Re: [pcp] Comparison of PCP authentication

Alper Yegin <alper.yegin@yegin.org> Fri, 17 August 2012 08:15 UTC

Return-Path: <alper.yegin@yegin.org>
X-Original-To: pcp@ietfa.amsl.com
Delivered-To: pcp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 807BF21F844C for <pcp@ietfa.amsl.com>; Fri, 17 Aug 2012 01:15:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.53
X-Spam-Level:
X-Spam-Status: No, score=-102.53 tagged_above=-999 required=5 tests=[AWL=0.069, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C-z6fHPZDrzX for <pcp@ietfa.amsl.com>; Fri, 17 Aug 2012 01:15:35 -0700 (PDT)
Received: from mout.perfora.net (mout.perfora.net [74.208.4.194]) by ietfa.amsl.com (Postfix) with ESMTP id 75F8921F84D2 for <pcp@ietf.org>; Fri, 17 Aug 2012 01:15:29 -0700 (PDT)
Received: from [192.168.2.4] (88.247.135.202.static.ttnet.com.tr [88.247.135.202]) by mrelay.perfora.net (node=mrus2) with ESMTP (Nemesis) id 0MAhGN-1SrWDS2SBX-00BXUO; Fri, 17 Aug 2012 04:15:19 -0400
Mime-Version: 1.0 (Apple Message framework v1278)
Content-Type: text/plain; charset="us-ascii"
From: Alper Yegin <alper.yegin@yegin.org>
In-Reply-To: <502CF870.1020608@toshiba.co.jp>
Date: Fri, 17 Aug 2012 11:14:59 +0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <63E0C6E0-8E5B-4AAA-B0C8-D2E892ECEE18@yegin.org>
References: <9B57C850BB53634CACEC56EF4853FF653B6EC381@TK5EX14MBXW604.wingroup.windeploy.ntdev.microsoft.com> <067d01cd73fd$765a6c50$630f44f0$@com> <D6D2DEED-C35A-45AB-8B72-96195C308DB9@yegin.org> <57FF0F8E-1B86-410F-8B6B-C4893A28222F@lilacglade.org> <BB72B80F-0622-4A5B-A985-79D8AED13E0B@apple.com> <003b01cd7587$a111b760$e3352620$@com> <15990E87-2D59-49B1-845C-2A4CB5A1FBD6@lilacglade.org> <008801cd758f$3fd306e0$bf7914a0$@com> <C72CBD9FE3CA604887B1B3F1D145D05E2CE65225@szxeml528-mbx.china.huawei.com> <028801cd75d6$c5765490$5062fdb0$@com> <tsla9y4gptp.fsf@mit.edu> <04c901cd7658$37a740c0$a6f5c240$@com> <tslboikexlv.fsf@mit.edu> <054001cd765d$54c0f3e0$fe42dba0$@com> <0F259BA1-CEFF-4346-AFE5-3D33BB0CF0CC@lilacglade.org> <C72CBD9FE3CA604887B1B3F1D145D05E2CE756EE@szxeml528-mbs.china.huawei.com> <502C6BF0.3030400@toshiba.co.jp> <6F0B4ED8-68F1-44BB-A94B-E5D86E6C7254@lilacglade.org> <502CEB6D.6040304@toshiba.co.jp> <684F11AE-1361-4A75-A70B-8B0226510E09@gmail.com> <502CF870.1020608@toshib a.co.jp>
To: Yoshihiro Ohba <yoshihiro.ohba@toshiba.co.jp>
X-Mailer: Apple Mail (2.1278)
X-Provags-ID: V02:K0:Q6d0/9RQ4NveRfdZpLhx8fODtwQYG4Vsc7FdIZHWT4T tyZ7oOj2hXwwaqxBMgMn5PbOqZgj7uWnqYT6g4RG+ktlM1YDJN q2lW6Tr1U1FNvvHwEj4nEXwWy+smLNLRIcJxqpaadkKjNngHJh 1gxkfot4qTCpstSa944PrVleeKvR6rB0WvmPhKnXaYg/Ca4J+v wCjhty8oR35EPQpFq0ugzsGvAowstCU0nUgS7Tk2EgWD0Sbjee 2X8y4BkQgpYNhlTCdqasPaya6NiCm1O0X6WTSgG9be1TZmh23k x9mQ071rl48qDgyWpUn+qzUuacqPTP86UqoR6moUH5yMjm5kl3 ufE4is3YR4E4yLIYXF1Ep1aV7/rQXSFlfp9mw5qwqnZqIqa6HI pjGC8J8Fw7xnQ==
Cc: pcp@ietf.org
Subject: Re: [pcp] Comparison of PCP authentication
X-BeenThere: pcp@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: PCP wg discussion list <pcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pcp>, <mailto:pcp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pcp>
List-Post: <mailto:pcp@ietf.org>
List-Help: <mailto:pcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pcp>, <mailto:pcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 Aug 2012 08:15:36 -0000

