Re: [ogpx] Protocol for permitting policy decisions

Morgaine <morgaine.dinova@googlemail.com> Fri, 09 October 2009 04:09 UTC

Return-Path: <morgaine.dinova@googlemail.com>
X-Original-To: ogpx@core3.amsl.com
Delivered-To: ogpx@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BB2A43A698B for <ogpx@core3.amsl.com>; Thu, 8 Oct 2009 21:09:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.569
X-Spam-Level:
X-Spam-Status: No, score=-1.569 tagged_above=-999 required=5 tests=[AWL=0.407, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qRMMQEX4OEUt for <ogpx@core3.amsl.com>; Thu, 8 Oct 2009 21:09:08 -0700 (PDT)
Received: from mail-ew0-f208.google.com (mail-ew0-f208.google.com [209.85.219.208]) by core3.amsl.com (Postfix) with ESMTP id 046A43A68F7 for <ogpx@ietf.org>; Thu, 8 Oct 2009 21:09:07 -0700 (PDT)
Received: by ewy4 with SMTP id 4so290279ewy.37 for <ogpx@ietf.org>; Thu, 08 Oct 2009 21:10:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlemail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:content-type; bh=V10RGJsNw7cFa8+NcWutCKhXMDzfHZzhVfh6erEaMIU=; b=AgExoUFCwSf80OdLWLNtEObJoivef/A0bJTpxKmtABH18Mg/hYlTBuLTcZHB3OvevV 3fH6kAtzT138yPM194v4P+Qu+WcrkTRKxApKZ6eZq0BkyFhb42mJfUl6H0Bx51gFNxL2 86i8oc2OQJL6t3xif9HnvIf4krQ44i5AW9+jo=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=googlemail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; b=GBha2F0OhjCx1ESPf9WmsUTL4N/mstursfEgAD4A4bYEbH6S/KaKuB9JQVs8MxiCEc 8vU2ILgrWq1yaOBlxkechuPrZ76+u5dPJ9yp2yz8nuNl2UnVsc80er9nX40nY2MIC0fP t6iP02IHDVMIH2eiAe36pacVqef5+Sp7sYXeQ=
MIME-Version: 1.0
Received: by 10.211.157.7 with SMTP id j7mr2664085ebo.2.1255061448203; Thu, 08 Oct 2009 21:10:48 -0700 (PDT)
In-Reply-To: <20091008235638.GE13882@alinoe.com>
References: <983F17705339E24699AA251B458249B50CC48CAEBF@EXCHANGE2K7.office.nic.se> <3a880e2c0910051239t3dcae895x4f6d5f4bf5d64cd@mail.gmail.com> <20091007203535.GA13882@alinoe.com> <983F17705339E24699AA251B458249B50CC48CB683@EXCHANGE2K7.office.nic.se> <e0b04bba0910080241x548b6ff9tbc558aaa069b15be@mail.gmail.com> <20091008235638.GE13882@alinoe.com>
Date: Fri, 9 Oct 2009 05:10:48 +0100
Message-ID: <e0b04bba0910082110r120148e7ua6975a110890651a@mail.gmail.com>
From: Morgaine <morgaine.dinova@googlemail.com>
To: "ogpx@ietf.org" <ogpx@ietf.org>
Content-Type: multipart/alternative; boundary=00504502cd07ca9e62047578c3df
Subject: Re: [ogpx] Protocol for permitting policy decisions
X-BeenThere: ogpx@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Virtual Worlds and the Open Grid Protocol <ogpx.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ogpx>, <mailto:ogpx-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ogpx>
List-Post: <mailto:ogpx@ietf.org>
List-Help: <mailto:ogpx-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ogpx>, <mailto:ogpx-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Oct 2009 04:09:09 -0000

On Fri, Oct 9, 2009 at 12:56 AM, Carlo Wood <carlo@alinoe.com> wrote:

>
> Morgaine,
>
> I'm pretty sure nobody on this list wants AD2 to be involved in anyway.
>


Yes, I think that everybody agrees with this, which is why I'm making sure
that the implications are understood.

I am highlighting this point of logic very strongly so that it is clear to
everyone that *if we don't want AD2 to be consulted, then AD1 cannot be
allowed to express region policy*.  *AT ALL.  EVER.*  UNDER ANY
CIRCUMSTANCES.

Because if AD1 is allowed to, then so is AD2, and hence AD2 will have to be
consulted, :-)

I hope we can end this here with total agreement. :-)

I will however be referring back to this point if someone tries to give AD1
the power to set region policy over RD2.  If that happens, then we're back
to consulting AD2, no alternative, because W2 is not in any way inferior to
W1.

It's a crucial point, because it establishes *a limit to the power of an AD*.
Think of it as a mini Constitution. ;-)


Morgaine.








===================================


On Fri, Oct 9, 2009 at 12:56 AM, Carlo Wood <carlo@alinoe.com> wrote:

> On Thu, Oct 08, 2009 at 10:41:54AM +0100, Morgaine wrote:
> > Magnus,
> >
> > If ADs are involved in region policy, then in the multi-world deployment
> > pattern, AD2 will have to be consulted when agent A1 teleports from RD1
> to RD2,
> > because AD2 will be involved in region policy too.  It's symmetric with
> AD1.
>
> Morgaine,
>
> I'm pretty sure nobody on this list wants AD2 to be involved in anyway.
> I'm also convinced that there is some misunderstanding involved here,
> and it would be good to correct that...
>
> The following isn't consensus yet, but I feel it's basically the truth,
> and written down here as such because at least it is simple:
>
> In the end there are only services. Services can be grouped as 'domain'
> to make clear they are run by the same authority and therefore likely
> will have use the same policies, but for the sake of the protocol you
> can ignore that.
>
> There are several types of services, so far we only concentrated on two
> types:
>
> 1) A region (R1, R2, ...)
> 2) An authentication service (A1, A2, ...)
>
> in principle, every service can be run by a different authority and thus
> have different policies.
>
> One user only uses a single authentication service at a time, every other
> authentication service is not relevant (for that user).
>
> If a user wants to teleport from R1 to R2, while using A3, only A3 and R2
> have a say in this.
>
> The only say that A3 has is true or false: yes or no allow the user to go
> to R2. Once the user gets into R2, no policy of A3 matters anymore.
>
> It makes no sense whatsoever to group A's with R's for the sake of
> understanding
> or designing the protocol.
>
> For a teleport decision (or initial connect) only ONE Agent service and ONE
> region are involved.
>
> Almost every policy (of both parties) can be negotiated out of band,
> yet some of us (including me) are arguing that we need to keep the
> possibility
> open for a region to change some abstract policies (based on trusted
> information
> from the agent service) more real-time. Here trust is needed in both
> directions:
> the region must trust the agent service to answer it's questions correctly
> and the agent service must trust the region not to fool it into allowing
> users in that the agent service based on it's own policy doesn't want to
> allow in.
>
> --
> Carlo Wood <carlo@alinoe.com>
>