[KEYPROV] "Authentication for the Cloud". Was: Correction
Anders Rundgren <anders.rundgren@telia.com> Sat, 06 March 2010 10:23 UTC
Return-Path: <anders.rundgren@telia.com>
X-Original-To: keyprov@core3.amsl.com
Delivered-To: keyprov@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D469E28C1AC for <keyprov@core3.amsl.com>; Sat, 6 Mar 2010 02:23:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.351
X-Spam-Level:
X-Spam-Status: No, score=-1.351 tagged_above=-999 required=5 tests=[AWL=-0.898, BAYES_00=-2.599, HELO_EQ_SE=0.35, SARE_FWDLOOK=1.666, SARE_RMML_Stock10=0.13]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xNTIXey-qoPf for <keyprov@core3.amsl.com>; Sat, 6 Mar 2010 02:23:48 -0800 (PST)
Received: from mail.primekey.se (walter.primekey.se [195.149.137.135]) by core3.amsl.com (Postfix) with ESMTP id E05C33A871B for <keyprov@ietf.org>; Sat, 6 Mar 2010 02:23:46 -0800 (PST)
Received: from [127.0.0.1] (localhost [127.0.0.1]) by mail.primekey.se (Postfix) with ESMTP id 4EC60C3CF8; Sat, 6 Mar 2010 11:23:46 +0100 (CET)
Message-ID: <4B922D31.2090805@telia.com>
Date: Sat, 06 Mar 2010 11:23:45 +0100
From: Anders Rundgren <anders.rundgren@telia.com>
User-Agent: Thunderbird 2.0.0.23 (X11/20090817)
MIME-Version: 1.0
To: Hannes Tschofenig <Hannes.Tschofenig@gmx.net>
References: <5BFE9E473DBFC24CA87F18F29B3F0AC406890589@sur-corp-ex-02.corp.ad.activcard.com> <4B8E91C6.4040507@telia.com> <F4E86EE3B25D5B4686A74658EB3593E13A46D8@mou1wnexmb03.vcorp.ad.vrsn.com><4B8EB3E0.3070706@telia.com> <4B8F8FB9.4030207@telia.com> <3D3C75174CB95F42AD6BCC56E5555B450246E3F9@FIESEXC015.nsn-intra.net> <4B8F9D39.5070902@telia.com> <4B921631.50409@gmx.net>
In-Reply-To: <4B921631.50409@gmx.net>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: keyprov@ietf.org, "Bajaj, Siddharth" <SBajaj@verisign.com>, "Tschofenig, Hannes (NSN - FI/Espoo)" <hannes.tschofenig@nsn.com>
Subject: [KEYPROV] "Authentication for the Cloud". Was: Correction
X-BeenThere: keyprov@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "Provisioning of Symmetric Keys \(keyprov\)" <keyprov.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/keyprov>, <mailto:keyprov-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/keyprov>
List-Post: <mailto:keyprov@ietf.org>
List-Help: <mailto:keyprov-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/keyprov>, <mailto:keyprov-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 06 Mar 2010 10:23:55 -0000
Hi Hannes, Putting a "vision" in an I-D is beyond my capability so I can only reiterate the things that IMO currently are missing for creating a token scheme for the "Cloud": - Browser interface for Issuing, Managing, and Using tokens - Supporting PKI, OTP, Information Cards etc. - Security mechanisms that makes on-line personalization of tokens technically as secure as traditional smart card production in a "bunker" - A unified system for enhanced smart cards and mobile phones with embedded security hardware This is a little bit like what OATH promised some five years ago, but where most people have put their faith into "frameworks" and "abstractions" [*], I have gone in the opposite direction and propose "bit-level compatibility". In practical terms it means that the required middleware would eventually be a part of the computing platform and not be supplied by ISVs. You may also be able to buy a security-wise low-end (but fully compatible), token at Wal-Mart since the scheme can be added to USB memory sticks with relative ease. Compared to KEYPROV, SKS/KeyGen2 is roughly twice the size but that's a minor problem since the interoperability matrix is actually MUCH smaller; the "only" real issue is how to get platform vendor buy-in. There are many hurdles. I just learned that I will not be able to make an *open* reference design using state-of-the-art crypto hardware like Atmel's AT91SC192192CT-USB or Maxim's MAXQ1850 since these require NDAs and export licenses so I have to stick to standard MCU technology. OTOH, forward-looking token vendors can build the "real stuff" based on the reference which