Re: [Ace] Agenda
Likepeng <likepeng@huawei.com> Tue, 15 July 2014 00:40 UTC
Return-Path: <likepeng@huawei.com>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A0BA81B27CF for <ace@ietfa.amsl.com>; Mon, 14 Jul 2014 17:40:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.852
X-Spam-Level:
X-Spam-Status: No, score=-3.852 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, J_BACKHAIR_22=1, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.651, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TFldXTO_ibXx for <ace@ietfa.amsl.com>; Mon, 14 Jul 2014 17:40:02 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E329A1B27C5 for <ace@ietf.org>; Mon, 14 Jul 2014 17:40:01 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml401-hub.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id BHE64087; Tue, 15 Jul 2014 00:40:00 +0000 (GMT)
Received: from SZXEMA409-HUB.china.huawei.com (10.82.72.41) by lhreml401-hub.china.huawei.com (10.201.5.240) with Microsoft SMTP Server (TLS) id 14.3.158.1; Tue, 15 Jul 2014 01:39:59 +0100
Received: from SZXEMA501-MBS.china.huawei.com ([169.254.2.128]) by SZXEMA409-HUB.china.huawei.com ([10.82.72.41]) with mapi id 14.03.0158.001; Tue, 15 Jul 2014 08:39:52 +0800
From: Likepeng <likepeng@huawei.com>
To: Ludwig Seitz <ludwig@sics.se>, "ace@ietf.org" <ace@ietf.org>
Thread-Topic: [Ace] Agenda
Thread-Index: AQHPn0An/g57BwoFQUmznqbDcdEHpJue/WCAgAFNU3A=
Date: Tue, 15 Jul 2014 00:39:51 +0000
Message-ID: <34966E97BE8AD64EAE9D3D6E4DEE36F258177D9A@SZXEMA501-MBS.china.huawei.com>
References: <53C398ED.3030302@gmx.net> <53C3D013.6030006@sics.se>
In-Reply-To: <53C3D013.6030006@sics.se>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.66.167.122]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: http://mailarchive.ietf.org/arch/msg/ace/B6XsIa1klZA-LLsWwGO0vEtXr0E
Subject: Re: [Ace] Agenda
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Jul 2014 00:40:04 -0000
> What do you mean with the "OAuth/Kerberos design pattern"? Is that the > Client, RS, AS architecture? Yes. > I think this question (3c) is too generic. If we ask like that, we will just reiterate > the discussions currently ongoing on the DICE list (see the "Tyranny of the > Lightswitch" thread). We can go a little bit further: - long-term key established between the client and the authorization server - long-term key established between the authorization server and the resource server - short term key established between the client and the resource server Also we need to talk about performance, size, .... and other considerations. Kind Regards Kepeng > -----邮件原件----- > 发件人: Ace [mailto:ace-bounces@ietf.org] 代表 Ludwig Seitz > 发送时间: 2014年7月14日 20:42 > 收件人: ace@ietf.org > 主题: Re: [Ace] Agenda > > Hi Hannes, > > just some requests for clarification. See inline. > > /Ludwig > > On 07/14/2014 10:46 AM, Hannes Tschofenig wrote: > [...] > > Authentication and Authorization for Constrained Environments (ACE) > > > > WEDNESDAY, July 23, 2014 > > > > 0900-1130 EDT > > Tudor 7/8 (MM) > > > > - Welcome & Agenda Bashing (Chairs, 10 mins) > > > > - ACE Introduction (Chairs, 10 mins) > > > > Since this is the first meeting of the working group we would like to > > give a brief description the high level goal of the group. This part > > of the agenda should also help you to become familiar with the terminology. > > > > - Design Directions > > > > We want to spend the main meeting time to answer a couple of > > challenging questions. > > Our hope is it to get answers to some of these questions during the > > meeting or in preparation of the meeting. > > > > 1) Problem Description > > > > 1a) Client <-> RS Communication: What transport should be used? > > 1b) What degree of flexibility should we aim for? DTLS or application > > layer security? > > What do you mean with "What transport should be used?" Is that the DTLS vs > Object Security discussion? > > > > > [[Relevant document: draft-seitz-ace-problem-description-01]] > > > > Discussion Leader: Ludwig (to-be-confirmed) > > > > 2) Design Patterns > > > > 2a) Is the OAuth/Kerberos design pattern sufficient? > > (does it cover all the use cases) > > 2b) Is the OAUTH/Kerberos design pattern necessary? > > (can we throw something away?) > > > > [[Relevant document: draft-seitz-ace-usecases-01]] > > > > Discussion Leader: Ludwig (to-be-confirmed) > > > > What do you mean with the "OAuth/Kerberos design pattern"? Is that the > Client, RS, AS architecture? Does it include the authorization push sequence or > could it be any other (pull or agent)? > > > > 3) Design Considerations > > > > 3a) What design components could we re-use? > > 3b) What areas need to be explored in more detail? > > > > Example topics: > > > > * RS<->AS Communication: In scope / out of scope? > > * Protocol re-use: what's good and what's not? > > * Message encoding: Base64, JSON, ASN.1, CBOR > > > > 3c) Should the design be based on symmetric or asymmetric crypto? > > (or both?) > > I think this question (3c) is too generic. If we ask like that, we will just reiterate > the discussions currently ongoing on the DICE list (see the "Tyranny of the > Lightswitch" thread). > > We should really try to get input on what is likely to be supported by > manufacturers of mass market IoT hardware. > > > /Ludwig > > > > -- > Ludwig Seitz, PhD > SICS Swedish ICT AB > Ideon Science Park > Building Beta 2 > Scheelevägen 17 > SE-223 70 Lund > > Phone +46(0)70-349 92 51 > http://www.sics.se
- [Ace] Agenda Hannes Tschofenig
- Re: [Ace] Agenda Ludwig Seitz
- Re: [Ace] Agenda Kepeng Li
- Re: [Ace] Agenda Likepeng
- Re: [Ace] Agenda Hannes Tschofenig
- Re: [Ace] Agenda Ludwig Seitz
- Re: [Ace] Agenda Hannes Tschofenig
- [Ace] Agenda Kepeng Li
- Re: [Ace] Agenda Ludwig Seitz