[Sip] Event Lists: Back-End Credentials
Adam Roach <adam@nostrum.com> Tue, 26 October 2004 06:08 UTC
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA25366 for <sip-web-archive@ietf.org>; Tue, 26 Oct 2004 02:08:57 -0400 (EDT)
Received: from megatron.ietf.org ([132.151.6.71]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1CMKjV-0003B2-TF for sip-web-archive@ietf.org; Tue, 26 Oct 2004 02:23:02 -0400
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1CMKTq-0007Ct-VX; Tue, 26 Oct 2004 02:06:51 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1CMKSk-0006Z6-Kq for sip@megatron.ietf.org; Tue, 26 Oct 2004 02:05:42 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA22276 for <sip@ietf.org>; Tue, 26 Oct 2004 02:05:41 -0400 (EDT)
Received: from magus.nostrum.com ([69.5.195.2] ident=root) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1CMKgL-00037n-Dn for sip@ietf.org; Tue, 26 Oct 2004 02:19:45 -0400
Received: from [192.168.0.102] (adsl-209-30-28-252.dsl.rcsntx.swbell.net [209.30.28.252]) (authenticated bits=0) by magus.nostrum.com (8.12.11/8.12.11) with ESMTP id i9Q65VDw060359 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 26 Oct 2004 01:05:32 -0500 (CDT) (envelope-from adam@nostrum.com)
Message-ID: <417DE95C.8040805@nostrum.com>
Date: Tue, 26 Oct 2004 01:06:20 -0500
From: Adam Roach <adam@nostrum.com>
User-Agent: Mozilla Thunderbird 0.6 (Windows/20040502)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: sip@ietf.org
Content-Type: text/plain; charset="us-ascii"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Spam-Score: 4.6 (++++)
X-Scan-Signature: 8b30eb7682a596edff707698f4a80f7d
Content-Transfer-Encoding: 7bit
Cc: Jonathan Rosenberg <jdrosen@dynamicsoft.com>
Subject: [Sip] Event Lists: Back-End Credentials
X-BeenThere: sip@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Session Initiation Protocol <sip.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/sip>, <mailto:sip-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:sip@ietf.org>
List-Help: <mailto:sip-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/sip>, <mailto:sip-request@ietf.org?subject=subscribe>
Sender: sip-bounces@ietf.org
Errors-To: sip-bounces@ietf.org
X-Spam-Score: 4.6 (++++)
X-Scan-Signature: cab78e1e39c4b328567edb48482b6a69
Content-Transfer-Encoding: 7bit
After a discussion with Dean about some of the issues surrounding the back-end credential issue that I raised earlier on the list, I struck upon a solution that might get us past this logjam. The lynch pin to this solution is that the RLS does not ever pretend to be the user. Instead, it always subscribes as its own identity. It can present credentials as necessary to authenticate itself, but only as itself, not as its subscribers. A consequence of this is that, lacking any other mechanism, the resources in a resource list for which the RLS is not authoritative will contain only the information that their notifier is willing to reveal to the RLS -- which is generally the same information they would render to unauthenticated users. In some cases, this might result in no useful information being transferred. Of course, the resource would still be present in the RLMI document; this gives the subscriber the *option* to directly subscribe to any resources for which the RLS is not authoritative. To facilitate the client's ability to perform such subscriptions, the RLMI documents would be enhanced with a flag which indicates whether the RLS is authoritative for the resource. Finally, we would mention in the document that future work may define a mechanism by which the subscriber can pass the RLS an authorization token; the RLS could include this token in requests to show that it has been authorized by the user to send SUBSCRIBE messages for arbitrary resources on the user's behalf (mostly likely for a limited time period). Of the solutions we've seen so far, I think this one is the cleanest from a security perspective. Further, it will almost certainly allow us to progress the draft now, and separate the delegation problem so that it can be solved in a way that works well with the other identity and authentication work currently underway (and might even be reusable in other applications, such as dial-out conference bridges). Thoughts? /a _______________________________________________ Sip mailing list https://www1.ietf.org/mailman/listinfo/sip This list is for NEW development of the core SIP Protocol Use sip-implementors@cs.columbia.edu for questions on current sip Use sipping@ietf.org for new developments on the application of sip
- [Sip] Event Lists: Back-End Credentials Adam Roach
- Re: [Sip] Event Lists: Back-End Credentials David R Oran
- Re: [Sip] Event Lists: Back-End Credentials Adam Roach
- [Sip] Event Lists: Back-End Credentials Adam Roach
- Re: [Sip] Event Lists: Back-End Credentials David R Oran
- Re: [Sip] Event Lists: Back-End Credentials Paul Kyzivat
- RE: [Sip] Event Lists: Back-End Credentials hisham.khartabil
- Re: [Sip] Event Lists: Back-End Credentials Adam Roach
- Re: [Sip] Event Lists: Back-End Credentials Adam Roach
- RE: [Sip] Event Lists: Back-End Credentials hisham.khartabil
- Re: [Sip] Event Lists: Back-End Credentials David R Oran
- RE: [Sip] Event Lists: Back-End Credentials hisham.khartabil
- Re: [Sip] Event Lists: Back-End Credentials David R Oran
- Re: [Sip] Event Lists: Back-End Credentials Jonathan Rosenberg
- Re: [Sip] Event Lists: Back-End Credentials Jonathan Rosenberg