RE: [TLS] the use cases for GSS-based TLS and the plea for integrating
Chris Newman <Chris.Newman@Sun.COM> Thu, 26 July 2007 16:00 UTC
Return-path: <tls-bounces@lists.ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1IE5ku-0005iJ-Iz; Thu, 26 Jul 2007 12:00:00 -0400
Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IE5kt-0005i6-61 for tls@ietf.org; Thu, 26 Jul 2007 11:59:59 -0400
Received: from brmea-mail-2.sun.com ([192.18.98.43]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1IE5ks-0000XR-5T for tls@ietf.org; Thu, 26 Jul 2007 11:59:58 -0400
Received: from fe-amer-05.sun.com ([192.18.108.179]) by brmea-mail-2.sun.com (8.13.6+Sun/8.12.9) with ESMTP id l6QFxvCs023595 for <tls@ietf.org>; Thu, 26 Jul 2007 15:59:57 GMT
Received: from conversion-daemon.mail-amer.sun.com by mail-amer.sun.com (Sun Java System Messaging Server 6.2-6.01 (built Apr 3 2006)) id <0JLS00B01MH90O00@mail-amer.sun.com> (original mail from Chris.Newman@Sun.COM) for tls@ietf.org; Thu, 26 Jul 2007 09:59:57 -0600 (MDT)
Received: from [10.1.110.5] (dhcp-1695.ietf69.org [130.129.22.149]) by mail-amer.sun.com (Sun Java System Messaging Server 6.2-6.01 (built Apr 3 2006)) with ESMTPSA id <0JLS005G0N3UAZ10@mail-amer.sun.com>; Thu, 26 Jul 2007 09:59:57 -0600 (MDT)
Date: Thu, 26 Jul 2007 11:00:39 -0500
From: Chris Newman <Chris.Newman@Sun.COM>
Subject: RE: [TLS] the use cases for GSS-based TLS and the plea for integrating
In-reply-to: <CAAAEFE273EAD341A4B02AAA9CA6F73306D440AB@WIN-MSG-20.wingroup.windeploy.ntdev.microsoft.com>
To: Larry Zhu <lzhu@windows.microsoft.com>, martin.rex@sap.com
Message-id: <C4E819FF73EA6ED22A3906CD@446E7922C82D299DB29D899F>
MIME-version: 1.0
X-Mailer: Mulberry/3.1.6 (Mac OS X)
Content-type: text/plain; format="flowed"; charset="us-ascii"
Content-transfer-encoding: 7bit
Content-disposition: inline
References: <200707171840.l6HIeg9M018099@fs4113.wdf.sap.corp> <48A6320349FD1EDBE937A357@dhcp-26f9.ietf69.org>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: cd26b070c2577ac175cd3a6d878c6248
Cc: tls@ietf.org
X-BeenThere: tls@lists.ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.lists.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@lists.ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/tls>
List-Post: <mailto:tls@lists.ietf.org>
List-Help: <mailto:tls-request@lists.ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@lists.ietf.org?subject=subscribe>
Errors-To: tls-bounces@lists.ietf.org
Larry Zhu wrote on 7/25/07 12:48 -0700:
> For use cases, please review my slides and the meeting minutes for the
> TLS working group. I would like to recap the main points below:
I will look at them.
> Methodology wise the way to deal with complexity is to build abstraction
> layers. GSS-API is ideal for encapsulating the described complexity.
Abstraction layers can decrease complexity, increase complexity, cause "data
hiding" (good), and "data losing" (bad). How abstraction layers are hooked
together matters a great deal. There's an abstraction layer between
applications and TLS. There's an abstraction layer between applications and
SASL/GSSAPI. But what you're proposing shoves GSSAPI behind the TLS
abstraction, creating a clear case of "data losing" in the abstraction model.
That would require punching holes through the TLS abstraction layer so the
application can control both GSSAPI and any back channels GSSAPI uses to talk
to user authentication repositories or trusted third parties.
> We strongly believe there is a confusing message in IETF. Our security
> AD made a presentation in the TLS working group yesterday and the
> message is that we want everyone to use TLS for everything.
A bit of a confused message is inevitable in a rough consensus organization.
We're participating as individuals and have different perspectives and
positions as individuals. The work to form a rough consensus can be messy.
But I hear your complaint and will talk to Tim to see if the two of us can
agree on a more unified message.
For starters, I would agree that when a security services layer is needed in an
application protocol stack that TLS is likely the right mechanism to provide
that layer. I'm not convinced the "SL" portion of "SASL" has any value in
practice.
> No one wants to design their protocols
> once with Kerberos and once with TLS, no one want to review their
> protocols twice. Experience has clearly shown that requiring two set of
> mechanisms (one for Kerb and one for TLS) adds a lot of unnecessary
> complexity to what is already too complex.
I'd agree that implementers only want to integrate one security services layer.
