Re: [Ace] Offline operation of Resource Server

Michael Richardson <mcr+ietf@sandelman.ca> Tue, 15 July 2014 15:27 UTC

Return-Path: <mcr@sandelman.ca>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4CD371A04CD for <ace@ietfa.amsl.com>; Tue, 15 Jul 2014 08:27:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.542
X-Spam-Level:
X-Spam-Status: No, score=-2.542 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.651, SPF_PASS=-0.001, T_TVD_MIME_NO_HEADERS=0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id isSZPvvcxIj7 for <ace@ietfa.amsl.com>; Tue, 15 Jul 2014 08:27:23 -0700 (PDT)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [IPv6:2607:f0b0:f:3:216:3eff:fe7c:d1f3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3B5011B2878 for <ace@ietf.org>; Tue, 15 Jul 2014 08:27:17 -0700 (PDT)
Received: from sandelman.ca (obiwan.sandelman.ca [IPv6:2607:f0b0:f:2::247]) by tuna.sandelman.ca (Postfix) with ESMTP id 5A6B720028; Tue, 15 Jul 2014 11:28:29 -0400 (EDT)
Received: by sandelman.ca (Postfix, from userid 179) id F27FE63B0E; Tue, 15 Jul 2014 11:27:14 -0400 (EDT)
Received: from sandelman.ca (localhost [127.0.0.1]) by sandelman.ca (Postfix) with ESMTP id E29C863AED; Tue, 15 Jul 2014 11:27:14 -0400 (EDT)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: Rafa Marin Lopez <rafa@um.es>
In-Reply-To: <191F7113-E5ED-49A2-AC27-AA886D527FB1@um.es>
References: <53C3C09A.5090707@gmx.net> <14018.1405360899@sandelman.ca> <53C42703.4060806@gmx.net> <8236.1405368736@sandelman.ca> <53C4C082.3020909@sics.se> <191F7113-E5ED-49A2-AC27-AA886D527FB1@um.es>
X-Mailer: MH-E 8.2; nmh 1.3-dev; GNU Emacs 23.4.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha1"; protocol="application/pgp-signature"
Date: Tue, 15 Jul 2014 11:27:14 -0400
Message-ID: <18172.1405438034@sandelman.ca>
Sender: mcr@sandelman.ca
Archived-At: http://mailarchive.ietf.org/arch/msg/ace/SRp_IKBEeO45HMbB2LPcJ_NmPv4
Cc: Ludwig Seitz <ludwig@sics.se>, ace@ietf.org
Subject: Re: [Ace] Offline operation of Resource Server
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Jul 2014 15:27:39 -0000
X-List-Received-Date: Tue, 15 Jul 2014 15:27:39 -0000

Rafa Marin Lopez <rafa@um.es> wrote:
    > That is possible if during the EAP/AAA interactions there is a
    > bootstrapping of some short term credential (e.g. Kerberos
    > tickets). For example, if we talk in Kerberos terminology, the

Please don't build in any assumption in your thinking that the resulting
ticket is short term.  Some may wish it; but for many applications we are
talking about tickets that either never expire, or have expirations times
decades in the future.

Josh Howlett <Josh.Howlett@ja.net> wrote:
    >> So, in summary, there could be an online enrollment and online
    >> authorization decision based on EAP/AAA that allows to bootstrap
    >> "something" that enables RS and C to have an offline interaction during a
    >> period of time (e.g. ticket lifetime).

    > Just by way of example, another "something" that could be bootstrapped
    > by EAP/AAA (as an alternative or complement to a Kerberos ticket) could
    > be a certificate. There is also running code demonstrating this.

Yes; exactly.  The certificate could contain Authorization Attributes rather
than identities.  Anyone who hasn't read rfc2692 and rfc2693 lately, should
do so.

Just think of the kerberos-like symmetric key token as being a certificate
that can only be validated by the originator.

--
Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
 -= IPv6 IoT consulting =-