There are various definitions of authentication. One could argue for the broad definition included in RFC 4949:
$ authentication (I) The process of verifying a claim that a system entity or system resource has a certain attribute value. Password change, channel bindings, and NEA assessments could be included in that definition. However, I agree that it would be better to get IESG clarification that carrying authorization data in EAP is permissible. As Alan suggested, the first step is probably to have a WG consensus check to verify that we have rough consensus that this should be permitted. After that, maybe we would ask the IESG for a clarification of the applicability statement for EAP. I will note that the IESG has already approved a change to the EMU charter to add a work item for channel bindings. So they have already indicated their support for that effort. Thanks, Steve > -----Original Message----- > From: emu-boun...@ietf.org [mailto:emu-boun...@ietf.org] On > Behalf Of Dave Nelson > Sent: Wednesday, August 12, 2009 9:33 AM > To: emu@ietf.org > Subject: Re: [Emu] EAP and authorization > > Stephen Hanna writes... > > > I suppose that my basic argument is a practical one. Password > > change, channel bindings, and NEA assessments are useful things > > to do during the EAP exchange. > > That much I think most of us would agree with. EAP is a > convenient protocol > to use for exchanging that kind of information, even if it's > stretching the > original purpose of EAP. Remember, EAP was to be used during the > authentication phase of PPP. > > > They are relevant to the authentication process and the server's > > decision about whether to grant network access. > > I really hate to have to agree with Glen's position on this, > but I do. I > firmly believe that you, and others, are conflating elements of > authorization into the meaning of authentication. > Authentication is about > proof of identity. I can be authenticated as Dave Nelson, by > various means. > I'm still Dave Nelson whether I'm a good guy or a bad guy. > If I'm a bad > guy, you may not want to grant me access to your home. If > I'm a good guy, > but an active carrier for Swine Flue, you still may not want > to grant me > access to your home. In any case I'm still Dave Nelson, and > none of the > other "access control" considerations affect my proof of > identity. All > those other considerations are authorization considerations, not > authentication considerations. > > I agree that using words clearly and with their exact meaning > is important. > > However, it appears that the real point of this semantic > debate is whether > the "domain of applicability" for EAP will admit the > introduction on very > useful, but clearly non-authentication, data elements. It's > quite possible > for the WG to have consensus to do so and at the same time be > in apparent > conflict with the "domain of applicability" for EAP. Of > course, maybe the > WG has within its charter the authority to revise the "domain of > applicability" for EAP. > > > There is no harm in doing them as part of the EAP exchange. > And there > > is no better way to implement them. > > Assuming that's true -- and it may well be -- then EMU ought > to expand the > definition of EAP to explicitly include authorization related > data, rather > than making semantic, re-definitional, arguments that the > authorization data > is really authentication data. > > > _______________________________________________ > Emu mailing list > Emu@ietf.org > https://www.ietf.org/mailman/listinfo/emu > _______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu