>
> Unless you're willing to say that whatever is doing the authz/policy is
> *offline* -- ie, can't look that policy up in real time -- this can all be
> done using normal online mechanisms. That is, "server, can is this identity
> allowed to do this or that?" in your example.
>
> I'm not arguing that it doesn't work as stated. I'm arguing that they
> bring a tremendous amount of cert baggage -- business models, enrollment,
> revocation, etc, etc -- that is really hard to justify under any normal
> circumstance. Asymmetric keying unfortunately involves way too many people
> thinking that once they are involved, certs are necessary. It need not be,
> and in fact the vast majority of cases would greatly simplified to just get
> rid of certs entirely, even the basic name/identity binding they provide.
>

I don't entirely disagree with that perspective. Lots of merit to it.

I think most of my responses have been directed towards those who seem to
be *disagreeing* with the 'this is how it works" bits.

On Tue, May 20, 2025 at 2:23 PM Michael Thomas <m...@mtcc.com> wrote:

>
> On 5/20/25 11:12 AM, Tom Beecher wrote:
>
> Same difference: burying policy into an authentication token. What is the
>> point? A backend presented with an authenticated identity can do the same
>> thing far easier and far more scalable without any of the downsides like
>> mentioned. A backend server doesn't even need a name/key binding borne by
>> the client at all, let alone bearing policy info as well.
>
>
> Say I run a storage unit business. When you rent a unit, I give you a
> code. I have decided (by my policy) that any user with a valid code can
> access their unit 24/7/365.
>
> You come to rent a unit from me. You ask that your code only works on
> Sundays, because that is the only day you will ever come. You have decided
> (by your policy) you want something more restrictive than mine. I agree.
>
> Someone shows up on Wednesday and tries to use your code. You told me that
> would never be you, so I deny the entry, because *YOU* told me not to allow
> it. Semantically, you could say it's 'you did not authorize' , but really
> it's "I did not not authenticate the identity of this user, based on
> verified instructions that person provided me".
>
>
> This is really al EKU is. I'm not arguing it's perfect. But that's what it
> is.
>
> Unless you're willing to say that whatever is doing the authz/policy is
> *offline* -- ie, can't look that policy up in real time -- this can all be
> done using normal online mechanisms. That is, "server, can is this identity
> allowed to do this or that?" in your example.
>
> I'm not arguing that it doesn't work as stated. I'm arguing that they
> bring a tremendous amount of cert baggage -- business models, enrollment,
> revocation, etc, etc -- that is really hard to justify under any normal
> circumstance. Asymmetric keying unfortunately involves way too many people
> thinking that once they are involved, certs are necessary. It need not be,
> and in fact the vast majority of cases would greatly simplified to just get
> rid of certs entirely, even the basic name/identity binding they provide.
>
> Mike
>
>
_______________________________________________
NANOG mailing list 
https://lists.nanog.org/archives/list/nanog@lists.nanog.org/message/S55YQHNSX3Q2UMIWAJTQYUEJ4ULOAF6A/

Reply via email to