EAP Authenticator is on the PCP server.
Hence, PAA (PANA Authentication Agent) and PCP server are on the same node.
Therefore, the PAA can tell whether it's authenticating the PaC for PCP or for network access by looking at the destination port.
That's sufficient.

(I don't know why you folks are digressing to another model where EAP authenticator resides on a different node than the PCP server --  in which case we need to engage PANA relay (OK, fine) ; and EAPoPCP folks need to come up with yet another solution to relay the EAP from PCP server to the EAP authenticator).


On Aug 16, 2012, at 4:41 PM, Yoshihiro Ohba wrote:

> Hi Margaret,
> 
> I understand your point.
> 
> I think the challenging case is that the same node is acting as PANA
> relay for both network access authentication and PCP authentication
> where the both types of authentication goes to the same PAA.  In this
> case, probably PANA needs to be extended to carry additional
> information (a new flag or AVP) for distinguishing the two types of
> authentication.  Once the additional information is defined, then the
> information may also be used for channel binding purpose.
> 
> Yoshihiro Ohba
> 
> (2012/08/16 21:53), Margaret Wasserman wrote:
>> 
>> Hi Yoshi,
>> 
>> I thought the point of running PANA over/beside PCP, instead of using a PCP-specific mechanism, was that the PCP Server could hand the PANA request to a separate PANA server for processing, just like a PANA Relay would hand-off a PANA request to a PANA Server.
>> 
>> How will that PANA Server (the one that receives the PANA request from the PCP Server, presumably on the PANA port) know that the request is coming from a PCP Server and concerns PCP access, and that it isn't a network access request from a regular PANA PaC or Relay?  I think it is pretty important that we not set-up a situation where a PANA server could think that it is authorizing network access while it is actually authorizing PCP requests, don't you?
>> 
>> Margaret
>> 
>> 
>> On Aug 16, 2012, at 8:45 AM, Yoshihiro Ohba wrote:
>> 
>>> Hi Margaret,
>>> 
>>> In my opinion, PANA should be dedicated to PCP authentication in both
>>> cases where PANA runs over PCP port.
>>> 
>>> In other words, we can say that PANA is used for network access
>>> authentication only when PANA operates over PANA port, regardless of
>>> whether the same or different credentials are used for PCP
>>> authentication and network access authentication.
>>> 
>>> Yoshihiro Ohba
>>> 
>>> (2012/08/16 20:41), Margaret Wasserman wrote:
>>>> 
>>>> Hi Yoshi,
>>>> 
>>>> On Aug 15, 2012, at 11:41 PM, Yoshihiro Ohba wrote:
>>>> 
>>>>> Here is a brief comparison on both PANA-based schemes:
>>>>> 
>>>>> Encapsulation/tunneling approach:
>>>>> - Pros: No impact on PANA specification
>>>>> - Cons: Encapsulation overhead
>>>>> 
>>>>> Demultiplexing/port-sharing approach:
>>>>> - Pros: No encapsulation overhead
>>>>> - Cons: Impact on PANA specification (an Update of RFC 5191 is needed
>>>>> on the use of "Reserved" field.)
>>>> 
>>>> In both cases, I think there is an open question (raised by my regarding your draft) of whether we want to modify PANA so that the server will know that it is performing PCP authentication vs. network access authentication.  I think this could be important, if we want a single PANA server to be able to serve both purposes in a small network.  It is possible that the credentials/criteria used to authenticate a node for PCP will be different than for network access, isn't it?
>>>> 
>>>> Margaret
>>>> 
>>>> 
>>>> 
>>> 
>> 
>> 
> 
> _______________________________________________
> pcp mailing list
> pcp@ietf.org
> https://www.ietf.org/mailman/listinfo/pcp