Re: [Ace] Agenda

Likepeng <likepeng@huawei.com> Tue, 15 July 2014 00:40 UTC

Return-Path: <likepeng@huawei.com>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A0BA81B27CF for <ace@ietfa.amsl.com>; Mon, 14 Jul 2014 17:40:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.852
X-Spam-Level:
X-Spam-Status: No, score=-3.852 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, J_BACKHAIR_22=1, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.651, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TFldXTO_ibXx for <ace@ietfa.amsl.com>; Mon, 14 Jul 2014 17:40:02 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E329A1B27C5 for <ace@ietf.org>; Mon, 14 Jul 2014 17:40:01 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml401-hub.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id BHE64087; Tue, 15 Jul 2014 00:40:00 +0000 (GMT)
Received: from SZXEMA409-HUB.china.huawei.com (10.82.72.41) by lhreml401-hub.china.huawei.com (10.201.5.240) with Microsoft SMTP Server (TLS) id 14.3.158.1; Tue, 15 Jul 2014 01:39:59 +0100
Received: from SZXEMA501-MBS.china.huawei.com ([169.254.2.128]) by SZXEMA409-HUB.china.huawei.com ([10.82.72.41]) with mapi id 14.03.0158.001; Tue, 15 Jul 2014 08:39:52 +0800
From: Likepeng <likepeng@huawei.com>
To: Ludwig Seitz <ludwig@sics.se>, "ace@ietf.org" <ace@ietf.org>
Thread-Topic: [Ace] Agenda
Thread-Index: AQHPn0An/g57BwoFQUmznqbDcdEHpJue/WCAgAFNU3A=
Date: Tue, 15 Jul 2014 00:39:51 +0000
Message-ID: <34966E97BE8AD64EAE9D3D6E4DEE36F258177D9A@SZXEMA501-MBS.china.huawei.com>
References: <53C398ED.3030302@gmx.net> <53C3D013.6030006@sics.se>
In-Reply-To: <53C3D013.6030006@sics.se>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.66.167.122]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: http://mailarchive.ietf.org/arch/msg/ace/B6XsIa1klZA-LLsWwGO0vEtXr0E
Subject: Re: [Ace] Agenda
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Jul 2014 00:40:04 -0000

> What do you mean with the "OAuth/Kerberos design pattern"? Is that the
> Client, RS, AS architecture?

Yes.

> I think this question (3c) is too generic. If we ask like that, we will just reiterate
> the discussions currently ongoing on the DICE list (see the "Tyranny of the
> Lightswitch" thread).

We can go a little bit further:
- long-term key established between the client and the authorization server
- long-term key established between the authorization server and the resource server
- short term key established between the client and the resource server

Also we need to talk about performance, size, .... and other considerations.

Kind Regards
Kepeng

> -----邮件原件-----
> 发件人: Ace [mailto:ace-bounces@ietf.org] 代表 Ludwig Seitz
> 发送时间: 2014年7月14日 20:42
> 收件人: ace@ietf.org
> 主题: Re: [Ace] Agenda
> 
> Hi Hannes,
> 
> just some requests for clarification. See inline.
> 
> /Ludwig
> 
> On 07/14/2014 10:46 AM, Hannes Tschofenig wrote:
> [...]
> > Authentication and Authorization for Constrained Environments (ACE)
> >
> > WEDNESDAY, July 23, 2014
> >
> > 0900-1130 EDT
> > Tudor 7/8 (MM)
> >
> > - Welcome & Agenda Bashing (Chairs, 10 mins)
> >
> > - ACE Introduction (Chairs, 10 mins)
> >
> > Since this is the first meeting of the working group we would like to
> > give a brief description the high level goal of the group. This part
> > of the agenda should also help you to become familiar with the terminology.
> >
> > - Design Directions
> >
> > We want to spend the main meeting time to answer a couple of
> > challenging questions.
> > Our hope is it to get answers to some of these questions during the
> > meeting or in preparation of the meeting.
> >
> > 1) Problem Description
> >
> > 1a) Client <-> RS Communication: What transport should be used?
> > 1b) What degree of flexibility should we aim for? DTLS or application
> > layer security?
> 
> What do you mean with "What transport should be used?" Is that the DTLS vs
> Object Security discussion?
> 
> >
> > [[Relevant document: draft-seitz-ace-problem-description-01]]
> >
> > Discussion Leader: Ludwig (to-be-confirmed)
> >
> > 2) Design Patterns
> >
> > 2a) Is the OAuth/Kerberos design pattern sufficient?
> > (does it cover all the use cases)
> > 2b) Is the OAUTH/Kerberos design pattern necessary?
> > (can we throw something away?)
> >
> > [[Relevant document: draft-seitz-ace-usecases-01]]
> >
> > Discussion Leader: Ludwig (to-be-confirmed)
> >
> 
> What do you mean with the "OAuth/Kerberos design pattern"? Is that the
> Client, RS, AS architecture? Does it include the authorization push sequence or
> could it be any other (pull or agent)?
> 
> 
> > 3) Design Considerations
> >
> > 3a) What design components could we re-use?
> > 3b) What areas need to be explored in more detail?
> >
> > Example topics:
> >
> >    * RS<->AS Communication: In scope / out of scope?
> >    * Protocol re-use: what's good and what's not?
> >    * Message encoding: Base64, JSON, ASN.1, CBOR
> >
> > 3c) Should the design be based on symmetric or asymmetric crypto?
> >    (or both?)
> 
> I think this question (3c) is too generic. If we ask like that, we will just reiterate
> the discussions currently ongoing on the DICE list (see the "Tyranny of the
> Lightswitch" thread).
> 
> We should really try to get input on what is likely to be supported by
> manufacturers of mass market IoT hardware.
> 
> 
> /Ludwig
> 
> 
> 
> --
> Ludwig Seitz, PhD
> SICS Swedish ICT AB
> Ideon Science Park
> Building Beta 2
> Scheelevägen 17
> SE-223 70 Lund
> 
> Phone +46(0)70-349 92 51
> http://www.sics.se