Re: [SECMECH] AAA requirement for middleware
Nicolas Williams <Nicolas.Williams@sun.com> Tue, 28 June 2005 17:19 UTC
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DnJkH-0005Cd-LM; Tue, 28 Jun 2005 13:19:37 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DnJkF-0005CY-SG for secmech@megatron.ietf.org; Tue, 28 Jun 2005 13:19:36 -0400
Received: from ietf-mx.ietf.org (ietf-mx [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA02322 for <secmech@ietf.org>; Tue, 28 Jun 2005 13:19:30 -0400 (EDT)
Received: from nwkea-mail-2.sun.com ([192.18.42.14]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DnK9X-0002eI-E8 for secmech@ietf.org; Tue, 28 Jun 2005 13:45:48 -0400
Received: from centralmail1brm.Central.Sun.COM ([129.147.62.1]) by nwkea-mail-2.sun.com (8.12.10/8.12.9) with ESMTP id j5SHJRFF017802 for <secmech@ietf.org>; Tue, 28 Jun 2005 10:19:27 -0700 (PDT)
Received: from binky.Central.Sun.COM (binky.Central.Sun.COM [129.153.128.104]) by centralmail1brm.Central.Sun.COM (8.12.10+Sun/8.12.10/ENSMAIL, v2.2) with ESMTP id j5SHJQ3Z002569 for <secmech@ietf.org>; Tue, 28 Jun 2005 11:19:26 -0600 (MDT)
Received: from binky.Central.Sun.COM (localhost [127.0.0.1]) by binky.Central.Sun.COM (8.13.3+Sun/8.13.3) with ESMTP id j5SHJQJp020961; Tue, 28 Jun 2005 12:19:26 -0500 (CDT)
Received: (from nw141292@localhost) by binky.Central.Sun.COM (8.13.3+Sun/8.13.3/Submit) id j5SHJOKm020960; Tue, 28 Jun 2005 12:19:24 -0500 (CDT)
Date: Tue, 28 Jun 2005 12:19:24 -0500
From: Nicolas Williams <Nicolas.Williams@sun.com>
To: Josh Howlett <Josh.Howlett@bristol.ac.uk>
Subject: Re: [SECMECH] AAA requirement for middleware
Message-ID: <20050628171924.GN16670@binky.Central.Sun.COM>
References: <Pine.GSO.4.44.0506232014570.2267-100000@shark.cse.bris.ac.uk>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <Pine.GSO.4.44.0506232014570.2267-100000@shark.cse.bris.ac.uk>
User-Agent: Mutt/1.5.7i
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 52e1467c2184c31006318542db5614d5
Cc: secmech@ietf.org
X-BeenThere: secmech@lists.ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Security mechanisms BOF <secmech.lists.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/secmech>, <mailto:secmech-request@lists.ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/secmech>
List-Post: <mailto:secmech@lists.ietf.org>
List-Help: <mailto:secmech-request@lists.ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/secmech>, <mailto:secmech-request@lists.ietf.org?subject=subscribe>
Sender: secmech-bounces@lists.ietf.org
Errors-To: secmech-bounces@lists.ietf.org
On Fri, Jun 24, 2005 at 11:05:34AM +0100, Josh Howlett wrote: > There is growing interest in re-using this infrastructure for > cross-realm Middleware functionality for other applications (thereby > providing similiar functionality to M/W architectures such as > Shibboleth). The point of this BoF, and hopefully WG, as I understand it is to ensure the availability of various security mechanisms, AAA-types, PKI and Kerberos V, and maybe even MD5Digest-types, to all of four common security frameworks -- EAP, TLS, SASL and the GSS-API. Either SECMECH could be agnostic w.r.t. framework/mechanism use in middleware vs. other contexts, or it might tackle any technical matters specific to middleware. One technical matter that I can think of that would be of particular interest in middleware scenarios is credential delegation, constrained credential delegation, SAML assertion token exchanges, etc... I note that KITTEN WG is tackling some related topics, in relation to naming and name attributes (which I suspect may be of interest to you, given that you mention Shibboleth). > However, there are no available means to provide an equivalent degree > of security as that provided by tunnelled EAP methods over EAPOL. > > To a naive observer, it seems that what is required is a means of > encapsulating EAP in-band over TCP for application protocols. There is > a proposal from Funk et al (TLS/IA) to implement this within the TLS > handshake. Something of this ilk - perhaps ideally an EAP over SASL > mechanism - would be very welcome. SECMECH, as proposed, would provide something along these lines, either by providing mechanism bridges between security frameworks (like SASL does for the GSS-API), or by providing framework bindings of mechanisms for various mechanisms/frameworks. Nico -- _______________________________________________ SECMECH mailing list SECMECH@lists.ietf.org https://www1.ietf.org/mailman/listinfo/secmech
- [SECMECH] AAA requirement for middleware Josh Howlett
- Re: [SECMECH] AAA requirement for middleware Sam Hartman
- Re: [SECMECH] AAA requirement for middleware Josh Howlett
- Re: [SECMECH] AAA requirement for middleware Sam Hartman
- Re: [SECMECH] AAA requirement for middleware Josh Howlett
- RE: [SECMECH] AAA requirement for middleware Salowey, Joe
- Re: [SECMECH] AAA requirement for middleware Nicolas Williams
- RE: [SECMECH] AAA requirement for middleware Josh Howlett
- Re: [SECMECH] AAA requirement for middleware Nicolas Williams