Re: Fourth Last Call: draft-housley-tls-authz-extns

Russ Housley <housley@vigilsec.com> Fri, 16 January 2009 15:55 UTC

Return-Path: <ietf-bounces@ietf.org>
X-Original-To: ietf-archive@megatron.ietf.org
Delivered-To: ietfarch-ietf-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E176E28C246; Fri, 16 Jan 2009 07:55:40 -0800 (PST)
X-Original-To: ietf@core3.amsl.com
Delivered-To: ietf@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CB64028C246 for <ietf@core3.amsl.com>; Fri, 16 Jan 2009 07:55:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.493
X-Spam-Level:
X-Spam-Status: No, score=-102.493 tagged_above=-999 required=5 tests=[AWL=0.106, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mTKGSGwB6ScQ for <ietf@core3.amsl.com>; Fri, 16 Jan 2009 07:55:38 -0800 (PST)
Received: from woodstock.binhost.com (woodstock.binhost.com [8.8.40.152]) by core3.amsl.com (Postfix) with SMTP id B173128C0FF for <ietf@ietf.org>; Fri, 16 Jan 2009 07:55:38 -0800 (PST)
Received: (qmail 10456 invoked by uid 0); 16 Jan 2009 15:55:20 -0000
Received: from unknown (HELO THINKPADR52.vigilsec.com) (96.255.143.189) by woodstock.binhost.com with SMTP; 16 Jan 2009 15:55:20 -0000
X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9
Date: Fri, 16 Jan 2009 10:44:18 -0500
To: Simon Josefsson <simon@josefsson.org>
From: Russ Housley <housley@vigilsec.com>
Subject: Re: Fourth Last Call: draft-housley-tls-authz-extns
In-Reply-To: <87iqofd0cy.fsf@mocca.josefsson.org>
References: <20090114161820.BFA4228C1BB@core3.amsl.com> <20090115013244.GA20394@redoubt.spodhuis.org> <20090115162240.3DEC23A67F1@core3.amsl.com> <87d4eofqaa.fsf@mocca.josefsson.org> <20090115195434.DE00A3A6A35@core3.amsl.com> <87iqofd0cy.fsf@mocca.josefsson.org>
Mime-Version: 1.0
Message-Id: <20090116155538.B173128C0FF@core3.amsl.com>
Cc: ietf@ietf.org
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: ietf-bounces@ietf.org
Errors-To: ietf-bounces@ietf.org

Simon:

> >> >>For the people who want this draft published (and perhaps have a pending
> >> >>implementation), would you please humour me by offering some usage
> >> >>scenarios, other than debugging or toys, which would meet security
> >> >>review and which are not covered by the four points which the
> >> >>patent-holder notes as potentially encumbered?
> >> >
> >> > I'll offer one based on attribute certificates (see RFC 3281).  If the
> >> > attribute certificate policy does not use a critical certificate
> >> > policy identifier that is within an arc registered to RedPhone
> >> > Security (e.g. iso.org.dod.internet.private.enterprise.23106), then
> >> > the most straightforward deployments would not encounter problems with
> >> > this IPR Statement.  RFC 3281 specifies ways to carry access
> >> > identities, group memberships, roles, and clearances in attribute
> >> > certificates.  As long as these are not coupled to signed agreements
> >> > such as contracts, as is their normal use, then I cannot see problems
> >> > with this IPR statement.
> >>
> >>What's the point of a certificate if you don't ultimately couple it with
> >>a contract?  Identities, group memberships, roles, and clearances are
> >>all attributes defined by non-technical, real-world agreements, often
> >>documented in the form of a contract.
> >
> > I can think of many that are not tied to contracts, especially in the
> > manner described in the paragraph numbered 2 in the IPR statement.
> > The authorization data needs to be used to "locate" the agreement.
> > I've worked with many identification and authorization systems, and
> > this is not a traditional aspect of any of them.
>
>I can't think of any realistic complete scenario using RFC 3281, can you
>describe it?  All attribute certificate system I've worked with uses
>identities that ultimately can be chained back to a legal entity, which
>will be bound to certain conditions through agreements.  The
>authorization data can thus be used to "locate" this agreement.
>
>Generally, I don't think we should standardize protocols that are known
>to be encumbered by patents for some applications.
>
>I've forwarded the patent disclaimer 1026 to the FSF/SFLC for review by
>lawyers.  I would have felt more comfortable if the patent disclaimer
>only contained its first paragraph.  Right now, it feels like it is
>saying one (good) thing in the first paragraph.  The next paragraphs
>appears to take away most of the substance by limiting the scope, and
>using terms that are likely intended to be narrowly scoped but can be
>read more broadly.

There are two parts to your message.  I'll try to respond to both.

EXAMPLE

Clearance may be the easiest one.  For simplicity, let's assume that 
the client are server already have X.509 identity 
certificates.  Assume the server is operated by the military, and it 
includes some information that its wants to share with the public, 
perhaps recruiting data, and information that is available to anyone 
that has a clearance.  This latter information is released to any 
client that presents a valid attribute certificate that is bound to 
the X.509 identity certificate used in client authentication and 
issued by any of the military branches that demonstrates that the 
client holds a clearance.

THE IPR STATEMENT

I think it was appropriate for RedPhone to provide insight into their 
patent application.  I'm not a lawyer, but the IPR statement is 
telling the community the ways that this protocol (and It seems to 
me, any authorization protocol that can has data that can "locate" 
agreements) might infringe on the patent application.  The major 
point being that the protocol itself is not be focus of the patent application.

Russ 

_______________________________________________
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf