Re: [core] application group and security group mapping

Thomas Fossati <Thomas.Fossati@arm.com> Fri, 03 July 2020 11:50 UTC

Return-Path: <Thomas.Fossati@arm.com>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C96243A0CE6; Fri, 3 Jul 2020 04:50:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=QUEUzeW4; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=QUEUzeW4
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aqXNo2m1hxJU; Fri, 3 Jul 2020 04:50:25 -0700 (PDT)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-eopbgr80079.outbound.protection.outlook.com [40.107.8.79]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 18A573A0CE5; Fri, 3 Jul 2020 04:50:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=AIS+FvgdKp//xWFrFFKreY4pWlW1NalWopDLp059w1o=; b=QUEUzeW4cl8r5IinHgShUyRczv+6IApNG17bBGgcc8nKd3sgkkXoR6COa/Q/bfWtj9Hgj92B6oij9xTl2zNHSlrlhhzXrCTLUlHvi2RkD4J8nSDafXweVXYZHyCSyIduQoRW1/Z8IjZkcAyeyCPxcyPMLexHK+zrZYQ8JaV/tyc=
Received: from AM6PR05CA0014.eurprd05.prod.outlook.com (2603:10a6:20b:2e::27) by HE1PR08MB2921.eurprd08.prod.outlook.com (2603:10a6:7:30::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3153.27; Fri, 3 Jul 2020 11:50:14 +0000
Received: from VE1EUR03FT016.eop-EUR03.prod.protection.outlook.com (2603:10a6:20b:2e:cafe::18) by AM6PR05CA0014.outlook.office365.com (2603:10a6:20b:2e::27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3153.21 via Frontend Transport; Fri, 3 Jul 2020 11:50:14 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; ietf.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;ietf.org; dmarc=bestguesspass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by VE1EUR03FT016.mail.protection.outlook.com (10.152.18.115) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3153.24 via Frontend Transport; Fri, 3 Jul 2020 11:50:14 +0000
Received: ("Tessian outbound b8ad5ab47c8c:v62"); Fri, 03 Jul 2020 11:50:13 +0000
X-CheckRecipientChecked: true
X-CR-MTA-CID: 6ccd0b32060e9b38
X-CR-MTA-TID: 64aa7808
Received: from 6a8eeaf13c6c.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 1F75DD01-DC77-41C4-B9BD-8ED7D7B662A8.1; Fri, 03 Jul 2020 11:50:08 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 6a8eeaf13c6c.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Fri, 03 Jul 2020 11:50:08 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=B58MCv3kak8SahoxxyhvSEsZUHtdAxiHZe4eiLx3r5MYo4SsL8rOPQZeAWvrY7K6Ohbqb6uibluobi1rLN7wvEd7Xyz4prDLziGjO+JVeyClD+dsTXO1ddmRNQrJEp+gtUNIYaob0vZSwgXsgVhwbyXzD7qYeMeJiGzYA7lKNe80ffEiXIzSZQ3WGHu1S2MxJR4HuEbrxWqtok8gNCdqes5BeVwEuaHabEkxiRn591dvpUttWrkpoAm1upHV+sy9PXSoG3io17I6HE4k0cLbAnYS96m0aqUAp+KFbQiXBFlH3wzOMlEyy/XqoPezoLiZBqcaX8xUgct3rVYxGDypfg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=AIS+FvgdKp//xWFrFFKreY4pWlW1NalWopDLp059w1o=; b=NOtVr9E+iICU1LNfkZIUeVeJMUeisfpcvlZYppE/PiA+8ESDn5URQfP2sMX37SUtsA639ggRi8nAb4Yg71jQd28s3aUi0FwIMunD/PgkRGLOt6vQ64qs1m5m2at0yejBXEwLFTOPyEdjUgWp43MfAQS1OUmTX/gjQrRgKQlWLPk1Bmh/uQWAywMmlu7rRdUD8kZUOxQc5yuKiDFYZ6Xq5TvGQHuFA2jeEJ4NIOr+UBF7H2iJRUhcVWAcpsVPT0DghMKnPL5yg2BXDmXO1+vsVUJpTxEFXsDcPWNncXuEyNfWS8DqlQRvCekN7Kg0P4qCQlqdqFB8BZbt7BmTkDUJ7w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=AIS+FvgdKp//xWFrFFKreY4pWlW1NalWopDLp059w1o=; b=QUEUzeW4cl8r5IinHgShUyRczv+6IApNG17bBGgcc8nKd3sgkkXoR6COa/Q/bfWtj9Hgj92B6oij9xTl2zNHSlrlhhzXrCTLUlHvi2RkD4J8nSDafXweVXYZHyCSyIduQoRW1/Z8IjZkcAyeyCPxcyPMLexHK+zrZYQ8JaV/tyc=
Received: from AM6PR08MB4231.eurprd08.prod.outlook.com (2603:10a6:20b:73::23) by AM6PR08MB4934.eurprd08.prod.outlook.com (2603:10a6:20b:ee::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3153.28; Fri, 3 Jul 2020 11:50:07 +0000
Received: from AM6PR08MB4231.eurprd08.prod.outlook.com ([fe80::459b:bcf3:b888:c906]) by AM6PR08MB4231.eurprd08.prod.outlook.com ([fe80::459b:bcf3:b888:c906%6]) with mapi id 15.20.3153.028; Fri, 3 Jul 2020 11:50:07 +0000
From: Thomas Fossati <Thomas.Fossati@arm.com>
To: Jim Schaad <ietf@augustcellars.com>, 'Christian Amsüss' <christian@amsuess.com>, 'Core WG mailing list' <core@ietf.org>, "draft-ietf-core-groupcomm-bis@ietf.org" <draft-ietf-core-groupcomm-bis@ietf.org>
Thread-Topic: [core] application group and security group mapping
Thread-Index: AQHWUG0+/w1zgICmQ0eMIi373foh16j0cuyAgAFdLQA=
Date: Fri, 03 Jul 2020 11:50:07 +0000
Message-ID: <7CDAD642-9DCC-4AFB-84A4-4975A5674BDA@arm.com>
References: <20200702123449.GA196068@hephaistos.amsuess.com> <04aa01d65089$e56261e0$b02725a0$@augustcellars.com>
In-Reply-To: <04aa01d65089$e56261e0$b02725a0$@augustcellars.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.38.20061401
Authentication-Results-Original: augustcellars.com; dkim=none (message not signed) header.d=none;augustcellars.com; dmarc=none action=none header.from=arm.com;
x-originating-ip: [82.11.185.80]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: ccc400b7-4b07-4975-ee27-08d81f473fa8
x-ms-traffictypediagnostic: AM6PR08MB4934:|HE1PR08MB2921:
x-ms-exchange-transport-forked: True
X-Microsoft-Antispam-PRVS: <HE1PR08MB29219644CE79E09913341E629C6A0@HE1PR08MB2921.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:8882;OLM:10000;
x-forefront-prvs: 045315E1EE
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: b3U5QDgYxJLCbYJoEFtQW91wxj/BDXQbLzauZfZZKG/K8vH5j07PlnY7AZCxsOxk2tokyue3XSnY12POTbXrYeoAkVicuHer3VkKZ9/Qpv6v2ZF+eBSv6r2Q2z3YLCiaL0pI8FL7yAjUCwbctxbV+FDbfEGLk0i+Em85oiu9W61nc0SUL2N7AGwlS1DlSKfMhKbBc9U32lf11Wify7q+I61Z/gv5ibWBPZo/A4sw1FRCcm8ncPYxxkX4LaMM3icuJoLD8uV7HKDFnNhwDb2uAVxGWpqhnZJcLQbvT4bQCQ3bz7zDU1DsbNNm604BfcVY0mj4epbF9w+qpLDAi+yT/A==
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM6PR08MB4231.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(376002)(346002)(396003)(136003)(366004)(39860400002)(186003)(6506007)(6486002)(4326008)(53546011)(36756003)(33656002)(8936002)(71200400001)(316002)(2616005)(110136005)(26005)(478600001)(66574015)(66476007)(66556008)(64756008)(66446008)(2906002)(15650500001)(91956017)(66946007)(76116006)(6512007)(5660300002)(8676002)(83380400001)(86362001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: eznExdiHLEVtW3esFc0Y/OysgUyPC8v7aDwi4QdDY4LQbDlfs4fAgK6NYf6m+RJ2Bl4xmnCQHy/Ao0WLRNks8hCbYBerBIrlftSzb+/5gA11lyXAbYEiIuepOnfO/xe8a+z6RkMwcmeLRIk3iXhFTvsuVI2RvjZmJAj0jL+P6HRJjZdlbZq2SdMzYTZnwv4wsEvNmUBVm39ky0u/1AVFsM1fAUrrOnidcSe56UQqWOjafFX1gqcZfJwXc6REefTkrevu4kCJodDD6dXO1gSIr0XrNbWc0LupBvNGDCzHnDKN6wSQM4xb+W1M0YvxOeGucqzBL84eA2VQnzGS3iraY68aQnOKp3OA6fGO5jppUU1kUT5iruuOkt+SXLmVtJs/mLMWrypkiW8rElN0XahXugFa7pcz3qV+Ry9mQnaVSGsJcOc7l7QnQklTOmG1NK16gMG6H+6Zkoje02w+PtL09dCnOSn7v0j9DpTlbpLXm44=
Content-Type: text/plain; charset="utf-8"
Content-ID: <23FD515844FA3447A96CF4D16A172C0D@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB4934
Original-Authentication-Results: augustcellars.com; dkim=none (message not signed) header.d=none;augustcellars.com; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: VE1EUR03FT016.eop-EUR03.prod.protection.outlook.com
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFTY:; SFS:(4636009)(39860400002)(396003)(376002)(136003)(346002)(46966005)(336012)(53546011)(66574015)(450100002)(6506007)(33656002)(110136005)(36906005)(36756003)(186003)(83380400001)(2616005)(81166007)(26005)(86362001)(316002)(70586007)(70206006)(478600001)(4326008)(82310400002)(356005)(47076004)(6512007)(8676002)(8936002)(15650500001)(82740400003)(2906002)(5660300002)(6486002); DIR:OUT; SFP:1101;
X-MS-Office365-Filtering-Correlation-Id-Prvs: 78ebe739-891d-42da-e9ee-08d81f473b7f
X-Forefront-PRVS: 045315E1EE
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: RFXAgSXMQVDrzkAaOY4Hy7mVNOf5pnSk3543njMI74Syst8JMWoJ0+6gxEw2zVHDqmFGtzDkkBhZr+ywNk3P1VAzU8RDbejqsAFGrKXw5MF5dnCh8ht2yEijxcO4HISQA2jHfvTFecxlzpjZ/dQUqzLeZh54OVCvsWzxzULIQe+zJQXpj1vQAbfv0ovDUa+M+6wbhd/SSRREbbN93eGhGOc8b7rLhho/Si607HjOHV8wLXxoNfctPfR29N0AVrupIulTV5A/fHNLTCLNFa0Qf1x8v2RDKS7b7YJi/r/Hf1s0jcW4tb8PemT5uT/maXepL3qPWxzukypbULPNonGehBEgpfDBEqQyzK+fW5HbgU1cVGo6BwWDZjapZw352ClLJn+XXwD+CwLIARu0IcZPAw==
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Jul 2020 11:50:14.2640 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: ccc400b7-4b07-4975-ee27-08d81f473fa8
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: VE1EUR03FT016.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR08MB2921
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/J_LXhfidTMiipB_uyejI8be-bX0>
Subject: Re: [core] application group and security group mapping
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Jul 2020 11:50:28 -0000


