We can define that in the diameter document if that ever happens.
Sounds fine
>
>
> Jim> 7. Section 6.2 -- Possible comment to be added. "If the
> Jim> implementation does discard it, then processing the entire SAML
> Jim> statement will result in a different answer than processing the
> Jim> individual attributes." This might just be a security
> Jim> considerations comment.
>
> OK.
Nits:
Abstract
s\Authentication/Authorization/Accounting\Authentication/Authorization/Accou
nting (AAA)\
s/Generic Security Services Application Programming interface/Generic
Security Services Application Programming interface (GSS-API)/
Section 1.
s\Authentication/Authorization/Accounting\Authentication/Authorization/Accou
nting (AAA)\
Expand the EC in SAML EC
Section 3.
s/Attributes using the federated context/Attributes access by the federated
context/
s/based on who is the subject of the name/based on authenticator part/
I this that it is backwards - you need to know who the authenticator
is in order to know the semantics of the subject is.
Section 5
s/specifations/specifications/
Section 6.1
s/some other mechanisms/other mechanism/ or /some other mechanism/
Section 7
s/mechanisms are/Mechanisms are/
Section 9
s/Sam hartman's/Sam Hartman's/
_______________________________________________
abfab mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/abfab