[abfab] draft minutes for abfab@ietf82

Klaas Wierenga <klaas@cisco.com> Mon, 21 November 2011 16:26 UTC

Return-Path: <klaas@cisco.com>
X-Original-To: abfab@ietfa.amsl.com
Delivered-To: abfab@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3977521F8BF4 for <abfab@ietfa.amsl.com>; Mon, 21 Nov 2011 08:26:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.718
X-Spam-Level:
X-Spam-Status: No, score=-5.718 tagged_above=-999 required=5 tests=[AWL=-0.608, BAYES_05=-1.11, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LV7ehx3y5X2x for <abfab@ietfa.amsl.com>; Mon, 21 Nov 2011 08:26:54 -0800 (PST)
Received: from rcdn-iport-7.cisco.com (rcdn-iport-7.cisco.com [173.37.86.78]) by ietfa.amsl.com (Postfix) with ESMTP id 8730B21F8BE8 for <abfab@ietf.org>; Mon, 21 Nov 2011 08:26:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=klaas@cisco.com; l=7830; q=dns/txt; s=iport; t=1321892812; x=1323102412; h=from:content-transfer-encoding:subject:date:message-id: to:mime-version; bh=XZOgIwxPWwX0xaB73Lv1lOP78ugOK1DLyYWf7BI4B3E=; b=aGJu3XUW82fOeOtbkYMp4E7euLBgJ/P3C6ganHg3qHzmJ6bzkjcS098a x30XslqT1QGI1liT9KhUNCKpgO6j39Gal1x5QYSmNzyQ486knM4ptjQkI CM7um78bD/6JrQ+YPuJxmzgEOsCRdb3IkcQ2FgoQItGd53AFNRaKuGLtJ Y=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvwEAIt7yk6tJV2Z/2dsb2JhbABDqjqBBYILASc0OH1CB5xRgSYBnjKJNGMElDySBg
X-IronPort-AV: E=Sophos;i="4.69,547,1315180800"; d="scan'208";a="37903662"
Received: from rcdn-core-2.cisco.com ([173.37.93.153]) by rcdn-iport-7.cisco.com with ESMTP; 21 Nov 2011 16:26:52 +0000
Received: from rtp-kwiereng-8711.cisco.com (rtp-kwiereng-8711.cisco.com [10.116.7.34]) by rcdn-core-2.cisco.com (8.14.3/8.14.3) with ESMTP id pALGQoQV001109 for <abfab@ietf.org>; Mon, 21 Nov 2011 16:26:51 GMT
From: Klaas Wierenga <klaas@cisco.com>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Mon, 21 Nov 2011 17:26:50 +0100
Message-Id: <03826A76-5333-41D0-BABA-5945DACF92B7@cisco.com>
To: abfab@ietf.org
Mime-Version: 1.0 (Apple Message framework v1251.1)
X-Mailer: Apple Mail (2.1251.1)
Subject: [abfab] draft minutes for abfab@ietf82
X-BeenThere: abfab@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Application Bridging, Federated Authentication Beyond \(the web\)" <abfab.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/abfab>, <mailto:abfab-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/abfab>
List-Post: <mailto:abfab@ietf.org>
List-Help: <mailto:abfab-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/abfab>, <mailto:abfab-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Nov 2011 16:26:59 -0000

Hi,

with thanks to the note taker and jabber scribes

please let me know if anything is not correct.

Klaas

====
ABFAB Minutes IETF 82

note taker: Jim Schaad
jabber scribe: Josh Howlett, Joe Salowey

* Agenda

* EAP Applicibility statement

Leif: - is the content close to last call ?
Stefan Winter - some people violenty disagree.  Have covered what was targed.  So
happy w/ content
Joe Salowey - NEA text is still missing to some degree.
Leif: - emu working group disucssion w/ different options on hosting - in
our chater - Stephen - what should we do?
Stefan - chainging something fundamental in EAP
Stephen Farrell- What dependencies?
Sam Hartman - normative dependancy on the core spec
Leif - why normative?
Sam - core should not be published before this - it is currently not legal
to use EAP this way.  States what needs to be done to use EAP beyond net
access.  Core wants to say how these requirements are met.
Klaas - why do you care about how much we need it?
Stephen - could be contentious in other working groups - could drag on.
Sean Turner - if you cross call last call then I don't have a problem.
Sean - does it need to be done at all?
Sam -yes
Eliot Lear - app doc has been used to say don't do that in the past.  How to we
phase this.
Sam - as an AD said that you cannot use EAP w/o updating the app statement.
Stephen - have a chat and see what it should be done.
Leif - Joe did hum in emu - some consus that they wanted to own the
document. Steve/Joe should we ask or say if EMU wants to own then let it
Joe - No more natural of a home in EMU - targeted to methods - abfab has
bigger need - needs to be large review but no stake in where it gets done.
Leif - dissucss with ADs and then go forward.
Joe - would be useful if more things were going to happen - more guidence
for future things makes sense.
ACTION - chairs and ADs meet to make a decision.

