>>>>> "Jim" == Jim Schaad <[email protected]> writes:
>> -----Original Message----- From: Sam Hartman
>> [mailto:[email protected]] Sent: Friday, March 16,
>> 2012 10:53 AM To: Jim Schaad Cc: [email protected];
>> [email protected] Subject: Re: Comments on abfab-gss-eap-naming-02
>>
>> >>>>> "Jim" == Jim Schaad <[email protected]> writes:
>>
>>
>> I think it's up to an implementation whether it chooses to let
>> you set
Jim> them.
>> For most of these I would not expect setting to work. What
>> affect would you expect setting the RADIUS name to have?
Jim> Probably nothing good. Your right which elements one can set
Jim> need to be setup on a case by case basis. The problem is that
Jim> one kind of needs a blanket statement for every RADIUS
Jim> attribute that the code does not know about.
Well, no, I mean even more basic than that.
You set a RADIUs attribute.
Are you expecting the code to do something with that like send it to the
RADIUS server?
I'd expect that it would go via the GSS-API.
I'd prefer to leave behavior regarding that undefined in this document
because we don't have enough experience with it to specify behavior
today.
>>
Jim> 3. In section 5 - Is there a need for the Code of the last
Jim> packet to be retrievable from the GSS-API interface? This is
Jim> not currently doable.
>>
>> What do you mean code? access-accept? Again, my assumption was
>> that you'd really only look at the initiator name after
>> gss_accept_sec_context returned success.
>>
Jim> 4. In section 5/6.1 - There is a restriction on getting the
Jim> SAML assertion via the fed-saml-assertion name. Does the same
Jim> restriction exist if the value is retrieved via the radius-attr
Jim> name?
>>
>> What restriction are you talking about?
Jim> There is a local policy check on assertions - It would be on
Jim> attributes and name ids and might be on the entire SAML
Jim> assertion.
I'd assume the RADIUS attribute would still be present even if this
check failed.
However I'd prefer not to mandate that here.
>>
Jim> 5. In section 6 - Is there a need to distinguish between the an
Jim> empty AttributeValue and a Nil AttributeValue. There is text
Jim> in 2.7.3.1 of SAML-CORE-2.0 that does so, but it is not
Jim> reflected in section 6.2. Minor:
>>
>> Scott?
>>
Jim> 1. In section 4 para #5 - I think that s/MUST not/MUST NOT/ -
Jim> however - how would that GSS-API code be able to possibly
Jim> enforce the requirement?
>>
>> Well, the reason to include the normative language here is so
>> applications know what they can assume. However, I think the
>> same restriction needs to be repeated in draft-ietf-
>> abfab-aaa-saml about putting SAML messages in those specific
>> RADIUS attributes. I.E. new attributes will be required for a
>> new context.
>>
>> In terms of how you implement it, things like Moonshot's
>> freeradius SAML integration should only use the attributes
>> defined in aaa-saml for
Jim> federated
>> context assertions from the IDP unless the RADIUS server is
>> configured to
Jim> re-
>> assert/vouch for these attributes.
Jim> I would feel more comfortable if this statement as a protocol
Jim> restriction were placed in the main document then. To say that
Jim> the names must not be used for attributes issued by a party
Jim> other than on closely associated with the source of credentials
Jim> would appear to make it something that the GSS-API code on my
Jim> side should be able to enforce. I do not believe that it has
Jim> any ability to do anything but assume that this was done by the
Jim> IdP/AAA server side and assign the names willy-nilly. You
Jim> description above would support that assertion.
So, I think if we add text to aaa-saml about the attribute use then
this text makes sense.
(I assume by main document you're talking about aaa-saml not gss-eap.)
I'd like to keep the text here as well as in aaa-saml because:
1) I think that a saml-ec implementation is in a position to enforce
this in GSS-API
2) I think that this restriction is important for future GSS specs
considering whether these attributes are appropriate
3) If we get right text into aaa-saml it's easy for a GSS EAP
implementation to enforce this by only mapping the right RADIUS
attributes.
Thoughts?
_______________________________________________
abfab mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/abfab