On 02/07/2020, 17:01, "Jim Schaad" <ietf@augustcellars.com> wrote:
> > -----Original Message-----
> > From: Christian Amsüss <christian@amsuess.com>
> > Sent: Thursday, July 2, 2020 5:35 AM
> > To: Core WG mailing list <core@ietf.org>; Jim Schaad
> > <ietf@augustcellars.com>; draft-ietf-core-groupcomm-bis@ietf.org
> > Cc: Marco Tiloca <marco.tiloca@ri.se>
> > Subject: application group and security group mapping
> >
> > Hello CoRE,
> > hello Jim (whose review on group discovery [1] trigered this), hello
> > groupcomm-bis authors (whose terminology this will be about),
> >
> > groupcomm-bis describes that application-groups can be n:m mapped to
> > security groups.
> >
> > In one direction, this is rather straight-forward: Different
> > applications can share a security group provided they use different
> > paths, as a way to keep management and overhead low.
> >
> > In the other direction (one application group using multiple
> > security groups), there's two scenarios this can possibly be used
> > for:
> >
> > A. Security groups are used equivalently. The servers need to join
> >    each of the groups, but for a client it is sufficient to join
> >    any.  (Especially, for clients it is sufficient to support any of
> >    the group's signature algorithm rather than all).
> >
> > B. Security grroups have different properties within the application
> >    group. Particular operations may require the client to pick a
> >    special group.
>
> I think that what has been done here is to conflate the ideas of a
> security group and a setup of access control decisions.

I agree we are conflating access control to the communication channel
with access control to the resource space, which are two logically
separate layers.

> It might be worthwhile to try and separate these two concepts and see
> what happens.
>
> A security group is the set of all people who can read each other's
> messages.  There is nothing that might say that I care about somebody
> in the security group reading the command/response that I am making.
>
> A ACL group on the other hand is the set of all people who can perform
> a set of operations.  With group comm this is currently based on the
> security group, but it could just as easily be based on the signature
> key of the sender of the message.
>
> This means that there may be a one-to-one mapping between a security group
> and an ACL group, on the other hand it could just as easily be that an ACL
> group encompasses multiple security groups and maps one-to-one with the
> application group.  (Even worse depending on how things are done, there
> could be multiple application groups associated with an ACL group.)

What is the advantage of treating ACLs as a separate group?  ISTM that,
for the purpose of groupcomm-bis, they can be expressed simply as
properties of the resources defined by the application group.  Or do we
need to go in details of how ACLs are expressed?

cheers!

IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.