Hi Yoav,

When you say "local policy" you assume that spokes are smart enough (or well enough provisioned) to have such policy. My assumption OTOH was that the gateway is smarter, e.g. it knows what spokes are allowed to communicate directly or what kind of traffic is allowed to flow directly between spokes.

It may just be a semantic discussion, but the second bullet of your "introduction" is to me indistinguishable from authorization.

Thanks,
        Yaron

On 03/21/2012 11:48 PM, Yoav Nir wrote:
I don't think there need to be authorization tokens, as authorization can be 
left to local policy.

But there always needs to be some kind of "introduction" process, and it can 
take many forms:
  - Yaron, Yoav is at 192.168.1.3. Use c80273f0f7dd5bdc10c38234616fde22 as PSK
  - Yaron, Yoav is at 192.168.1.3. His certificate has DN: 
"CN=ynir,OU=something"

In the first case, the "system" actually invented the credential, while in the 
second case it just tells you about it. So temporary credentials are not strictly 
necessary, but previous attempts to rely on pure PKI have been less than successful.

Yoav

On Mar 21, 2012, at 11:24 PM, Yaron Sheffer wrote:

The point of "temporary credentials" is that if these spokes normally
use EAP or PSK to authenticate to the gateway, they cannot use these
same credentials to auth to one another (because that would expose each
spoke to impersonation by the other one). So to support this scenario we
must have some other means of authentication.

This raises an interesting question: if the spokes are authenticating
with certificates, they could in principle use the same credentials to
authenticate to one another. So the "temporary credentials" now become
*authorization* tokens, basically conveying to gateway's policy. Do we
really want to go down this path?

Thanks,
        Yaron

On 03/21/2012 10:43 PM, Geoffrey Huang wrote:
I don't understand what "temporary credentials" means.  If the intent is to 
have some transitive authentication (or redirection of trust hierarchy, at least) between 
a gateway and two spoke devices, which are trying to establish an ad-hoc connection, then 
I agree this would be important to have.

-geoff

From: Vishwas Manral<[email protected]<mailto:[email protected]>>
Date: Wed, 21 Mar 2012 12:24:08 -0700
To: Steve Hanna<[email protected]<mailto:[email protected]>>
Cc: 
"[email protected]<mailto:[email protected]>"<[email protected]<mailto:[email protected]>>
Subject: Re: [IPsec] [ipsecme] #217: Temporary credentials

Hi Steve,

I think this is an important requirement for sure.

Thanks,
Vishwas

On Tue, Mar 20, 2012 at 6:36 PM, Stephen 
Hanna<[email protected]<mailto:[email protected]>>   wrote:
Another issue to comment on.

Steve

-----Original Message-----
From: ipsecme issue tracker 
[mailto:[email protected]<mailto:[email protected]>]
Sent: Tuesday, March 20, 2012 7:01 PM
To: [email protected]<mailto:[email protected]>; 
[email protected]<mailto:[email protected]>
Subject: [ipsecme] #217: Temporary credentials

#217: Temporary credentials

  Endpoints may require temporary credentials in order to establish a secure
  connection to another endpoint.

  Suggested Resolution: Put this in the requirements section.


_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to