Re: [Ace] draft-gerdes-ace-actors

Göran Selander <goran.selander@ericsson.com> Sun, 19 July 2015 14:54 UTC

Return-Path: <goran.selander@ericsson.com>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D5C271AD351 for <ace@ietfa.amsl.com>; Sun, 19 Jul 2015 07:54:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.901
X-Spam-Level:
X-Spam-Status: No, score=-3.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SXdEpkJduAVS for <ace@ietfa.amsl.com>; Sun, 19 Jul 2015 07:53:58 -0700 (PDT)
Received: from sessmg23.ericsson.net (sessmg23.ericsson.net [193.180.251.45]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 03D031AD359 for <ace@ietf.org>; Sun, 19 Jul 2015 07:53:57 -0700 (PDT)
X-AuditID: c1b4fb2d-f79176d00000321c-e3-55abba047032
Received: from ESESSHC005.ericsson.se (Unknown_Domain [153.88.253.124]) by sessmg23.ericsson.net (Symantec Mail Security) with SMTP id E3.BD.12828.40ABBA55; Sun, 19 Jul 2015 16:53:56 +0200 (CEST)
Received: from ESESSMB303.ericsson.se ([169.254.3.149]) by ESESSHC005.ericsson.se ([153.88.183.33]) with mapi id 14.03.0210.002; Sun, 19 Jul 2015 16:53:55 +0200
From: Göran Selander <goran.selander@ericsson.com>
To: Jim Schaad <ietf@augustcellars.com>, "draft-gerdes-ace-actors@tools.ietf.org" <draft-gerdes-ace-actors@tools.ietf.org>, "ace@ietf.org" <ace@ietf.org>
Thread-Topic: [Ace] draft-gerdes-ace-actors
Thread-Index: AdDAdsHOyEiElwvbSheqRuDBgdnZgABu/l4A
Date: Sun, 19 Jul 2015 14:53:55 +0000
Message-ID: <D1D16825.3186C%goran.selander@ericsson.com>
References: <01b001d0c214$fe3bf0e0$fab3d2a0$@augustcellars.com>
In-Reply-To: <01b001d0c214$fe3bf0e0$fab3d2a0$@augustcellars.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.4.7.141117
x-originating-ip: [153.88.183.150]
Content-Type: text/plain; charset="utf-8"
Content-ID: <7A74521C4BC1DA45BD5E47F201BB7E87@ericsson.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFupjkeLIzCtJLcpLzFFi42KZGfG3Rpdl1+pQg3sfRSy+f+thtjhychqr xerp39kcmD02zpnO5rFkyU8mjy+XP7MFMEdx2aSk5mSWpRbp2yVwZfRNnsNScMaxYtLuiAbG L/ZdjJwcEgImElvvdjND2GISF+6tZ+ti5OIQEjjKKHH68EdGCGcJo8TEz49YQKrYBFwkHjQ8 YgJJiAjMZZQ43vafFSQhLKAlsWrpVyYQW0RAW+LBurfMELaRxKY1Z8GaWQRUJR4cfMsIYvMK WEjsfH8CrF5IwF5izrOlYHM4BRwkFn28xw5iMwKd9P3UGrAaZgFxiVtP5jNBnCogsWTPeaiz RSVePv4H1isqoCex8noTG0RcSWLF9ktAuziAejUl1u/ShxhjLTFj2jJWCFtRYkr3Q3aIcwQl Ts58wjKBUXwWkm2zELpnIemehaR7FpLuBYysqxhFi1OLi3PTjYz1Uosyk4uL8/P08lJLNjEC I/Dglt+6OxhXv3Y8xCjAwajEw7uAZXWoEGtiWXFl7iFGaQ4WJXHeGZvzQoUE0hNLUrNTUwtS i+KLSnNSiw8xMnFwSjUwSsupSy2+L8Cc/3/5DZXDqv0L60p7TKbxKNpExTGdvuXSaCeqeaqX N2mrwLfVwk3XZ3321tGwcBFctGaaz4O5Ta1NtRFnJhV6pofM2lk23TLDqUvhVNZHmUXX7h44 HRFaGFo7lePMJU790EZjpwYHz8WLN7O8Kvy1LOFHQv6nLYzzjbqtU/4psRRnJBpqMRcVJwIA Codz5qECAAA=
Archived-At: <http://mailarchive.ietf.org/arch/msg/ace/hL3tlC_vq5qM55wwRRW_BrP3q4o>
Subject: Re: [Ace] draft-gerdes-ace-actors
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 19 Jul 2015 14:54:01 -0000

Jim, thanks for reviewing, some first comments below.

