Re: [pcp] Server's auth policy discovery

Alper Yegin <alper.yegin@yegin.org> Fri, 12 October 2012 12:44 UTC

Return-Path: <alper.yegin@yegin.org>
X-Original-To: pcp@ietfa.amsl.com
Delivered-To: pcp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0F68121F84DC for <pcp@ietfa.amsl.com>; Fri, 12 Oct 2012 05:44:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.522
X-Spam-Level:
X-Spam-Status: No, score=-102.522 tagged_above=-999 required=5 tests=[AWL=0.077, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c1toNPE7vETM for <pcp@ietfa.amsl.com>; Fri, 12 Oct 2012 05:44:49 -0700 (PDT)
Received: from mout.perfora.net (mout.perfora.net [74.208.4.194]) by ietfa.amsl.com (Postfix) with ESMTP id 1477121F84A2 for <pcp@ietf.org>; Fri, 12 Oct 2012 05:44:49 -0700 (PDT)
Received: from [192.168.2.7] (88.247.135.202.static.ttnet.com.tr [88.247.135.202]) by mrelay.perfora.net (node=mrus4) with ESMTP (Nemesis) id 0Me8la-1T0Ajd06kY-00Pz7q; Fri, 12 Oct 2012 08:44:48 -0400
Mime-Version: 1.0 (Apple Message framework v1278)
Content-Type: text/plain; charset="us-ascii"
From: Alper Yegin <alper.yegin@yegin.org>
In-Reply-To: <tslvcefj3i3.fsf@mit.edu>
Date: Fri, 12 Oct 2012 15:44:28 +0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <F2C651B4-76AB-409E-8540-892E5793ACC0@yegin.org>
References: <0BC19EAB-01F2-4AB9-B706-FD7C98FFAE86@yegin.org> <tsl4nm0j755.fsf@mit.edu> <5077FA0A.9030308@toshiba.co.jp> <tslzk3rj530.fsf@mit.edu> <22CCCEB5-FA7E-474A-B890-5A6EB16E44DB@yegin.org> <tslvcefj3i3.fsf@mit.edu>
To: Sam Hartman <hartmans@painless-security.com>
X-Mailer: Apple Mail (2.1278)
X-Provags-ID: V02:K0:iWfwkQ1+RYHdB46epb3DeB3h9Mol3kc737ffzkPQSfi WdJUHyFIgPLdxJ5V4xm2+bZK300lx1VfJOLmUocn+JsYpSeiVZ BS5a0faWJQlUz1b3VEQkXxxpyjgP569rvQ5mysJwxvoCZzWSKg sRq/0kJ5809AuX/RK5lCcQLg1C6Nl5hg7sMtZNWqUze0cC/Nrf NRU5tyAhf2Lucb+/grg83P9rU63GXZGdHDDMg5v3BmQmTQocLE 9mlFgs2EIddpXjpPqgh2YIXJq2snuUa1iXhIufqK3hxa7vahxJ 8L9EYBtDg+MRDfkGiSemTzc8pFMo+csGBGmcHrqUBFFj/+/g64 G0TyDytwZ/8rmlqPUwb7LRJT9UIBa/hCG/i6EI21hOHHGCaDet 3NhiUoK269MkA==
Cc: pcp@ietf.org
Subject: Re: [pcp] Server's auth policy discovery
X-BeenThere: pcp@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: PCP wg discussion list <pcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pcp>, <mailto:pcp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pcp>
List-Post: <mailto:pcp@ietf.org>
List-Help: <mailto:pcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pcp>, <mailto:pcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Oct 2012 12:44:50 -0000

Sam,

For a client to decide whether it will use auth or not, it needs to know the server policy.
A server that implements auth does not mean that the client must use auth.
Server may still be configured to allow unauth clients.

This is why I have three distinct cases.

And this I'm asking independent of the PANA port-sharing discussion.

As for dealing with discovery for PANA port-sharing, either:
- We agree that it's OK for all clients to start with "no auth", or
- We use a DHCP-based solution (I know you are not happy with this), or
- We use an ANNOUNCE-based auth policy discovery solution

At least one of these would handle the issue.

Alper




On Oct 12, 2012, at 3:09 PM, Sam Hartman wrote:

>>>>>> "Alper" == Alper Yegin <alper.yegin@yegin.org> writes:
> 
>    Alper> Sam,
>    Alper> On Oct 12, 2012, at 2:35 PM, Sam Hartman wrote:
> 
>>>>>>> "Yoshihiro" == Yoshihiro Ohba <yoshihiro.ohba@toshiba.co.jp> writes:
>>> 
>    Yoshihiro> Is discoverying binary policy (auth
>    Yoshihiro> unsupported/supported) is enough, or is discovering
>    Yoshihiro> three-policy (auth unsupported/mandated/optional) needed?
>>> 
>>> I think discovering auth supported is sufficient.
> 
>    Alper> So, you suggest eliminating case 2 below?
> 
>    Alper> 1. auth not used (not supported, or disabled) 2. use of auth
>    Alper> is optional (i.e., PCP Client's decision) 3. auth is
>    Alper> mandatory to use
> 
> No.  I simply think that if you know whether the server supports auth
> then you can avoid sending auth to a server known not to support it,
> which is a problem in the PANA port sharing case.
> 
> I guess what I should have said is that  if clients who want to use auth
> have a way to discover if auth is supported, then I don't think we have
> any concerns.
> 
> --Sam