OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

security-use message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [Elist Home]


Subject: Re: ISSUE[UC-5-01:AuthCProtocol]



> > This is not challenge response authentication, for the simple reason that
> > neither the AP or the RP is being authenticated. If you don't like challenge
> > response I suggest you think of another name, but the exchange you are
> > talking about does not involve authentication. The AP and RP are exchanging
> > what they know about the User. The fact this is done in a way that prevents
> > replay and other attacks does not make it authentication.
>
> Actually both parties are fully authenticated by the digital
> signatures and associated certificates of messages 4 and 5.

Ding ding ding.  "Authentication" is an overloaded term, and has many
valid meanings at many levels as this discussion shows.  We are obliged to
agree on precise terms to distinguish the different uses if we are to have
a productive discussion about them.

In a fundamental sense "authentication" is the act of verifying that an
object is authentic, where "authentic" in this sense means both "of known
origin" and "not tampered with".  It is (mostly) the nature of the object
being authenticated that differentiates the different kinds of
authentication.

For example, a "message authentication code" (MAC) is a basic technique
for providing integrity protection on transmitted data.  Every SSL
"record" (for example) has a MAC, which is verified by the receiver.  Is
this "authentication"?  Of course it is, it's "message authentication", or
more precisely "SSL record authentication".

This is different, even in the SSL case, from the "authentication" of the
endpoints of the SSL session.  This "authentication" is providing strong
assurance of the identity of the session participant (which is optional in
SSL; every record has a MAC, though).  This is, I think, sometimes called
"origin authentication" (or "data origin authentication"), meaning that
the origin of the other end of the communication channel is verified.  We
might also call this "session authentication" since it's the initiation of
the session that is verified to be "authentic"  and that authenticity is
extended to each message/record in the session (but then "session" has its
own overloading problems).

This is different, yet again, from "authentication" as used in the phrase
"user authenticates to the source web site" (use case 1 from strawman 2).
This kind of authentication involves a user (whether human or process)
knowingly using some secret information to verifiable identify itself to a
service for purposes of conducting some transactions.  I suggest that this
is more precisely called "sign-on" (or "login" perhaps).

Thus, in use case 1, the user "signs on" to the sign-on service (aka
"source web site").  The sign-on service gives a "sign-on token" to the
user as evidence of this.  This sign-on token is sent to the destination
web site and provides "origin authentication", ie assurance of the user's
identity without the user having "signed on" to the destination web site.
Individual PDUs of the user's traffic with the destination web site will
be protected by "message authentication".

So, given all this, I *still* don't understand what the Non-Goal
"Challenge-response authentication protocols are outside the scope of
[OSSML]" is supposed to mean.  Either it has to be clarified, in terms of
which kind of authentication it's about, or it has to be removed.

 - RL "Bob"




[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [Elist Home]


Powered by eList eXpress LLC