is the long-term goal anyway; I don't aspire to become a token manufacturer :-) Regards Anders *] The German/ISO/BSI/EIC standard 24727 is an example of this Hannes Tschofenig wrote: > Hi Anders, > > in order for me to understand your proposal better it would be great if > you could write a tiny IETF draft that outlines the architectural idea. > I don't you think that more than 3 pages are necessary to capture the > idea. I am sure you could copy text from elsewhere already since you > have written a punch of documents already (some pointers you have sent > to this list). > > We could then try to figure out whether we are on the same page. > > Ciao > Hannes > > Anders Rundgren wrote: >> Hi Hannes, >> >> My interest in this space is "simply" establishing some kind of >> "KEYPROV" supporting multiple authentication mechanisms (OTP, PKI >> and Information Cards), a defined middleware, and having a browser >> interface. >> >> I think that most things going on elsewhere is more like "political >> movements" (OAuth, Kantara); my project is about *shipping* stuff and >> then *after* some initial success let *other* people toil with >> standardization. >> In addition all code will be available for anyone which serve as >> references. >> >> Cheers, >> Anders >> >> Tschofenig, Hannes (NSN - FI/Espoo) wrote: >>> Hi Anders, >>> You raise an interesting point on how this work (and similar activities >>> in the area of authentication protocols) relate to the huge body of work >>> on identity management, including the work that happens inside the IETF >>> on OAuth but also work that happens outside the IETF (and you mentioned >>> InfoCard). >>> Many of the SSO protocols do not focus on the authentication part; they >>> consider this outside the scope of their work. This obviously creates >>> problems since two effects can be observed. Human interaction is >>> required as a consequence in many cases and often weak credentials are >>> being used. >>> >>> Then, there are use case where you don't have a human involved at all >>> (like in some of the cases that are being discussed in the Oauth group). >>> >>> >>> Now, the question is whether these identity providers (asserting >>> parties) would have interest to standardize authentication mechanisms. >>> There have been some initial attempts to do so but I am not sure whether >>> they were driven by standardization people or indeed by market demand. >>> Such an example is the usage of the SASL authentication framework run >>> top of HTTP. This is, however, a bit different to some of the documents >>> we have been working on in this group >>> Are you heading into this direction or did I completely misunderstood >>> your ideas, Anders? >>> Given that I plan to send all our documents to the IESG by this IETF >>> meeting I am interested to hear where this effort will go next. >>> >>> Ciao >>> Hannes >>>> -----Original Message----- >>>> From: keyprov-bounces@ietf.org [mailto:keyprov-bounces@ietf.org] On >>>> Behalf Of ext Anders Rundgren >>>> Sent: 04 March, 2010 12:47 >>>> To: Bajaj, Siddharth >>>> Cc: keyprov@ietf.org >>>> Subject: [KEYPROV] Correction Re:PROTOWRITEUPfor >>>> draft-ietf-keyprov-symmetrickeyformat-07 >>>> >>>> Just to get it straight: >>>> >>>> I think the chairs (Hannes and Phil) and the people who wrote the >>>> KEYPROV I-Ds have done an *excellent* job! >>>> >>>> What I'm "dissing" is the fact that most of the vendors have >>>> developed a browser-interface for the provisioning but they haven't >>>> made the details of that public. This is surely not the way you >>>> create ubiquitous standards but that was maybe not on the menu? >>>> >>>> Going back to OATH, it seems that the HOTP algorithm is the only >>>> thing that deserves being called "standard" since handheld HOTP >>>> devices should actually be interchangable. >>>> >>>> Standardizing card interfaces and middleware for OTP is undoable >>>> since the actual application "Programmatic OTP" is quite marginal, >>>> in fact, I have to date in not seen a single installation using such >>>> a