Re: [abfab] draft-ietf-abfab-arch-03.txt - GSS

Sam Hartman <hartmans@painless-security.com> Thu, 16 August 2012 13:00 UTC

Return-Path: <hartmans@painless-security.com>
X-Original-To: abfab@ietfa.amsl.com
Delivered-To: abfab@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A166121F84D5 for <abfab@ietfa.amsl.com>; Thu, 16 Aug 2012 06:00:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 4.187
X-Spam-Level: ****
X-Spam-Status: No, score=4.187 tagged_above=-999 required=5 tests=[AWL=-0.101, BAYES_00=-2.599, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_IPADDR=2.426, RDNS_DYNAMIC=0.1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id izjLD3fpDIQ4 for <abfab@ietfa.amsl.com>; Thu, 16 Aug 2012 06:00:55 -0700 (PDT)
Received: from ec2-23-21-227-93.compute-1.amazonaws.com (ec2-23-21-227-93.compute-1.amazonaws.com [23.21.227.93]) by ietfa.amsl.com (Postfix) with ESMTP id 34AFB21F851A for <abfab@ietf.org>; Thu, 16 Aug 2012 06:00:53 -0700 (PDT)
Received: from carter-zimmerman.suchdamage.org (c-98-217-126-210.hsd1.ma.comcast.net [98.217.126.210]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (Client CN "laptop", Issuer "laptop" (not verified)) by mail.suchdamage.org (Postfix) with ESMTPS id 3B72420862; Thu, 16 Aug 2012 08:35:14 -0400 (EDT)
Received: by carter-zimmerman.suchdamage.org (Postfix, from userid 8042) id B8D2B4350; Thu, 16 Aug 2012 08:35:07 -0400 (EDT)
From: Sam Hartman <hartmans@painless-security.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
References: <57E38F60-AF22-472B-92C3-1FC22EFEE5E1@gmx.net>
Date: Thu, 16 Aug 2012 08:35:07 -0400
In-Reply-To: <57E38F60-AF22-472B-92C3-1FC22EFEE5E1@gmx.net> (Hannes Tschofenig's message of "Thu, 16 Aug 2012 10:08:41 +0300")
Message-ID: <tsl393n9fr8.fsf@mit.edu>
User-Agent: Gnus/5.110009 (No Gnus v0.9) Emacs/22.3 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Cc: Jim Schaad <ietf@augustcellars.com>, abfab@ietf.org
Subject: Re: [abfab] draft-ietf-abfab-arch-03.txt - GSS
X-BeenThere: abfab@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Application Bridging, Federated Authentication Beyond \(the web\)" <abfab.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/abfab>, <mailto:abfab-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/abfab>
List-Post: <mailto:abfab@ietf.org>
List-Help: <mailto:abfab-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/abfab>, <mailto:abfab-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Aug 2012 13:00:55 -0000

>>>>> "Hannes" == Hannes Tschofenig <hannes.tschofenig@gmx.net> writes:

    Hannes> Section 3.2:

    Hannes>    However there are a variety of situations where this
    Hannes> authentication is not checked for policy or usability
    Hannes> reasons.
   
    Hannes> We cannot make the assumption that the software does not do
    Hannes> authentication or check the result of the authentication
    Hannes> process since then the entire security solution does not
    Hannes> work anymore. 

Section 3.2 is all about providing alternatives when this check is not
done.
This check is not done in practice a *lot*. There are lots of
application libraries that do not check server certificates.


Actually the TLS channel bindings have been designed with a couple of
strategies for dealing with load balancers and in general for allowing a
server to securly indicate that it cannot provide channel bindings
and so server certs are all you get.
    Hannes> consistent with the GSS-API specification.  XXXThere is an
    Hannes> open question here as to the details; today RFC 5554
    Hannes> governs.  We could use that and the current draft assumes we
    Hannes> will.  However in Beijing we became aware of some changes to
    Hannes> these details that would make life much better for GSS
    Hannes> authentication of HTTP.  We should resolve this with kitten
    Hannes> and replace this note with a reference to the spec we're
    Hannes> actually following.

    Hannes> Regarding the inline note have we come to a conclusion about
    Hannes> this issue already?

Yeah, we're just using the existing stuff.
Nothing new has materialized in the IETF.

    Hannes> Section 3.3:

    Hannes>    GSS-API provides a pseudo-random function.  While the
    Hannes> pseudo-random function does not involve sending data over
    Hannes> the wire, it provides an algorithm that both the initiator
    Hannes> and acceptor can run in order to arrive at the same key
    Hannes> value.  This is useful for designs where a successful
    Hannes> authentication is used to key some other function.  This is
    Hannes> similar in concept to the TLS extractor.  No current IETF
    Hannes> protocols require this.  However GSS-EAP supports this
    Hannes> service because it is valuable for the future and easy to do
    Hannes> given per- message services.  Non-IETF protocols are
    Hannes> expected to take advantage of this in the near future.


    Hannes> I would delete this paragraph since it is confusing, is not
    Hannes> relevant for the work we are doing, and does not relate to
    Hannes> the previous paragraph either.

How is this not relevant?
GSS-EAP implementations are required to provide gss_pseudo_random.


    Hannes>  Ciao Hannes

    Hannes> _______________________________________________ abfab
    Hannes> mailing list abfab@ietf.org
    Hannes> https://www.ietf.org/mailman/listinfo/abfab