Re: [abfab] Review of draft-ietf-abfab-aaa-saml-10
"Jim Schaad" <ietf@augustcellars.com> Thu, 19 February 2015 19:13 UTC
Return-Path: <ietf@augustcellars.com>
X-Original-To: abfab@ietfa.amsl.com
Delivered-To: abfab@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 5AE4A1A00A7
for <abfab@ietfa.amsl.com>; Thu, 19 Feb 2015 11:13:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id OpElmkDtzJHk for <abfab@ietfa.amsl.com>;
Thu, 19 Feb 2015 11:13:44 -0800 (PST)
Received: from smtp3.pacifier.net (smtp3.pacifier.net [64.255.237.177])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id F35AA1A00A8
for <abfab@ietf.org>; Thu, 19 Feb 2015 11:13:41 -0800 (PST)
Received: from Philemon (96-41-163-75.dhcp.mdfd.or.charter.com [96.41.163.75])
(using TLSv1 with cipher AES256-SHA (256/256 bits))
(No client certificate requested)
(Authenticated sender: jimsch@nwlink.com)
by smtp3.pacifier.net (Postfix) with ESMTPSA id 40CEE38F57;
Thu, 19 Feb 2015 11:13:41 -0800 (PST)
From: "Jim Schaad" <ietf@augustcellars.com>
To: "'Alejandro Perez Mendez'" <alex@um.es>,
<abfab@ietf.org>
References: <tsloaosrw4v.fsf@mit.edu> <54E59831.10108@um.es>
In-Reply-To: <54E59831.10108@um.es>
Date: Thu, 19 Feb 2015 11:12:09 -0800
Message-ID: <021601d04c78$0e91b140$2bb513c0$@augustcellars.com>
MIME-Version: 1.0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 14.0
thread-index: AQJZq/H8Ui9x/9Wg310zZknKKkTVXQD7W0kKm928GwA=
Content-Language: en-us
Archived-At: <http://mailarchive.ietf.org/arch/msg/abfab/Anwk-P5GSWaImc-MZ_2yRU_SlE8>
Subject: Re: [abfab] Review of draft-ietf-abfab-aaa-saml-10
X-BeenThere: abfab@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Application Bridging,
Federated Authentication Beyond \(the web\)" <abfab.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/abfab>,
<mailto:abfab-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/abfab/>
List-Post: <mailto:abfab@ietf.org>
List-Help: <mailto:abfab-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/abfab>,
<mailto:abfab-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Feb 2015 19:13:46 -0000
> -----Original Message----- > From: abfab [mailto:abfab-bounces@ietf.org] On Behalf Of Alejandro Perez > Mendez > Sent: Thursday, February 19, 2015 12:01 AM > To: abfab@ietf.org > Subject: Re: [abfab] Review of draft-ietf-abfab-aaa-saml-10 > > Hi Sam, > > thanks for the review. See my comments below. > > El 17/02/15 a las 23:49, Sam Hartman escribió: > > > > Section 4: > > > > I thought we were going to make RADIUS over TLS a MUST not a SHOULD. > > Current text says recommended. > > Whereas version -09 stated once (in section 5.2) that the use of TLS was > REQUIRED, along the rest of text it indicated several times this support as > RECOMMENDED (sections 7.4.5, 8.3.2, and 10). I just homogenized them to > the prevailing one. > > Nevertheless, I think that making TLS a MUST might be limiting. There might > be some use case scenarios for this profile where using TLS is not actually > required (e.g. other security mechanisms apply). I would see that kind of > requirement more for the ABFAB architecture level than for this I-D level. > Moreover, in the saml-profiles-2.0-os document, the use of TLS is indicated > as RECOMMENDED. > > > > > Section 6.3.3: > > > > I would like to state for the record that I believe interlinking the > > SAML and EAP authentications to permit the SAML request to affect > > things like TLS resumption and authentication freshness is > > problematic and will lead to implementation failures (or simply be ignored). > > > > I would prefer we not take that approach. However the sense of the > > room was against me when this was last discussed. > > I do think an explicit consensus call by chairs if we have not already > > made such a call would be valuable. I expect that it's likely I'm in > > the rough. > > I'm ok with such a call, but I'd like to know more about the problems you > would expect. > As I see it, if the IdP cannot/won't address the constraints called in the > AuthnRequest message, it MUST (SHOULD perhaps?) generate an > authentication error. If we don't make TLS a MUST, then we probably need to strengthen the privacy considerations to talk about the fact that eavesdroppers on the wire will be able to get to the contents of the SAML statements being made. It is not just an issue of RADIUS Proxies. In any event I don't know how this can be enforced for anything but the first and last steps in a multi-proxy world. This probably also needs to be stressed. > > > > > > Section 6.4.3: > > > > o Assume that the Client's identifier implied by a SAML <Subject> > > element, if present, takes precedence over an identifier > > implied > > by the RADIUS User-Name attribute. > > > > > > *what*?! This flies in the face of 4.3.1. > > This section is dealing with the Client's identifier (Subject), whereas > 4.3.1 deals with names of the AAA entities (i.e. RP and IdP, related with > Issuer and Recipient at the SAML level). Hence, I don't think section 6.4.3 has > a direct impact on what 4.3.1 says. > > > > > > > This draft still does not provide a mechanism to meet the conditions > > specified in section 4.3.2. In particular, we don't describe how to > > embed AAA names in requests, responses or metadata. > > You're right. I think we should focus on representing this information in the > metadata, which is controlled by the recipient, rather than on the > information on the wire, which might have been forged by the sender. Why do you not think that the NAI name form is sufficient for this purpose? > > Regards, > Alejandro > > > > > --Sam > > > > _______________________________________________ > > abfab mailing list > > abfab@ietf.org > > https://www.ietf.org/mailman/listinfo/abfab > > _______________________________________________ > abfab mailing list > abfab@ietf.org > https://www.ietf.org/mailman/listinfo/abfab
- [abfab] Review of draft-ietf-abfab-aaa-saml-10 Sam Hartman
- Re: [abfab] Review of draft-ietf-abfab-aaa-saml-10 Alejandro Perez Mendez
- Re: [abfab] Review of draft-ietf-abfab-aaa-saml-10 Leif Johansson
- Re: [abfab] Review of draft-ietf-abfab-aaa-saml-10 Klaas Wierenga (kwiereng)
- Re: [abfab] Review of draft-ietf-abfab-aaa-saml-10 Alejandro Perez Mendez
- Re: [abfab] Review of draft-ietf-abfab-aaa-saml-10 Jim Schaad
- Re: [abfab] Review of draft-ietf-abfab-aaa-saml-10 Jim Schaad
- Re: [abfab] Review of draft-ietf-abfab-aaa-saml-10 Alejandro Perez Mendez
- Re: [abfab] Review of draft-ietf-abfab-aaa-saml-10 Alejandro Perez Mendez