scheme. >>>> >>>> Taking a 128-160 bit key and mutilating it to 30-40 bits when >>>> running in a computer-to-computer authentication scenario may be a >>>> way to preserve investments in validation software but as a >>>> foundation for the future it seems like a fairly silly solution when >>>> a standard (in all respects) HTTP Digest Authentication does the >>>> same job (and is already in every browser) but without adding >>>> truncation which cause difficult to handle OTP sync issues and >>>> introduces susceptibility to DoS attacks. >>>> >>>> http://www.ietf.org/mail-archive/web/keyprov/current/msg00514.html >>>> >>>> But I think PKI and Information Cards is really the only way to go, >>>> OTP should be confined to handhelds where it is doing a very nice job. >>>> >>>> Anders >>>> >>>> Anders Rundgren wrote: >>>>> Siddharth, >>>>> >>>>> You are right, a number of vendors have invested in what I consider >>>>> dubious product concepts like "connected OTP". >>>>> >>>>> I don't see why anyone would have to wait on the standard since the >>>>> required middleware is 100% non-standard. >>>>> >>>>> I.e. there is no client-side interoperability whatsoever between >>>>> for example VeriSign and RSA. It was actually never a goal, as far >>>>> as I remember. >>>>> >>>>> Sorry for being negative but from my horizon KEYPROV became a very >>>>> marginal scheme which is the reason I'm pursuing entirely different >>>>> paths which may indeed one day reach OATH's to date not >>>> realized vision. >>>>> Anders >>>>> >>>>> Bajaj, Siddharth wrote: >>>>>> >>>>>> Hi Anders, >>>>>> >>>>>> I'll beg to differ you with you - several OATH members including >>>>>> VeriSign have implemented drafts of the online provisioning >>>> protocol >>>>>> in their products today. >>>>>> >>>>>> Others are waiting for this standard to be finalized so >>>> that they can >>>>>> implement the final versions. >>>>>> Thanks, >>>>>> >>>>>> Siddharth >>>>>> >>>>>> >>>> --------------------------------------------------------------------- >>>>>> --- >>>>>> *From:* keyprov-bounces@ietf.org on behalf of Anders Rundgren >>>>>> *Sent:* Wed 3/3/2010 8:43 AM >>>>>> *To:* Philip Hoyer >>>>>> *Cc:* keyprov@ietf.org >>>>>> *Subject:* Re: [KEYPROV] PROTOWRITEUPfor >>>>>> draft-ietf-keyprov-symmetrickeyformat-07 >>>>>> >>>>>> Philip Hoyer wrote: >>>>>> > And how is that redundant to an openly discussed peer reviewed >>>>>> agreed > IETF standard that RSA has also contributed to? >>>>>> >>>>>> There has indeed been open discussions regarding the *content* of >>>>>> draft. However, there has not been much open discussions regarding >>>>>> *utility* and *deployment*, something which I feel has hampered >>>>>> the entire KEYPROV effort. >>>>>> >>>>>> Why would anybody in their right mind use on-line provisioning >>>>>> with DSKPP for discrete OTP tokens? Isn't sort of half the >>>> value with OTP >>>>>> *getting away* from middleware? >>>>>> >>>>>> RSA, VeriSign, Nicrosoft, IBM etc have contributed to many >>>> standards >>>>>> but not all of them have been successful in the marketplace. >>>>>> >>>>>> Anders >>>>>> >>>>>> > >>>>>> > >>>>>> > ----- Original Message ----- >>>>>> > From: Anders Rundgren <anders.rundgren@telia.com> > To: Philip >>>>>> Hoyer > Cc: turners@ieca.com <turners@ieca.com>; keyprov@ietf.org >>>>>> <keyprov@ietf.org> > Sent: Wed Mar 03 17:10:46 2010 > >>>> Subject: Re: >>>>>> [KEYPROV] PROTO WRITEUPfor > >>>>>> draft-ietf-keyprov-symmetrickeyformat-07 >>>>>> > >>>>>> > Philip Hoyer wrote: >>>>>> > > Redundant to what exactly? >>>>>> > >>>>>> > I believe I elaborated that in my initial posting. >>>>>> > >>>>>> > RSA have had seeds distributed in XML format for ages and they >>>>>> work > on multiple platforms including mobile phones. >>>>>> > >>>>>> > >>>>>> > Anders >>>>>> > >>>>>> > > >>>>>> > > >>>>>> > > ----- Original Message ----- >>>>>> > > From: keyprov-bounces@ietf.org >>>> <keyprov-bounces@ietf.org> > > >>>>>> To: Sean Turner <turners@ieca.com> > > Cc: keyprov@ietf.org >>>>>> <keyprov@ietf.org> > > Sent: Wed Mar 03 