IETF调研报告.doc

上传人:文库蛋蛋多 文档编号:4140971 上传时间:2023-04-07 格式:DOC 页数:4 大小:71.50KB
返回 下载 相关 举报
IETF调研报告.doc_第1页
第1页 / 共4页
IETF调研报告.doc_第2页
第2页 / 共4页
IETF调研报告.doc_第3页
第3页 / 共4页
IETF调研报告.doc_第4页
第4页 / 共4页
亲,该文档总共4页,全部预览完了,如果喜欢就下载吧!
资源描述

《IETF调研报告.doc》由会员分享,可在线阅读,更多相关《IETF调研报告.doc(4页珍藏版)》请在三一办公上搜索。

1、Application Bridging for Federated Access Beyond web (abfab)Problem StatementFederated identity facilitates the controlled sharing of information about principals, commonly across organisational boundaries. This avoids redundant registration of principals who operate in multiple domains, reducing ad

2、ministrative overheads and improving usability while addressing privacy-related concerns and regulatory and statutory requirements of some jurisdictions. A number of such mechanisms are in use for the Web. This working group will specify a federated identity mechanism for use by other Internet proto

3、cols not based on HTML/HTTP, such as for instance IMAP, XMPP, SSH and NFS. The design will combine existing protocols, specifically the Extensible Authentication Protocol (EAP - RFC 3748), Authentication, Authorization and Account Protocols (RADIUS - RFC 2865 and Diameter - RFC 3588), and the Securi

4、ty Assertion Markup Language (SAML).Specifically EAP will be used to authenticate the subject to a trusted party, AAA (RADIUS and Diameter) will be used to authenticate and convey information from that party to a relying party and SAML and SAML message formats are used to carry subject information t

5、hat can be used for authorization and personalization by a relying party. Any change in the choices for these three technical roles is out of scope for this charter.DocumentTitleDateStatusiprArea DirectorActive Internet-Draftsdraft-ietf-abfab-aaa-saml-03 A RADIUS Attribute, Binding and Profiles for

6、SAML2012-03-12 I-D Exists WG Document draft-ietf-abfab-arch-02 Application Bridging for Federated Access Beyond Web (ABFAB) Architecture2012-05-24 I-D Exists WG Document draft-ietf-abfab-gss-eap-07 A GSS-API Mechanism for the Extensible Authentication Protocol2012-05-24 Publication Requested (for2da

7、ys) Submitted to IESG for Publication Stephen Farrelldraft-ietf-abfab-gss-eap-naming-02 Name Attributes for the GSS-API EAP mechanism2012-03-12 I-D Exists WG Document draft-ietf-abfab-usecases-03 Application Bridging for Federated Access Beyond web (ABFAB) Use Cases2012-05-30 I-D Exists WG Document

8、Related DocumentsTitleDateStatusiprArea DirectorActive Internet-Draftsdraft-howlett-abfab-trust-router-ps-02 Trust Router Problem Statement2012-03-26 I-D Exists IETF draft-perez-abfab-eap-gss-preauth-01 GSS-EAP pre-authentication for Kerberos2012-03-08 待添加的隐藏文字内容1I-D Exists draft-perez-abfab-kerbero

9、s-preauth-options-01 Options for Abfab-based Kerberos pre-authentication2012-03-12 I-D Exists draft-smith-abfab-usability-ui-considerations-01 Application Bridging for Federated Access Beyond web (ABFAB) Usability and User Interface Considerations2012-03-29 I-D Exists draft-wei-abfab-fcla-02 Federat

10、ed Cross-Layer Access2012-03-12 I-D Exists DNS-based Authentication of Named Entities (dane)Objective:Specify mechanisms and techniques that allow Internet applications toestablish cryptographically secured communications by using informationdistributed through DNSSEC for discovering and authenticat

11、ing public keys which are associated with a service located at a domain name.Problem Statement:Entities on the Internet are usually identified using domain names andforming a cryptographically secured connection to the entity requiresthe entity to authenticate its name. For instance, in HTTPS, a ser

12、verresponding to a query for is expected toauthenticate as . Security protocols such as TLS andIPsec accomplish this authentication by allowing an endpoint to proveownership of a private key whose corresponding public key is somehowbound to the name being authenticated. As a pre-requisite forauthent

13、ication, then, these protocols require a mechanism for bindingsto be asserted between public keys and domain names.DNSSEC provides a mechanism for a zone operator to sign DNSinformation directly, using keys that are bound to the domain by theparent domain; relying parties can continue this chain up

14、to any trustanchor that they accept. In this way, bindings of keys to domains areasserted not by external entities, but by the entities that operate theDNS. In addition, this technique inherently limits the scope of anygiven entity to the names in zones he controls.This working group will develop me

15、chanisms for zone operators topresent bindings between names within their control and public keys, insuch a way that these bindings can be integrity-protected (and thusshown to be authentically from the zone operator) using DNSSEC andused as a basis for authentication in protocols that use domain na

16、mes asidentifiers. Possible starting points for these deliverables includedraft-hallambaker-certhash, draft-hoffman-keys-linkage-from-dns, anddraft-josefsson-keyassure-tls.The mechanisms developed by this group will address bindings betweendomain names and keys, allowing flexibility for all key-tran

17、sportmechanisms supported by the application protocols addressed (e.g., bothself-signed and CA-issued certificates for use in TLS).The solutions specified by this working group rely upon the security ofthe DNS to provide source authentication for public keys. The decisionwhether the chain of trust p

18、rovided by DNSSEC is sufficient to trust thekey, or whether additional mechanisms are required to determine theacceptability of a key, is left to the entity that uses the key material. In addition to the protections afforded by DNSSEC, the protocols and mechanisms designed by this working group requ

19、ire securing the last hop by operating a local DNS resolver or securing the connection to remote resolver - this WG will not specify new mechanisms to secure that hop, but will reference existing specifications or document existing methods in order to allow implementations to interoperate securely.I

20、nitial deliverables for this working group are limited to distribution of bindings between names within the zone operators control and public keys. More general statements of policy for a domain are out of scope, and new tasks in this area may only be adopted through a re-chartering.The group may al

21、so create documents that describe how protocol entitiescan discover and validate these bindings in the execution of specificapplications. This work would be done in coordination with the IETFWorking Groups responsible for the protocols.DocumentTitleDateStatusiprArea DirectorActive Internet-Draftsdraft-ietf-dane-protocol-23 The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA2012-06-14 new

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 办公文档 > 其他范文


备案号:宁ICP备20000045号-2

经营许可证:宁B2-20210002

宁公网安备 64010402000987号