OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

security-services message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: Re: [security-services] comments: sstc-saml-holder-of-key-browser-sso-draft-01


Tom,

> This is an important piece of work.  I've reviewed this draft document
> and have a large number of comments (which is good :).  Rather than
> post all of these here (mostly due to laziness, but partly to avoid
> being counter-productive), I'll provide some general comments below in
> hopes that my (unreported) detailed comments will be addressed as a
> matter of course in the next revision.

Thanks a lot for all your excellent suggestions so far to improve this  
profile.  This is creative and useful feedback that has challenged a  
few of my preconceptions -- but what a brutal introduction to the  
standards process. :D

> - This document needs a section entitled 'Security and Privacy
> Considerations" (or something similar).  There's a lot of text in this
> document, mentioned in passing, that would have more effect if it were
> aggregated in a non-normative "Security" section.  Examples of such
> text include much of section 2.2 (including lines 223--232) and any
> reference to "issuer," "subject," "X.509 subject," "subjectAltName,"
> and "X.509 subjectAltName" set in monospace font.

Given that security is one of the primary benefits from adoption of  
this profile, that's probably a good idea.  This'll take me a little  
while.

> (By the way, why are the latter set in monospace font?)

Keywords.  It's to set them apart as being specified fields, even if  
from another standard.  Is that inappropriate?

> - IMO, section 2.3 (Profile Overview) should not use normative
> language.  I realize [SAML2Prof] does this, but I don't recommend it,
> especially since related requirements are spread throughout section 2.
> So I suggest you state all normative requirements in the body of
> section 2, beginning with section 2.4.

That's a good idea.  (almost) All normative requirements stated there  
were already in section 2.4 anyway, and this clarifies the purpose of  
each section.  That's done now.

> - Is this profile meant to be a refinement of the Web Browser SSO
> Profile in [SAML2Prof] or is it meant to be a complete replacement?
> (Yes, I read lines 195--196 but I have to ask.)  I suspect it's meant
> to be a refinement, otherwise there's more work to do to cover all the
> bases touched by [SAML2Prof].  In that case, I recommend you remove
> any redundant requirements (i.e., requirements already covered by
> [SAML2Prof]) unless reiterating those requirements helps to prevent
> misinterpretation.  Some requirements can be removed regardless of the
> profile's relationship to [SAML2Prof]; for example, most (if not all)
> of section 2.7 (Use of Metadata) can be eliminated, I think.

Unfortunately, it can't be a pure derivation/refinement because the  
Web Browser SSO profile mandates the use of bearer SubjectConfirmation  
with a normative MUST.  What do you believe it needs to include that  
isn't already if it seeks to be an alternative rather than a refinement?

> - Wherever encryption is mentioned, one gets the impression it is
> required or assumed.  But encryption is not required as far as I know,
> so any subsequent conclusions or requirements seem to be based on a
> false assumption.  So what are the encryption requirements of this
> profile?  I suspect there are none, so I suggest you go back and
> rewrite any paragraph that has the word "encryption" in it.

Every reference to encryption that I can find is explanatory or  
describes options faced by a deployer and isn't normative.  Many of  
these would be migrated into a consolidated security/privacy  
considerations section.

> - In section 1.3 (Conformance), try to specify what sections are
> required for a conforming SP.  Similarly, specify what sections are
> required for a conforming IdP.  I don't think you want to leave this
> up to the reader.

There's no harm in tabulating them, really, but isn't it somewhat self- 
evident?

> - The body of section 2 (sections 2.4 and 2.5) is disorganized.  For
> one thing, there is more than one incorrect cross-reference, which is
> annoying.  Perhaps the next version of the document can reorganize the
> subsections in section 2.  It would be helpful if there were a
> one-to-one mapping between the subsections of sections 2.4 and 2.5,
> respectively.  In the very least, cross-references should be used
> freely, and they should be correct.

With the exception of incorrect cross-references, my (totally  
mislabeled) intent was to split the sections into the protocols/ 
bindings and the assertion/messages they transport.  This is made more  
awkward by the fact that the authentication request is protocol only.   
For some of the steps in 2.4, there is no real corresponding text to  
put in 2.5: it's all binding, and sometimes not SAML.

What would you suggest?  Collapse them into one section, try to draw  
this distinction more sharply, or use another separator entirely?

> - I suggest you break out the authentication request/response sequence
> into a separate profile.  This will, first of all, simplify an already
> complicated section 2. Secondly, it's likely someone will want to
> implement the authentication exchange outside of the normal browser
> profile.  Indeed, the HTTP-based authentication request/response that
> you've profiled here is much easier to implement than the SOAP-based
> attribute self-query I profiled recently!  So having those
> requirements in a separate section would be very helpful.

As mentioned above, I hoped to draw this same line between 2.4 and  
2.5.  I can understand (and am pleased by) the desire to recycle the  
concepts in the profile.  However, I don't think splitting this into  
two separate profiles is the right way to do that.  I believe the  
coupling between the application-layer assertion and the transport- 
layer TLS protocol makes this profile interesting, so pulling them  
apart seems like it'd leave two somewhat disjointed halves that don't  
say much.

Thanks again,
Nate.


[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]