15:54:36 2010 > > >>>>>> Subject: Re: [KEYPROV] PROTO WRITEUPfor > > >>>>>> draft-ietf-keyprov-symmetrickeyformat-07 >>>>>> > > >>>>>> > > Sean Turner wrote: >>>>>> > > > Anders, >>>>>> > > > >>>>>> > > > PSKC is the mandatory to implement key package and >>>>>> nobody, that I am > > > aware of, is trying to change that. The >>>> container >>>>>> defined in > > > draft-ietf-keyprov-symmetrickeyformat-07 is >>>>>> optional to implement. >>>>>> > > >>>>>> > > I just said that it felt like a redundant solution. >>>>>> > > >>>>>> > > /anders >>>>>> > > >>>>>> > > >>>>>> > > > >>>>>> > > > spt >>>>>> > > > >>>>>> > > > Anders Rundgren wrote: >>>>>> > > >> The document is great from a technical point of view. >>>>>> > > >> >>>>>> > > >> The utility is questionable since PSKC does the >>>> same > > >>>>>>>> thing and also interopes with DSKPP. The rationale > > >> >>>>>> (which has been mentioned but not been put on paper) > > "cards >>>>>> cannot process XML" is true but provisioning > > >> generally >>>>>> relies on middleware doing the unpacking > > >> and then >>>>>> through some API inserting keys and attributes > > >> in the card. >>>>>> > > >> >>>>>> > > >> Creating tokens that would decipher CMS is >>>> technically > >>>>>>> >> doable but there is absolutely no point with that > >>>>> >> > >>>>>>> >> In case you want to know how you can deal with XML, > > >> >>>>>> secure transfer of secrets, and still keep the token > > device >>>>>> unaware of sophisticated data structures and > > >> public key >>>>>> verification you may take a peek in the > > >> following >>>> document: >>>>>> > > >> >>>>>> > > >> "setPiggybackedSymmetricKey" >>>>>> > > >> >>>>>> > > >> http://webpki.org/papers/keygen2/sks-api-arch.pdf >>>>>> >>>> <https://connect.verisign.com/papers/keygen2/,DanaInfo=.awfdsonFvzp+s >>>>>> ks-api-arch.pdf> >>>>>> >>>>>> > > >> >>>>>> > > >> Anders >>>>>> > > >> _______________________________________________ >>>>>> > > >> KEYPROV mailing list >>>>>> > > >> KEYPROV@ietf.org >>>>>> > > >> https://www.ietf.org/mailman/listinfo/keyprov >>>>>> >>>> <https://connect.verisign.com/mailman/listinfo/,DanaInfo=.awxyCmjzmHx >>>>>> 1r,SSL+keyprov> >>>>>> >>>>>> > > >> >>>>>> > > > >>>>>> > > >>>>>> > > _______________________________________________ >>>>>> > > KEYPROV mailing list >>>>>> > > KEYPROV@ietf.org >>>>>> > > https://www.ietf.org/mailman/listinfo/keyprov >>>>>> >>>> <https://connect.verisign.com/mailman/listinfo/,DanaInfo=.awxyCmjzmHx >>>>>> 1r,SSL+keyprov> >>>>>> >>>>>> > > >>>>>> > >>>>>> >>>>>> _______________________________________________ >>>>>> KEYPROV mailing list >>>>>> KEYPROV@ietf.org >>>>>> https://www.ietf.org/mailman/listinfo/keyprov >>>>>> >>>> <https://connect.verisign.com/mailman/listinfo/,DanaInfo=.awxyCmjzmHx >>>>>> 1r,SSL+keyprov> >>>>>> >>>>>> >>>>> _______________________________________________ >>>>> KEYPROV mailing list >>>>> KEYPROV@ietf.org >>>>> https://www.ietf.org/mailman/listinfo/keyprov >>>>> >>>> _______________________________________________ >>>> KEYPROV mailing list >>>> KEYPROV@ietf.org >>>> https://www.ietf.org/mailman/listinfo/keyprov >>>> >>> >> >> _______________________________________________ >> KEYPROV mailing list >> KEYPROV@ietf.org >> https://www.ietf.org/mailman/listinfo/keyprov > >
- Re: [KEYPROV] PROTO WRITEUPfor draft-ietf-keyprov… Philip Hoyer
- Re: [KEYPROV] PROTO WRITEUPfor draft-ietf-keyprov… Anders Rundgren
- Re: [KEYPROV] PROTO WRITEUPfor draft-ietf-keyprov… Philip Hoyer
- Re: [KEYPROV] PROTO WRITEUPfor draft-ietf-keyprov… Anders Rundgren
- Re: [KEYPROV] PROTOWRITEUPfor draft-ietf-keyprov-… Bajaj, Siddharth
- Re: [KEYPROV] PROTOWRITEUPfor draft-ietf-keyprov-… Anders Rundgren
- [KEYPROV] Correction Re: PROTOWRITEUPfor draft-ie… Anders Rundgren
- Re: [KEYPROV] Correction Re:PROTOWRITEUPfor draft… Tschofenig, Hannes (NSN - FI/Espoo)
- Re: [KEYPROV] Correction Re:PROTOWRITEUPfor draft… Anders Rundgren
- Re: [KEYPROV] Correction Re:PROTOWRITEUPfor draft… Hannes Tschofenig
- [KEYPROV] "Authentication for the Cloud". Was: Co… Anders Rundgren