I have some comments on draft-merrells-dix-02. I'll touch on only the
first-order ones in this message -- there are various detail-level issues I've
noticed, but I'd rather discuss the former first.

Although it is good (for various reasons) that this spec has been recast
nominally in the form of a "SAML profile", I don't feel it is, as presently
written, actually one.

Rather, the spec is written more in terms of attempting to wedge a slight
veneer of SAML into the SXIP framework. For example, retaining the "DIX protocol" terminology, as is done in section 3, and in the entitling of section 4.3 as "Employing SAML in DIX", is symptomatic.

Specifically, rather than appropriately reusing the SAML Authentication Request Protocol and the SAML Assertion Query and Request Protocol, draft-merrells-dix-02 invents its own Fetch protocols and messages (which are analogous to the former SAML abstract protocols), only cursorily basing them upon the SAML RequestAbstractType. These protocols do not reuse the notion of, and elements for, "Subject"s -- rather, inventing their own top-level elements for naming of entities (eg "SPName").

Since SAML presently doesn't have a notion of a "store" protocol, it is reasonable to invent such, though I believe one could design it such that it intersects more fully with SAML approaches.

Furthermore, the notion of SAML assertions as a means of concisely conveying
Subject information is not directly employed. SAML assertions are nominally
profiled in draft-merrells-dix-assertion-00, but, for example, are not actually employed in draft-merrells-dix-02.

The reasons these points matter are at least..

* established SAML semantics largely aren't employed - thus all the added-value security knowledge-base that they represent is not leveraged

* crafting implementations facilitating convenient re-configuration to
"turn security on" isn't facilitated (i.e. security mechs other than those sxip-derived ones that are in the spec)

* ditto for facilitating "turning on identity federation"

This is a serious "lose", in my view.

As such, although they are a "SAML profile" in some small, nominal fashion, these specs are _not_ in my view crafted in the terms of the present family of SAML profiles, and thus will tend to foster divergence rather than convergence.

I suspect it is possible to craft a lightweight SAML web SSO profile that can support the sxip features (eg the signing approach) desired by some, and also support other, more conventional signing approaches (but not use xmldsig) -- both of which can be optional so it can be deployed in ultimate lightweight fashion if desired. This profile, designed with established SAML semantics and approaches, will then facilitate deployments' migration (perhaps even by reconfiguration) to more robust security and identity federation if desired.

JeffH






























_______________________________________________
dix mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/dix

Reply via email to