But some implementers want their security services layer and identity stack to
be as cleanly separated as possible so a tight binding between the two is not
desirable. TLS only provides certificate-based identity today, a mechanism
that is very different from other user identity services because it does not
require the TLS stack to perform a user identity network lookup in the middle
of the TLS handshake. Doing that means the TLS stack suddenly has to
communicate problems talking to the identity lookup service through the TLS
stack and back to the application.
> Not to mention the burden to
> test two sets of mechanisms. We the IETF really should build a better
> building block for future IETF standard protocols and deliver a coherent
> strategy/solution.
It's more important to build a strategy/solution that can be deployed and
sustained in the real world with multiple independent interoperable
implementations.
> Non-IETF protocols that do not have a SASL variant do not even have a
> choice, we have to integrate Kerberos into the TLS stack to get Kerberos
> to work, not to mention the practical reasons due to firewalls and NAT
> traversal.
An application protocol that needs user-level authentication and fails to
include an authentication framing mechanism in the protocol is designed
incorrectly, and the fact some non-IETF protocols have that problem is not a
reason to add complexity to IETF protocols. HTTP has such a framing mechanism,
SSH has one, also SASL, GSSAPI and EAP include protocol abstractions that could
be used to provide such a mechanism in any other application protocol.
If you try to solve the general application-layer user authentication problem
in the TLS stack, that adds a bunch of requirements to TLS that it probably
shouldn't have if there's a desire to keep the stack simple. An example would
be error messages suitable for end-user consumption and the language
negotiation necessary for such messages (SSH does this, for example).
- Chris
_______________________________________________
TLS mailing list
TLS@lists.ietf.org
https://www1.ietf.org/mailman/listinfo/tls
- [TLS] the use cases for GSS-based TLS and the ple… Larry Zhu
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- RE: [TLS] the use cases for GSS-based TLS and the… Larry Zhu
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- RE: [TLS] the use cases for GSS-based TLS and the… Larry Zhu
- Re: [TLS] the use cases for GSS-based TLS and the… Love Hörnquist Åstrand
- RE: [TLS] the use cases for GSS-based TLS and the… Larry Zhu
- Re: [TLS] the use cases for GSS-based TLS and the… Love Hörnquist Åstrand
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- RE: [TLS] the use cases for GSS-based TLS and the… Larry Zhu
- Re: [TLS] the use cases for GSS-based TLS and the… Love Hörnquist Åstrand
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- Re: [TLS] the use cases for GSS-based TLS and the… Nicolas Williams
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- Re: [TLS] the use cases for GSS-based TLS and the… Nicolas Williams
- Re: [TLS] the use cases for GSS-based TLS and the… Jeffrey Altman
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- Re: [TLS] the use cases for GSS-based TLS and the… Nicolas Williams
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- Re: [TLS] the use cases for GSS-based TLS and the… Jeffrey Altman
- RE: [TLS] the use cases for GSS-based TLS and the… Kemp, David P.
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- Re: [TLS] the use cases for GSS-based TLS and the… Leif Johansson
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- Re: [TLS] the use cases for GSS-based TLS and the… Nicolas Williams
- Re: [TLS] the use cases for GSS-based TLS and the… Leif Johansson
- Re: [TLS] the use cases for GSS-based TLS and the… Chris Newman
- RE: [TLS] the use cases for GSS-based TLS and the… Larry Zhu
- [TLS] Re: the use cases for GSS-based TLS and the… Simon Josefsson
- RE: [TLS] the use cases for GSS-based TLS and the… Chris Newman
- Re: [TLS] Re: the use cases for GSS-based TLS and… Leif Johansson
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- RE: [TLS] the use cases for GSS-based TLS and the… Larry Zhu
- [TLS] Re: the use cases for GSS-based TLS and the… Martin Rex
- RE: [TLS] the use cases for GSS-based TLS and the… Chris Newman
- Re: [TLS] the use cases for GSS-based TLS and the… Leif Johansson
- RE: [TLS] the use cases for GSS-based TLS and the… Kemp, David P.
- Re: [TLS] the use cases for GSS-based TLS and the… Jeffrey Altman
- Re: [TLS] the use cases for GSS-based TLS and the… Leif Johansson
- Re: [TLS] the use cases for GSS-based TLS and the… Yoav Nir
- Re: [TLS] the use cases for GSS-based TLS and the… Chris Newman
- Re: [TLS] the use cases for GSS-based TLS and the… Chris Newman
- RE: [TLS] the use cases for GSS-based TLS and the… pgut001
- Re: [TLS] the use cases for GSS-based TLS and the… Jeffrey Altman
- Re: [TLS] the use cases for GSS-based TLS and the… pgut001
- Re: [TLS] the use cases for GSS-based TLS and the… Kyle Hamilton
- Re: [TLS] the use cases for GSS-based TLS and the… pgut001
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- Re: [TLS] the use cases for GSS-based TLS and the… pgut001
- Re: [TLS] the use cases for GSS-based TLS and the… pgut001
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- RE: [TLS] the use cases for GSS-based TLS and the… Kemp, David P.
- RE: [TLS] the use cases for GSS-based TLS and the… Chris Newman