On 2015-07-19 13:20, "Jim Schaad" <ietf@augustcellars.com> wrote:

>I have read through this draft and my first comment is - I don't
>understand
>what this draft is trying to accomplish.  My confusion begins in the
>second
>paragraph of the abstract where it says that it is providing "elements of
>an
>architecture / a problem statement".
>
>The idea of providing terminology is reasonable - although I generally
>don't
>believe that a standalone document is a good place to do so unless you are
>doing a lot of definitions.  And for the most part you just use the same
>ones as OAuth is using.   I can see providing an architecture that is
>going
>to be reasonable complete or a problem statement.  But doing just elements
>of those is not useful.  How is one to evaluate anything against it if
>just
>pieces are given but not anything representing a complete picture.

Agree. I think this draft should contain both architecture and problem
statement, to the level of detail that it becomes easy for people to
understand what this work is about.


>
>Introduction:
>
>* constrained devices are not the only ones for which ACLs are not
>sufficiently generic.  There are lots of places where doing access control
>is off-loaded from a device to another system.  Even with ACLs you need to
>discuss how authorization would be dealt with.   This statement could be
>much clearer.
>
>*  If you are going to tell me that there are security tasks that cannot
>be
>done, you need to provide a list of what security tasks you care about
>someplace so I can verify this for myself.  Also, for many of these tasks
>it
>is necessary to offload even when they can be done by the device.
>Offloading authorization is not uncommon even for larger devices.
>
>* Just saying that limitations are a problem is not generally helpful.  It
>would be better to list some of the reasons for each security task you
>care
>about.  Since people are going to need to make decisions about what things
>can and cannot be placed together and having such a list would be helpful
>in
>that regard.
>
>* Doing forward references to fulfill some of these requests is perfectly
>reasonable.
>
>Terminology:
>
>*  I am completely lost by the last sentence in this section.  It may be
>signature structure, but it is also an issue with what you are talking
>about
>for client-side authorization.

I understand what you mean. This was a topic of intense discussions during
the spring. The current draft is using “authorization" in a natural
language sense, i.e. any action that the client can be configured to do by
the CAS is considered authorization.

>
>* Should "endpoint" be part of the terminology section?

This is defined in RFC7252, so should be added to the list of terms
referenced in from that.

>
>Architecture:
>
>*  I have a problem with bullet #1 - It may be due to working in SACM and
>depends on how one defines endpoint.  However I see no reason that an
>endpoint cannot host the functionality of AS and CAS as well so this
>bullet
>is not complete.
>
>*  The term "constrained level" pops up out of the middle of nowhere -
>this
>really needs to be defined.  Perhaps this should be a section title with
>and
>introduction before you start.
>
>*  The introduction of the CSA does not seem logical if it is to help make
>requests of the RS.  This needs more justification.  I would have thought
>it
>was there to control the C and what it does with things.   This seemed to
>be
>the Objective type 2 statement from above.   If you are making it a
>support
>item, then it does not make sense either to call it an access control
>point
>or to say it is being controlled by the RqP.  It could just as easily be
>either a neutral party or the AS that is being talked to.
>
>Information Flows
>
>*  I don't understand the reason for complicating the diagram.   Having it
>be the simple version, at least at first presentation of flows, makes it
>easier to understand.  You can talk about the reflection at a later point.

The purpose of this picture was to emphasize that the endpoints can in
general host both client and server functionality, but this is already
explained in text so I agree it can be omitted.


>
>*  Why do you have information flows as one directional between CAS and C?


The main information flow, just as in the case of AS and RS, is from the
less-constrained device to the constrained device. But you are right that
in both cases there may be information flows in the reverse direction.
E.g. The RS may request the AS for an authorization decision given a
specific request from a client.


>
>Missing Architecture issues
>
>* Why do you not talk about the presence or absence of AS and CAS nodes at
>Times
>
>* Store and forward should be discussed in this document. (i.e.
>combination
>of push and pull models)

Different authorization schemes are discussed in
https://tools.ietf.org/html/draft-seitz-ace-core-authz
Are there any schemes you miss there?

>
>*  Better description of type 2 security objects needs to be undertaken -
>specifically why we would care about them.
>
>Security Objectives:
>
>*  I assume that access is also a security object that is addressed by
>authorization.
>
>*  Kill the term non-repudiation - I don't know what this means and there
>is
>not a great deal of agreement on its meaning.
>
> * You absolutely need some measure of authentication involved.  The
>paragraph 2 needs have a cleaner start that what it does.  You really need
>to talk about authentication, are you authenticating the device or are you
>authentication any device (or some set of devices) that are owned by
>somebody.  These are different authentication models.

Does section 7.2 address your questions?

>
>****
>
>I am tired and going to stop at this point.
>
>Jim
>
>
>
>_______________________________________________
>Ace mailing list
>Ace@ietf.org
>https://www.ietf.org/mailman/listinfo/ace