|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: Public key AuthMethodSpencer, Thanks for pointing out this info. I had another correspondence with the CAT-WG chair, and first, the erroneous Experimental-labeled version has now been replaced on the IETF web site. For the advancing question, in regard to RFC-2847 he said: "The question of whether/when RFC-2025 will advance to Draft is a separate and more complex one, and isn't equivalent to the question of advancing RFC-2847 (which is a derived specification, based on a subset of RFC-2025). Either/both would be IESG decisions, based in part on the status of interoperable implementations" In view of all this, I will go ahead and define the public key AuthMehtod based on RFC-2025 (mainly because this is the only standard we have for this) - unless I hear strong opposition / better suggestion. Regards, Ofer Ofer Biran Storage and Systems Technology IBM Research Lab in Haifa biran@il.ibm.com 972-4-8296253 Spencer Shepler <shepler@eng.sun.com> on 04/03/2001 09:07:20 PM Please respond to shepler@eng.sun.com To: Ofer Biran/Haifa/IBM@IBMIL cc: ips@ece.cmu.edu, mike@eisler.com Subject: Re: Public key AuthMethod Note that NFSv4 specifies LIPKEY (RFC2847) and SPKM-3 as mandatory to implement. LIPKEY/RFC2847 builds upon the SPKM RFC and defines the SPKM-3 mechanism which meets the needs of NFSv4. SPKM-3/LIPKEY is being implemented and therefore the SPKM RFC may be moving forward as part of the NFSv4 work. Spencer On Tue, biran@il.ibm.com wrote: > > > In Minneapolis I proposed to add the public key AuthMethod based on > SPKM (public key implementation of GSS-API, RFC-2025). SPKM is really > suitable (it gives the exact definition of tokens to be exchange in iSCSI > text > messages for public key authentication including optional certificates > exchange, and MAC digest based on shared key generated by the > exchange, that might be negotiated in the iSCSI login). > > However, there is a question mark about the status of RFC-2025. It is on > standards truck at Proposed Standard level, but it is from 1996... I had > a correspondence with the CAT-WG chair, and here are two citations: > > "I'm unaware, however, of any current plans for advancement of this > document > beyond Proposed and it hasn't been actively discussed within the WG for > some > time. I'm also unsure as to its number of existing implementations." > > "Nonetheless, I believe that it remains well suited as a specification for > an > X.509-based authentication mechanism. I'm not aware of an alternative > specification with comparable scope currently defined within an Internet > standards-track RFC" > > (BTW, if you look at the version linked from the RFC pages, the > "Status of this Memo" section states: > "This memo defines an Experimental Protocol for the Internet community..." > however the same section in the version fetched from the RFC Editor-pages > states: > "This document specifies an Internet standards track protocol for the > Internet community..." > the CAT-WG chair confirmed that the first copy is a mistake.) > > In anyway, can we (/ should we) rely on RFC that its plan for becoming a > standard is not clear at all? > > Another option for the public key AuthMethod might be a reduced version > of the TLS handshake (implemented in the iSCSI text messages, not using > the TLS record layer). This can provide authentication (with optional > certificate exchange) and a shared secret that can be used for MAC > digest according to the TLS MAC specification (but used of course as > optional iSCSI digest and not inside TLS). > > I believe it's preferable to adopt an existing security standard as much > as possible than inventing something new for iSCSI. > > I'd like to hear some opinions on these before we decide how to define > the public key AuthMethod. > > Regards, > Ofer > > > Ofer Biran > Storage and Systems Technology > IBM Research Lab in Haifa > biran@il.ibm.com 972-4-8296253 > > -- - Spencer -
Home Last updated: Tue Sep 04 01:05:10 2001 6315 messages in chronological order |