RE: [SECMECH] Framework Bindings Vs. Mechanism Bridges

Bernard Aboba <aboba@internaut.com> Fri, 26 August 2005 14:17 UTC

Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1E8f1l-0004Zn-Lp; Fri, 26 Aug 2005 10:17:53 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1E8Xsz-0002L5-JW for secmech@megatron.ietf.org; Fri, 26 Aug 2005 02:40:21 -0400
Received: from ietf-mx.ietf.org (ietf-mx [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA00642 for <secmech@ietf.org>; Fri, 26 Aug 2005 02:40:16 -0400 (EDT)
Received: from outbound.mailhop.org ([63.208.196.171] ident=mailnull) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1E8Xta-0001zg-Kz for secmech@ietf.org; Fri, 26 Aug 2005 02:40:59 -0400
Received: from c-67-182-139-247.hsd1.wa.comcast.net ([67.182.139.247] helo=internaut.com) by outbound.mailhop.org with esmtpa (Exim 4.51) id 1E8Xsj-000GT3-Aq; Fri, 26 Aug 2005 02:40:05 -0400
Received: by internaut.com (Postfix, from userid 1000) id 5F65160D6A; Thu, 25 Aug 2005 23:40:04 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by internaut.com (Postfix) with ESMTP id 4F2AF60D69; Thu, 25 Aug 2005 23:40:04 -0700 (PDT)
X-Mail-Handler: MailHop Outbound by DynDNS.org
X-Originating-IP: 67.182.139.247
X-Report-Abuse-To: abuse@dyndns.org (see http://www.mailhop.org/outbound/abuse.html for abuse reporting information)
X-MHO-User: aboba
Date: Thu, 25 Aug 2005 23:40:04 -0700
From: Bernard Aboba <aboba@internaut.com>
To: "Salowey, Joe" <jsalowey@cisco.com>
Subject: RE: [SECMECH] Framework Bindings Vs. Mechanism Bridges
In-Reply-To: <7210B31550AC934A8637D6619739CE6905C8BEEC@e2k-sea-xch2.sea-alpha.cisco.com>
Message-ID: <Pine.LNX.4.61.0508252336520.5325@internaut.com>
References: <7210B31550AC934A8637D6619739CE6905C8BEEC@e2k-sea-xch2.sea-alpha.cisco.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 798b2e660f1819ae38035ac1d8d5e3ab
X-Mailman-Approved-At: Fri, 26 Aug 2005 10:17:44 -0400
Cc: secmech@ietf.org
X-BeenThere: secmech@lists.ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Security mechanisms BOF <secmech.lists.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/secmech>, <mailto:secmech-request@lists.ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/secmech>
List-Post: <mailto:secmech@lists.ietf.org>
List-Help: <mailto:secmech-request@lists.ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/secmech>, <mailto:secmech-request@lists.ietf.org?subject=subscribe>
Sender: secmech-bounces@lists.ietf.org
Errors-To: secmech-bounces@lists.ietf.org

> > EAP-Kerb/IAKERB/GSS is inherently different other EAP methods 
> > because it requires support for the method on the NAS.  That 
> > is, the NAS needs to support Kerberos for a peer to be able 
> > to submit a TGS to the NAS in order to obtain network access. 
> > 
> [Joe] I'm not quite sure what you mean. If a AAA server is not involved
> then this is not really any different than terminating EAP-TLS on a NAS.

It's different because the NAS needs to support Kerberos even if it is 
operating in "Pass-through" mode.  In contrast, a NAS operating in 
pass-through mode for EAP-TLS doesn't need to validate the client 
certificate. 

> It could also be possible to still involve a AAA and have it terminate
> the method and talk to the KDC. If you are trying to implement a method
> that is evaluated by both the NAS and the AAA in the same transaction
> you are really doing something other than EAP. 

In all the EAP Kerberos proposals I've seen the method is terminated on
either the NAS or AAA server, but not both.  But in any scenario, the
NAS still needs to support Kerberos, in order to validate the "network
access" service ticket. 

_______________________________________________
SECMECH mailing list
SECMECH@lists.ietf.org
https://www1.ietf.org/mailman/listinfo/secmech