Re: [plasma] Where is the PEP?
Trevor Freeman <firstname.lastname@example.org> Mon, 12 December 2011 23:13 UTC
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6E2D221F84FB for <email@example.com>; Mon, 12 Dec 2011 15:13:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Status: No, score=-110.599 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([22.214.171.124]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3bLfB8A3DHDh for <firstname.lastname@example.org>; Mon, 12 Dec 2011 15:13:43 -0800 (PST)
Received: from mail.exchange.microsoft.com (mail1.exchange.microsoft.com [126.96.36.199]) by ietfa.amsl.com (Postfix) with ESMTP id DE2A221F84E5 for <email@example.com>; Mon, 12 Dec 2011 15:13:42 -0800 (PST)
Received: from df-h14-02.exchange.corp.microsoft.com (188.8.131.52) by DF-G14-01.exchange.corp.microsoft.com (184.108.40.206) with Microsoft SMTP Server (TLS) id 220.127.116.11; Mon, 12 Dec 2011 15:13:42 -0800
Received: from PIO-MLT-05.exchange.corp.microsoft.com (18.104.22.168) by DF-H14-02.exchange.corp.microsoft.com (22.214.171.124) with Microsoft SMTP Server (TLS) id 126.96.36.199; Mon, 12 Dec 2011 15:13:42 -0800
Received: from DF-M14-12.exchange.corp.microsoft.com ([fe80::7c94:4036:120:c95f]) by PIO-MLT-05.exchange.corp.microsoft.com ([fe80::d940:e316:1daa:5e6a%10]) with mapi id 14.03.0005.000; Mon, 12 Dec 2011 15:13:41 -0800
From: Trevor Freeman <firstname.lastname@example.org>
To: Jim Schaad <email@example.com>, "firstname.lastname@example.org" <email@example.com>
Thread-Topic: [plasma] Where is the PEP?
Date: Mon, 12 Dec 2011 23:13:41 +0000
Accept-Language: en-GB, en-US
Content-Type: multipart/alternative; boundary="_000_E545B914D50B2A4B994F198378B1525D42882443DFM1412exchange_"
Subject: Re: [plasma] Where is the PEP?
List-Id: "The PoLicy Augmented S/Mime \(plasma\) bof discussion list." <plasma.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/plasma>, <mailto:firstname.lastname@example.org?subject=unsubscribe>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/plasma>, <mailto:email@example.com?subject=subscribe>
X-List-Received-Date: Mon, 12 Dec 2011 23:13:46 -0000
Hi Jim, Here is my take. There does not seem consensus over the exact role of a PEP, and maybe that is by design. If you look at XACML v3 core it cites rfc3189 as a normative reference. Both XACML and 3198 define the PEP role yet the definitions are not completely aligned. 3198 defies a PEP as:- Policy enforcement: The execution of a policy decision. Policy Enforcement Point (PEP): A logical entity that enforces policy decisions (See also "policy enforcement") You can merge the two statements to be more concise i.e. A PEP is a logical entity responsible for the execution of policy decisions. This s a fairly general purpose, any policy model. XACML is more restrictive. It defines PEP as:- The system entity that performs access control by making decision requests and enforcing authorization decisions. This is very much an access control policy model definition. It also implies a trust model. The policy decision requested by both the Plasma and XACML PEP is "can the client\user access the specified message/data". In order to execute the permitted decision in a Plasma PEP, we need both the encrypted data and the decryption key. This is distinct from an XACML PEP which has access to the clear text data and can simply relase the data. The critical difference between the two is the trust model. In Plasma we do not unconditionally trust the PEP with the clear txt data; plasma performs an access check first, and then releases the clear text data to the PEP. XACML trusts the PEP with all clear text data regardless of any access check. The decision request is the same for both PEPs, but the execution of the decision is different because of the different trust models. Trevor -----Original Message----- From: firstname.lastname@example.org [mailto:email@example.com] On Behalf Of Jim Schaad Sent: Thursday, December 08, 2011 2:07 PM To: firstname.lastname@example.org Subject: [plasma] Where is the PEP? At the last IETF meeting, Trevor and I got together to try and hammer out the skeleton of what the XML protocols would look like for the plasma work. During this process we found that the WS-Trust work did not appear to have a good way of returning error information for such items as "missing attribute". However the XACML documents did have this type of structure and are designed for working between the PEP and PDP so they seemed to be a good place to base some of the work from. In the process of doing this, one of the things that was going to be highly desired was to be able to carry a SAML Assertion as part of the request from the PEP to the PDP. I found the follow document "SAML 2.0 Profile of XACML, v2.0" http://docs.oasis-open.org/xacml/3.0/xacml-profile-saml2.0-v2-spec-cs-01-en. pdf which game a "simple" method of mapping the attributes of a SAML statement onto a XACML request. The expectation is that this would be done by the PEP (or some entity between the PEP and the PDP) that is highly trusted as it does the mapping and validates the signatures on the SAML assertion. This expectation of trust does not map well onto the current Plasma mode and got me thinking about the question of where the PEP and PDP boundaries really lie. I think there may be some level of confusion in the future that we should at least consider today. The problem as I see it is that there are two different things that access is being granted to and this is not explicitly spelled out in the model. Access is being granted to the E-Mail message: This is where we are thinking of the PEP as living today. That is we are trying to get access to the e-mail message. Access is being granted to the KEK: This is where the real PEP/PDP are living. In this case the PEP is not a fully trusted entity and does not actually grant or deny access to the KEK value. For our purposes the PEP to get access to the KEK value is actually living with (or near) the PDP and is the plasma server itself. This is the think that gets a grant statement and then send the resource back to the e-mail client's PDP. The dichotomy is of issue mostly in terms of how trusted the PEP is and therefore what things can be done. The issue in this case is what level of trust can we place in the entity we are calling the PEP (none) and therefore what level of validation of attributes needs to be setup for the items that would normally be placed in the XACML Attribute structures. The PEP would normally be permitted to assert that an attribute was correct. In our case this is not a true statement. This will affect how we look at using both XACML and SAML. I.e. we probably don't want to use the mapping specified above, but we may want to look at creating a new way to place an entire SAML Assertion in an XACML Attribute and leave the PDP to re-distribute it around. Comments? Jim _______________________________________________ plasma mailing list email@example.com<mailto:firstname.lastname@example.org> https://www.ietf.org/mailman/listinfo/plasma