Re: [abfab] Comments on draft-smith-abfab-usability-ui-considerations-03

"Jim Schaad" <ietf@augustcellars.com> Wed, 25 September 2013 18:47 UTC

Return-Path: <ietf@augustcellars.com>
X-Original-To: abfab@ietfa.amsl.com
Delivered-To: abfab@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9D00A21F9AEF for <abfab@ietfa.amsl.com>; Wed, 25 Sep 2013 11:47:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[AWL=1.701, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id i7ZlVbwgNuaO for <abfab@ietfa.amsl.com>; Wed, 25 Sep 2013 11:47:39 -0700 (PDT)
Received: from smtp3.pacifier.net (smtp3.pacifier.net [64.255.237.177]) by ietfa.amsl.com (Postfix) with ESMTP id 40F5521F9DCE for <abfab@ietf.org>; Wed, 25 Sep 2013 11:47:37 -0700 (PDT)
Received: from Philemon (winery.augustcellars.com [206.212.239.129]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: jimsch@nwlink.com) by smtp3.pacifier.net (Postfix) with ESMTPSA id B6A1938F1C; Wed, 25 Sep 2013 11:47:35 -0700 (PDT)
From: Jim Schaad <ietf@augustcellars.com>
To: 'Rhys Smith' <Smith@cardiff.ac.uk>
References: <03a101ce16a9$ab322f40$01968dc0$@augustcellars.com> <4AD53B48-7169-49D6-A369-BE8F2585FBC1@cardiff.ac.uk>
In-Reply-To: <4AD53B48-7169-49D6-A369-BE8F2585FBC1@cardiff.ac.uk>
Date: Wed, 25 Sep 2013 11:46:23 -0700
Message-ID: <078a01ceba1f$88db0290$9a9107b0$@augustcellars.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQLM8fOCqCt8Rw0e/ik6boRv4/sYtwHtjyV9l8rszVA=
Content-Language: en-us
Cc: abfab@ietf.org
Subject: Re: [abfab] Comments on draft-smith-abfab-usability-ui-considerations-03
X-BeenThere: abfab@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Application Bridging, Federated Authentication Beyond \(the web\)" <abfab.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/abfab>, <mailto:abfab-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/abfab>
List-Post: <mailto:abfab@ietf.org>
List-Help: <mailto:abfab-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/abfab>, <mailto:abfab-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Sep 2013 18:47:45 -0000

You really expect me to remember after this long?

> -----Original Message-----
> From: Rhys Smith [mailto:Smith@cardiff.ac.uk]
> Sent: Wednesday, September 25, 2013 10:31 AM
> To: Jim Schaad
> Cc: abfab@ietf.org
> Subject: Re: Comments on draft-smith-abfab-usability-ui-considerations-03
> 
> Jim, all,
> 
> Assume all points addressed in -04 to be submitted shortly, apart from
those I
> have specific comments about below:
> 
> 
> On 1 Mar 2013, at 19:21, Jim Schaad <ietf@augustcellars.com> wrote:
> > 6.  Section 6.1 - Is the issuing organization always going to be
> > derivable from the NAI of the user?  Under what circumstances would
> > this not be the case?
> 
> Actually, I don't think this is needed at all. If we're saying that we
MUST store
> an NAI, then that contains both the username and realm to use for
identifying
> the particular IdP. And then the friendly name for the identity would be
the
> place to store a human-friendly name (e.g. Janet or Cardiff University).
> 
> 
> 
> 
> > 10 Section 7 - Identity selection by calling application rather than
> > GSS-API
> 
> Sorry, not sure what part of Section 7 this comment is referring to?
> 

My best guess as to what I meant here, is that there should be a discussion
about the application that is requesting a server either be able to provide
its own mapping, rather than using the GSS-API internals for doing the
mapping.  Or that it should be able to do some filtering of the identities
that are displayed.

> 
> > 11 Section 7 - last paragraph - last sentence - should this be an
> > "automatic" option on some types of authentication failures?
> 
> Good point. I've removed discussion of it being manual at all in that
para, and
> amended section 7.4 to include the idea of manual and automated
> disassociation.
> 
> 
> > 12.  Section 7.3 - why should the association only be doable after
> > authentication?  Esp for manual authentications.
> 
> I think it's advisable that this would be the case as it would make
interacting
> with the user easier if the attempt failed, as it could happen JIT as the
user
> attempts to make the connection. If they'd previously made it and, say,
only
> tried to actually use that service weeks later, it would be less obvious
to the
> user as to what the problem might be, I think. I've changed the language
> though so as to not rule that out.
> 
> 
> > 13.  Section 7.3.1 - It would be beneficial to list the types of
> > things that are selections.  I don't know that it is necessary to know
> > the realm in all cases.
> 
> Do we know what these things would be?
> 
> Actually, wouldn't it just be the GSS Acceptor Name of the service?

Yes, but it would be the full name with all of its parameters and just the
name of the machine plus the service name.

> 
> 
> > 15.  Section 8 - should applications attempt to use multiple names if
> > there are multiple names associated with the service.  Need to discuss
> > possible privacy implications of this approach in terms of association
> > of multiple names together.
> 
> Sorry, not sure what this is referring to in sec 8? or is this suggesting
a new
> topic that should be in the error handling section?

This was triggered in my mind on handling of errors, but it might not belong
in this section.

Consider the case where I have two distinct identities associated with the
generic smtp service (i.e. not associated with any server name).  Is there a
privacy concern about providing the first one if it fails but the second one
works.  Should the use be told that which of the two succeeded or should
that be a hidden error?

Jim

> 
> 
> Best,
> Rhys.
> --
> Dr Rhys Smith
> Identity, Access, and Middleware Specialist Cardiff University & Janet -
the
> UK's research and education network
> 
> email: smith@cardiff.ac.uk / rhys.smith@ja.net
> GPG: 0xDE2F024C