Re: [abfab] draft-ietf-abfab-arch-03.txt - GSS
Sam Hartman <hartmans@painless-security.com> Thu, 16 August 2012 13:00 UTC
Return-Path: <hartmans@painless-security.com>
X-Original-To: abfab@ietfa.amsl.com
Delivered-To: abfab@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A166121F84D5 for <abfab@ietfa.amsl.com>; Thu, 16 Aug 2012 06:00:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 4.187
X-Spam-Level: ****
X-Spam-Status: No, score=4.187 tagged_above=-999 required=5 tests=[AWL=-0.101, BAYES_00=-2.599, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_IPADDR=2.426, RDNS_DYNAMIC=0.1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id izjLD3fpDIQ4 for <abfab@ietfa.amsl.com>; Thu, 16 Aug 2012 06:00:55 -0700 (PDT)
Received: from ec2-23-21-227-93.compute-1.amazonaws.com (ec2-23-21-227-93.compute-1.amazonaws.com [23.21.227.93]) by ietfa.amsl.com (Postfix) with ESMTP id 34AFB21F851A for <abfab@ietf.org>; Thu, 16 Aug 2012 06:00:53 -0700 (PDT)
Received: from carter-zimmerman.suchdamage.org (c-98-217-126-210.hsd1.ma.comcast.net [98.217.126.210]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (Client CN "laptop", Issuer "laptop" (not verified)) by mail.suchdamage.org (Postfix) with ESMTPS id 3B72420862; Thu, 16 Aug 2012 08:35:14 -0400 (EDT)
Received: by carter-zimmerman.suchdamage.org (Postfix, from userid 8042) id B8D2B4350; Thu, 16 Aug 2012 08:35:07 -0400 (EDT)
From: Sam Hartman <hartmans@painless-security.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
References: <57E38F60-AF22-472B-92C3-1FC22EFEE5E1@gmx.net>
Date: Thu, 16 Aug 2012 08:35:07 -0400
In-Reply-To: <57E38F60-AF22-472B-92C3-1FC22EFEE5E1@gmx.net> (Hannes Tschofenig's message of "Thu, 16 Aug 2012 10:08:41 +0300")
Message-ID: <tsl393n9fr8.fsf@mit.edu>
User-Agent: Gnus/5.110009 (No Gnus v0.9) Emacs/22.3 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Cc: Jim Schaad <ietf@augustcellars.com>, abfab@ietf.org
Subject: Re: [abfab] draft-ietf-abfab-arch-03.txt - GSS
X-BeenThere: abfab@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Application Bridging, Federated Authentication Beyond \(the web\)" <abfab.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/abfab>, <mailto:abfab-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/abfab>
List-Post: <mailto:abfab@ietf.org>
List-Help: <mailto:abfab-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/abfab>, <mailto:abfab-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Aug 2012 13:00:55 -0000
>>>>> "Hannes" == Hannes Tschofenig <hannes.tschofenig@gmx.net> writes: Hannes> Section 3.2: Hannes> However there are a variety of situations where this Hannes> authentication is not checked for policy or usability Hannes> reasons. Hannes> We cannot make the assumption that the software does not do Hannes> authentication or check the result of the authentication Hannes> process since then the entire security solution does not Hannes> work anymore. Section 3.2 is all about providing alternatives when this check is not done. This check is not done in practice a *lot*. There are lots of application libraries that do not check server certificates. Actually the TLS channel bindings have been designed with a couple of strategies for dealing with load balancers and in general for allowing a server to securly indicate that it cannot provide channel bindings and so server certs are all you get. Hannes> consistent with the GSS-API specification. XXXThere is an Hannes> open question here as to the details; today RFC 5554 Hannes> governs. We could use that and the current draft assumes we Hannes> will. However in Beijing we became aware of some changes to Hannes> these details that would make life much better for GSS Hannes> authentication of HTTP. We should resolve this with kitten Hannes> and replace this note with a reference to the spec we're Hannes> actually following. Hannes> Regarding the inline note have we come to a conclusion about Hannes> this issue already? Yeah, we're just using the existing stuff. Nothing new has materialized in the IETF. Hannes> Section 3.3: Hannes> GSS-API provides a pseudo-random function. While the Hannes> pseudo-random function does not involve sending data over Hannes> the wire, it provides an algorithm that both the initiator Hannes> and acceptor can run in order to arrive at the same key Hannes> value. This is useful for designs where a successful Hannes> authentication is used to key some other function. This is Hannes> similar in concept to the TLS extractor. No current IETF Hannes> protocols require this. However GSS-EAP supports this Hannes> service because it is valuable for the future and easy to do Hannes> given per- message services. Non-IETF protocols are Hannes> expected to take advantage of this in the near future. Hannes> I would delete this paragraph since it is confusing, is not Hannes> relevant for the work we are doing, and does not relate to Hannes> the previous paragraph either. How is this not relevant? GSS-EAP implementations are required to provide gss_pseudo_random. Hannes> Ciao Hannes Hannes> _______________________________________________ abfab Hannes> mailing list abfab@ietf.org Hannes> https://www.ietf.org/mailman/listinfo/abfab
- [abfab] draft-ietf-abfab-arch-03.txt - GSS Hannes Tschofenig
- Re: [abfab] draft-ietf-abfab-arch-03.txt - GSS Sam Hartman
- Re: [abfab] draft-ietf-abfab-arch-03.txt - GSS Hannes Tschofenig