Re: [Ace] draft-ietf-ace-oauth-authz
Jim Schaad <ietf@augustcellars.com> Tue, 05 May 2020 04:55 UTC
Return-Path: <ietf@augustcellars.com>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 61E243A13D3 for <ace@ietfa.amsl.com>; Mon, 4 May 2020 21:55:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IeUOLpQiEXYa for <ace@ietfa.amsl.com>; Mon, 4 May 2020 21:55:08 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 345A03A13B9 for <ace@ietf.org>; Mon, 4 May 2020 21:55:07 -0700 (PDT)
Received: from Jude (73.180.8.170) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Mon, 4 May 2020 21:55:02 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'Benjamin Kaduk' <kaduk@mit.edu>, 'Olaf Bergmann' <bergmann@tzi.org>
CC: 'Peter van der Stok' <stokcons@bbhmail.nl>, consultancy@vanderstok.org, 'Ace' <ace@ietf.org>
References: <56d31e581571721e176b59db20e08c23@bbhmail.nl> <00f101d61f03$a26bb920$e7432b60$@augustcellars.com> <0873a3115cab89036002cf42b1c97608@bbhmail.nl> <87mu6o6u8t.fsf@wangari> <20200505040917.GM27494@kduck.mit.edu>
In-Reply-To: <20200505040917.GM27494@kduck.mit.edu>
Date: Mon, 04 May 2020 21:54:59 -0700
Message-ID: <02f001d62299$56718830$03549890$@augustcellars.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQJvvEQrX2wOjMB2/s9A8vau6YKJYgFtua5lAwDjVtQCw58eHwIqARfCpxrXnpA=
Content-Language: en-us
X-Originating-IP: [73.180.8.170]
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/BPg8ngJ_CfdCv6v1Oa2FMo8v9WQ>
Subject: Re: [Ace] draft-ietf-ace-oauth-authz
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 May 2020 04:55:11 -0000
I have much the same problem. While a client could find an AS which would authenticate the client, I don't know how the client would establish any degree of trust in the AS which is going to give it tokens. If you have already put a local public key for the AS into the client, then you might as well put in a name for the AS as well. I suppose you could get by with a shared secret but that does not seem to be a good way to build up the system. Jim -----Original Message----- From: Benjamin Kaduk <kaduk@mit.edu> Sent: Monday, May 4, 2020 9:09 PM To: Olaf Bergmann <bergmann@tzi.org> Cc: Peter van der Stok <stokcons@bbhmail.nl>; Jim Schaad <ietf@augustcellars.com>; consultancy@vanderstok.org; 'Ace' <ace@ietf.org> Subject: Re: [Ace] draft-ietf-ace-oauth-authz On Mon, May 04, 2020 at 09:21:06AM +0200, Olaf Bergmann wrote: > Hi Peter, > > Peter van der Stok <stokcons@bbhmail.nl> writes: > > > When I want to access an OCF device I can find its IP address > > through service discovery (rfc7252 section 7) using an rt-value > > registered at the IANA core parameters registry. For example, when > > I want to initialize the AS I have to type in the IP address of the > > AS. From that moment on keys and certificates can be compared to > > continue initialization. > > > > Using service discovery can automate that process. > > > > My request is that authz draft registers an rt-value in core > > parameters registry for service discovery of the AS, unless a > > different process has already been established for AS initialization. > > That is exaclty what originally has been done in section 9 of > draft-gerdes-ace-dcaf-authorize [1]. Somehow, this got lost in the > process. I think I'm still a little confused as to what good being able to "discover" that the network says something is an AS is, without some prior trust and/or key material for that AS. How would the necessary trust be established as part of such a discovery scheme? Thanks, Ben
- [Ace] draft-ietf-ace-oauth-authz Peter van der Stok
- Re: [Ace] draft-ietf-ace-oauth-authz Jim Schaad
- Re: [Ace] draft-ietf-ace-oauth-authz Peter van der Stok
- Re: [Ace] draft-ietf-ace-oauth-authz Seitz Ludwig
- Re: [Ace] draft-ietf-ace-oauth-authz Carsten Bormann
- Re: [Ace] draft-ietf-ace-oauth-authz Peter van der Stok
- Re: [Ace] draft-ietf-ace-oauth-authz Olaf Bergmann
- Re: [Ace] draft-ietf-ace-oauth-authz Seitz Ludwig
- Re: [Ace] draft-ietf-ace-oauth-authz Benjamin Kaduk
- Re: [Ace] draft-ietf-ace-oauth-authz Jim Schaad
- Re: [Ace] draft-ietf-ace-oauth-authz Carsten Bormann
- Re: [Ace] draft-ietf-ace-oauth-authz Peter van der Stok
- Re: [Ace] draft-ietf-ace-oauth-authz Jim Schaad
- Re: [Ace] draft-ietf-ace-oauth-authz Jim Schaad
- Re: [Ace] draft-ietf-ace-oauth-authz Peter van der Stok
- Re: [Ace] draft-ietf-ace-oauth-authz Michael Richardson
- Re: [Ace] draft-ietf-ace-oauth-authz Jim Schaad
- Re: [Ace] draft-ietf-ace-oauth-authz Carsten Bormann
- Re: [Ace] draft-ietf-ace-oauth-authz Michael Richardson