On 3-Mar-06, at 12:00 PM, Robert Yates wrote:


Correct. With dmd0 the enterprise would have to put its Homesite (HS) endpoint out in the DMZ and punch a hole through the firewall so that the HS code can talk to the enterprise IdM stack. It was a deliberate compromise to simplify the implementation of a Membersite (MS).

I understand the compromise and yes, so monster can verify messages from acme, but how does acme verify messages from monster? Is it acceptable for enterprises to allow their servers to access the internet?

Good question. My experience is that it is often the case, but I don't know for sure.



For sure digital signatures and certificates are a solution, but I'm not sure I'd go about it in exactly that way.

I guess what I'm asking here is a scope question. Is it within the scope of DIX to allow the message signature to be a signature that can be verified without a remote call? and if it isn't within the scope of core, is it expected that an extension to the core could do it?

I think making PKI a requirement would be a mistake for DIX. I think PKI is a logical extension.

Your example can be solved without PKI in this way though:

Internally at acme.com, intranet.acme.com resolves to the Homesite. Externally, intranet.acme.com resolves to a host that provides only capability discovery and message verification services. The internal and external hosts share a secret used to respectively sign and verify messages.

We have a demo of a Firefox plug-in where the data is on the user machine, and there is a server that shares a secret with the user's machine, that is able to verify messages. ie. this works. :)

-- Dick




_______________________________________________
dix mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/dix

Reply via email to