Re: [Ace] Offline operation of Resource Server
Michael Richardson <mcr+ietf@sandelman.ca> Tue, 15 July 2014 15:27 UTC
Return-Path: <mcr@sandelman.ca>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4CD371A04CD for <ace@ietfa.amsl.com>; Tue, 15 Jul 2014 08:27:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.542
X-Spam-Level:
X-Spam-Status: No, score=-2.542 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.651, SPF_PASS=-0.001, T_TVD_MIME_NO_HEADERS=0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id isSZPvvcxIj7 for <ace@ietfa.amsl.com>; Tue, 15 Jul 2014 08:27:23 -0700 (PDT)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [IPv6:2607:f0b0:f:3:216:3eff:fe7c:d1f3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3B5011B2878 for <ace@ietf.org>; Tue, 15 Jul 2014 08:27:17 -0700 (PDT)
Received: from sandelman.ca (obiwan.sandelman.ca [IPv6:2607:f0b0:f:2::247]) by tuna.sandelman.ca (Postfix) with ESMTP id 5A6B720028; Tue, 15 Jul 2014 11:28:29 -0400 (EDT)
Received: by sandelman.ca (Postfix, from userid 179) id F27FE63B0E; Tue, 15 Jul 2014 11:27:14 -0400 (EDT)
Received: from sandelman.ca (localhost [127.0.0.1]) by sandelman.ca (Postfix) with ESMTP id E29C863AED; Tue, 15 Jul 2014 11:27:14 -0400 (EDT)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: Rafa Marin Lopez <rafa@um.es>
In-Reply-To: <191F7113-E5ED-49A2-AC27-AA886D527FB1@um.es>
References: <53C3C09A.5090707@gmx.net> <14018.1405360899@sandelman.ca> <53C42703.4060806@gmx.net> <8236.1405368736@sandelman.ca> <53C4C082.3020909@sics.se> <191F7113-E5ED-49A2-AC27-AA886D527FB1@um.es>
X-Mailer: MH-E 8.2; nmh 1.3-dev; GNU Emacs 23.4.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha1"; protocol="application/pgp-signature"
Date: Tue, 15 Jul 2014 11:27:14 -0400
Message-ID: <18172.1405438034@sandelman.ca>
Sender: mcr@sandelman.ca
Archived-At: http://mailarchive.ietf.org/arch/msg/ace/SRp_IKBEeO45HMbB2LPcJ_NmPv4
Cc: Ludwig Seitz <ludwig@sics.se>, ace@ietf.org
Subject: Re: [Ace] Offline operation of Resource Server
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Jul 2014 15:27:39 -0000
X-List-Received-Date: Tue, 15 Jul 2014 15:27:39 -0000
Rafa Marin Lopez <rafa@um.es> wrote: > That is possible if during the EAP/AAA interactions there is a > bootstrapping of some short term credential (e.g. Kerberos > tickets). For example, if we talk in Kerberos terminology, the Please don't build in any assumption in your thinking that the resulting ticket is short term. Some may wish it; but for many applications we are talking about tickets that either never expire, or have expirations times decades in the future. Josh Howlett <Josh.Howlett@ja.net> wrote: >> So, in summary, there could be an online enrollment and online >> authorization decision based on EAP/AAA that allows to bootstrap >> "something" that enables RS and C to have an offline interaction during a >> period of time (e.g. ticket lifetime). > Just by way of example, another "something" that could be bootstrapped > by EAP/AAA (as an alternative or complement to a Kerberos ticket) could > be a certificate. There is also running code demonstrating this. Yes; exactly. The certificate could contain Authorization Attributes rather than identities. Anyone who hasn't read rfc2692 and rfc2693 lately, should do so. Just think of the kerberos-like symmetric key token as being a certificate that can only be validated by the originator. -- Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works -= IPv6 IoT consulting =-
- [Ace] Offline operation of Resource Server Hannes Tschofenig
- Re: [Ace] Offline operation of Resource Server Josh Howlett
- Re: [Ace] Offline operation of Resource Server Hannes Tschofenig
- Re: [Ace] Offline operation of Resource Server Rafa Marin Lopez
- Re: [Ace] Offline operation of Resource Server Michael Richardson
- Re: [Ace] Offline operation of Resource Server Hannes Tschofenig
- Re: [Ace] Offline operation of Resource Server Michael Richardson
- Re: [Ace] Offline operation of Resource Server Ludwig Seitz
- Re: [Ace] Offline operation of Resource Server Göran Selander
- Re: [Ace] Offline operation of Resource Server Kumar, Sandeep
- Re: [Ace] Offline operation of Resource Server Likepeng
- Re: [Ace] Offline operation of Resource Server Ludwig Seitz
- Re: [Ace] Offline operation of Resource Server Hannes Tschofenig
- Re: [Ace] Offline operation of Resource Server Rafa Marin Lopez
- Re: [Ace] Offline operation of Resource Server Josh Howlett
- Re: [Ace] Offline operation of Resource Server Michael Richardson
- Re: [Ace] Offline operation of Resource Server Michael Richardson
- Re: [Ace] Offline operation of Resource Server Rafa Marin Lopez
- Re: [Ace] Offline operation of Resource Server Ludwig Seitz