Re: [secdir] Secdir review of draft-ietf-abfab-aaa-saml
"Paul Hoffman" <paul.hoffman@vpnc.org> Mon, 14 December 2015 15:39 UTC
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 65CF31A6FEA for <secdir@ietfa.amsl.com>; Mon, 14 Dec 2015 07:39:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.047
X-Spam-Level:
X-Spam-Status: No, score=-1.047 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_MISMATCH_COM=0.553, MIME_8BIT_HEADER=0.3] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T6yRlAkGkPN7 for <secdir@ietfa.amsl.com>; Mon, 14 Dec 2015 07:39:33 -0800 (PST)
Received: from hoffman.proper.com (Opus1.Proper.COM [207.182.41.91]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1EF2A1A700A for <secdir@ietf.org>; Mon, 14 Dec 2015 07:39:26 -0800 (PST)
Received: from [10.32.60.115] (50-1-98-110.dsl.dynamic.fusionbroadband.com [50.1.98.110]) (authenticated bits=0) by hoffman.proper.com (8.15.2/8.14.9) with ESMTPSA id tBEFdOos086573 (version=TLSv1 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 14 Dec 2015 08:39:24 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
X-Authentication-Warning: hoffman.proper.com: Host 50-1-98-110.dsl.dynamic.fusionbroadband.com [50.1.98.110] claimed to be [10.32.60.115]
From: Paul Hoffman <paul.hoffman@vpnc.org>
To: Alejandro Pérez Méndez <alex@um.es>
Date: Mon, 14 Dec 2015 07:39:27 -0800
Message-ID: <2F8DECCA-C724-4AA8-B178-178F8B735856@vpnc.org>
In-Reply-To: <566EBA2B.1030100@um.es>
References: <C7067E43-506A-414E-BD3E-85A4E7002857@vpnc.org> <566EBA2B.1030100@um.es>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-Mailer: MailMate (1.9.3r5187)
Archived-At: <http://mailarchive.ietf.org/arch/msg/secdir/W-TEieMg3UksFIni1lh-QgUf2wg>
Cc: Josh.Howlett@ja.net, hartmans-ietf@mit.edu, secdir <secdir@ietf.org>
Subject: Re: [secdir] Secdir review of draft-ietf-abfab-aaa-saml
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Dec 2015 15:39:37 -0000
On 14 Dec 2015, at 4:46, Alejandro Pérez Méndez wrote: > Hi Paul, > > thanks for the review. Please, see my comments inline. > > > El 14/12/15 a las 04:57, Paul Hoffman escribió: >> Greetings. I'm the SecDir reviewer for draft-ietf-abfab-aaa-saml. I >> apologize for the lateness of this review, particularly because I >> have what might be a significant question on the draft. >> >> The first two paragraphs of the Security Considerations section read: >> >> In this specification, the Relying Party MUST trust any statement in >> the SAML messages from the IdP in the same way that it trusts >> information contained in RADIUS attributes. These entities MUST >> trust the RADIUS infrastructure to provide integrity of the SAML >> messages. >> >> Furthermore, the Relying Party MUST apply policy and filter the >> information based on what information the IdP is permitted to assert >> and on what trust is reasonable to place in proxies between them. >> >> These seem like pretty important considerations. I fully admit that I >> might have missed it, but are they actually mentioned earlier in the >> document? I would have expected them in the Introduction, or at least >> in Section 7. >> >> If those requirements are not listed early, shouldn't they be? > > You are right. We think that restating this consideration (first > paragraph) at the begging of section 4.2 would be a good idea. > Besides, it will serve as a better motivation for why using RADIUS > over TLS (or equivalent security means) is mandatory. > > Would that work for you? Yes, I can see how it would fit there well. Thanks! --Paul Hoffman
- [secdir] Secdir review of draft-ietf-abfab-aaa-sa… Paul Hoffman
- Re: [secdir] Secdir review of draft-ietf-abfab-aa… Alejandro Pérez Méndez
- Re: [secdir] Secdir review of draft-ietf-abfab-aa… Paul Hoffman