Re: [radext] #168: Remaining issues for dynamic-discovery draft

Stefan Winter <stefan.winter@restena.lu> Thu, 04 July 2013 13:34 UTC

Return-Path: <stefan.winter@restena.lu>
X-Original-To: radext@ietfa.amsl.com
Delivered-To: radext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CC39B21F9F71 for <radext@ietfa.amsl.com>; Thu, 4 Jul 2013 06:34:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.784
X-Spam-Level:
X-Spam-Status: No, score=-1.784 tagged_above=-999 required=5 tests=[AWL=0.215, BAYES_00=-2.599, J_CHICKENPOX_45=0.6]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 49YrQvW7Wofo for <radext@ietfa.amsl.com>; Thu, 4 Jul 2013 06:34:49 -0700 (PDT)
Received: from smtprelay.restena.lu (smtprelay.restena.lu [IPv6:2001:a18:1::62]) by ietfa.amsl.com (Postfix) with ESMTP id 0485C21F9F58 for <radext@ietf.org>; Thu, 4 Jul 2013 06:34:48 -0700 (PDT)
Received: from smtprelay.restena.lu (localhost [127.0.0.1]) by smtprelay.restena.lu (Postfix) with ESMTP id 17ADE10581 for <radext@ietf.org>; Thu, 4 Jul 2013 15:34:46 +0200 (CEST)
Received: from aragorn.restena.lu (aragorn.restena.lu [IPv6:2001:a18:1:8::155]) by smtprelay.restena.lu (Postfix) with ESMTPS id 031DD1057E for <radext@ietf.org>; Thu, 4 Jul 2013 15:34:46 +0200 (CEST)
Message-ID: <51D579F1.20905@restena.lu>
Date: Thu, 04 Jul 2013 15:34:41 +0200
From: Stefan Winter <stefan.winter@restena.lu>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130510 Thunderbird/17.0.6
MIME-Version: 1.0
To: radext@ietf.org
References: <065.8e3b593ce94ff54b06f468a19aa3f87e@trac.tools.ietf.org>
In-Reply-To: <065.8e3b593ce94ff54b06f468a19aa3f87e@trac.tools.ietf.org>
X-Enigmail-Version: 1.5.1
Content-Type: multipart/signed; micalg="pgp-sha1"; protocol="application/pgp-signature"; boundary="----enig2HKAEKBNPBJKNPTGAQOSP"
X-Virus-Scanned: ClamAV
Subject: Re: [radext] #168: Remaining issues for dynamic-discovery draft
X-BeenThere: radext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: RADIUS EXTensions working group discussion list <radext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/radext>, <mailto:radext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/radext>
List-Post: <mailto:radext@ietf.org>
List-Help: <mailto:radext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/radext>, <mailto:radext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Jul 2013 13:34:49 -0000

Hi,

>  This ticket captures the remaining comments on the ML that need to be
>  worked on:
> 
>  1) NAIRealm certificate extension
> 
>  1.1 allocation of an OID is pending

I'll send a notification about -07 to the pkix list to keep the ball
rolling.

>  1.2 Comment by JS: "Are you sure you want NAIRealms to be IA5String and
>  not UTF8String?  This is an I18N question."

I didn't think much during copy&paste - which was probably a mistake :-)

I want things to be aligned with the new NAI document. After all, the
purpose of the certificate extension is to compare it to the original
NAI of a user request; they should naturally be in the same format.

Since the NAI document allows UTF-8 input which is not restricted to the
ASCII subset, the certificate extension should allow that, too.

Just before submitting -07 I realised that, so -07 now speaks of UTF8String.

>  1.3 Comment by JS: "This text would appear to say that foo.*.bar is a
>  legal wildcard NAI realm. Is that what you want?"

It is what I wanted. But I have to say that this area is not my
preferred; I keep hearing from DNS people that wildcard names are
generally evil and that they should either be forbidden (but I think
they are necessary in our case to allow for proxy operation) or
lobotomised as much as possible.

If there is consensus on lobotomising the wildcard names so that left of
a star component is either another star component or nothing -
preventing the foo.*.example construct - , then I'm fine with changing
it that way.

>  2) Privacy (JS)
> 
>  "Should there be a potential privacy concern noted in this document
>  surrounding the question of what information can leak based on the
>  domain(s)
>  being queried?  I am not sure that there is any usable information leaking
>  here but this is not even close to my forte."

I can't think of any (and in eduroam we are traditionally extremely
excited about privacy preservation, so not being able to think of
privacy concerns for an eduroamer means something :-) ).

The algorithm only processes a domain name; anything left of the @ is
stripped before the first query. Also, the domain name is not vetted in
any way.

If someone were to observe the DNS traffic coming out of the RADIUS
forwarding server which executes the algorithm, he could only deduce
"someone who claims to belong to domain x.y wants to authenticate".

On the other end of the DNS queries, a DNS operator will see that
queries come in from a particular source, and will be able to conclude
"someone who claims to belong to my domain is near that querying server".

I find none of those two very exciting information; but this is of
course subject to discussion.

>  3) subsequent lookup steps (JS)
> 
>  "In section 2.3.3 - May want to be a bit more detailed here about the
>  subsequent lookup steps.  Presumably this is not starting with step 8 but
>  I
>  could be wrong.  I.e. do we take the set of result names and go back to
>  step
>  4 with new values of R?"

In -07 I am now referring directly to the S-NAPTR RFC, which has more
detailed provisions for the lookup steps.

I believe you were aiming at non-terminal lookups (empty FLAG field)?

These yield a new label to lookup NAPTR for, that's true. This is not
"going back" to a previous step though, it's just part of the normal
descendence on a NAPTR -> SRV/A/AAAA branch. I.e. the next query will
then be another NAPTR query for the new label, which will either be yet
another non-terminal (more NAPTRs to follow), or a "S" or a "A" NAPTR.

The initial value of R always needs to be retained for the server
identity and handshake verification.

Or maybe I mis-understood your comment.

Greetings,

Stefan Winter

-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et
de la Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473