* GSS-EAP

Straw Poll - is the internationalization method as given good - sense of
room was yes
RFC 3961/4121 - plan is to move to the 3961 back - ask for objections on the
list
Leif - Sam - please push thread to resolutions and gauge consensus then the
chair will concensus call

* GSS-Naming

* AAA-SAML

Leif - possible to profile to add the feature? 
Josh - ok to do later

Issue - the name of the file contains AAA but only does radius - is that an
issue?
Stephen - not an issue

Issue - Signatures on the SAML message
Eliot - Under what circumstances would a signature be sent where it would
have to be ignored?
Josh - RP could chose to rely on the transport
Sam - Have signature w/ legacy IdP - NAS does not have trust anchors to
validate signature - already have RADIUS to provide integrity. - don't want
to reject assertion that is signed because it cannot be validated, but would
have accepted if unisgned
Leif - counter argument on profile - can always write a new profile that
required signatures
Eliot - Should say both MUST NOT check and SHOULD NOT send for consistency
in the past.
Sam - better than MUST NOT send
Leif - Easy to strip signatures if needed - really easy to do.
Leif - in SAML space - common to separate implementation profile, deployment
profile - Implement must supply or deployment must turn on. - need to call
this out
Josh - deployment profile
Sam - don't think deployment profile should be a std track document - need a
implementation profile - deployment profile in BCP or arch document.
Josh - XML digsig needs restrictions to get interop.
Sam - IETF constrain implementations not deployments.
Leif - +1 what sam says

Stephen - can be one or many hops? - MANY hops
Sam - no - hops are integrity protected
Hannes - difference between specified and deployed
Sam - trusted third party proxy security gets deployed. 

Payload size
Eliot - average size of a SAML transaction?
Josh - currently not really known
Diego Lopez - compression of assertion?
Josh - One binding allows for
Leif - 3.5 k for one sample - signed - real issue
Jim - Option 1- need to at least error - #2 go to diameter
Eliot - sub options #2 - go to diameter
Leif - actual attributes were only one K
Hannes - using diameter should be ok - good implementations exist.
      - avoid option #3 - routs around why we did abfab to begin with
      - fragmentation layer - looks like a real hack - would prefer TCP/TLS
version of radius

Sam - two implementations of NCP over radius have 4k limit even on TCP -
radius spec is hard coded
Diego - option 2 is wisest - but in a federations somebody will break it. -
proxies or deployment of radius 
Hannes - how much can you actually change? - depends on the specific
deployment. Bigger radius deployments are start radius and then go to
private version - may not always be an issue.
Diego - moment single assertion grows to large means all deployments need to
change
Hannes - how far should we bend to deal with existing deployments 
Klaas - option 3 - should be considered - not talking about applications but
radius server talking to IDP - not same set of problems as what abfab
Hannes - work w/ existing AAA structure - both right -
Eliot - Lots of homework - size - environment being measured - network auth
vs other uses - some is prognosticating - for an architecture should assume
grossly expensive
Leif - will see wide span of number and type of attributes - hard to predict
a small size assume can get really big
ELiot - agree option #1 is not an option. - option #4 seems like more work
than revisiting diameter draft
Jim - Humongous SAML statements
Hannes - what does option #4 look like
Josh - have possible to do resolution by reference to identifier - have mime
type and chuck.
Sam - think sever only access request
Leif - Can combine different options such as 2 and 3.
    Define a RESTful SAML binding - (already done)
    Think Diego has a point - any deployment will be unpredictable
Stepen - If option #4 means generic then needs to go out of this group.
Sam - if not on there - then add radius based mech for doing only SAML
assertions
   generic fragmentation would be painful - would need RADEXT review
Jeff Hutzelman - can RPs do the artifact resolving over an arbitrary large
federation?
Leif - no - but all solutions add new requirements.
Leif - Present updated set of options and have round 2 discussion on the
mailing list

* abfab arch & Uses Cases

Tracker discussion and etiquette

* use cases

JIM - find the Plasma use cases - somebody agreed to do that

Consensus call - should the OID document be a working group document - Much
yes - zero no - one no idea

* Multihop Federations & Trust Router

Leif - we have a charter item that covers the problem statement.  Not clear
that this the only way to skin the cat.
Leif - would be willing to review - might give alternative solutions as
well.  Problem is broader than just ABFAB.
    Current trust router draft narrows down to a specific model (hub and
spoke) very quickly.  Good approach to start by having a discussion around
the problems if it were really general.
Klaas - Many related options exist (routing prototcols, group management protocols etc), not clear
what unique problem is solved.
Margaret - current statement is a motivation for the work not a general problem
statement.

Poll - Who is interested in working on the problem statement draft
    Yes - Leif, Diego, Hannes, Josh, Karen, Jim, Tom Yu
    No - no hands

* Current technical Issues

- 3GPP Issues - no discussion in this meeting - continue on the list
- Report No consensus for adoption of draft-jones-diameter - no response.
Intend to re-issue.