It looks like my first attempt at responding did not work due to send-from
email address problems.  If this comes through twice, I apologize in
advance.


Dave et all,

I agree that Authentication in the truest sense of the term is about knowing
and verifying who someone is or what something is (you can authenticate
things in addition to people). Also remember that authentication is NOT
restricted to just usernames and passwords. If we look at a business as a
whole, not just the IT network there are lots of different types of data
that can be used as authentication credentials. Things from fingerprints,
retinal scans, facial recognition, stored CERT, hidden values in the
registry of Windows boxes, simple host based names, ID badges or labels,
stickers on the rear window of a car, etc can all be used as authentication
in the business. Some of these are viewed as really weak forms of
authentication and others as really strong, but the point is that everything
from strong to really weak data can be used for authentication. It all
depends on your appetite for risk.


Given EAP and 802.1X it can also interesting to authentication a system at
the same time you authenticate a user. One use case is to make sure that a
said computer is one of the company owned computers or looks enough like a
company owned computer to be acceptable. You may assess that the computer is
company owned computer if it has some hidden regkey, it has a certain
vendor's MAC address, it has a hidden file on the filesystem or that the
system is fully compliant with the Security Policy of the organization. This
is not Authorization of the computer to the network but is verifying that
the computer is a company owned or a system that is deemed to look enough
like a company owned system to be allowed access to the network, which is
authentication.


Now EAP back in the day may have been the brain child of simple
authentication for PPP links. However, today we need to look into what is
really needed to enforce Security Policies on networks. It is my belief that
regardless of the legacy name given to the protocol, EAP, EAP makes a great
transport for dealing with the age old questions "is this user who they say
they are" which has been expanded in recent years to be, "is this user who
they say they are and are they using a company owned system in the right
part of the building at the right time of day). Yes the later half of the
second age old question is a mix of authentication and authorization, but
this is the world we live in, for better or worse.


NEA and other attributes/data tunneled inside of EAP allow the
authentication server and thus the business make more educated decisions
about whether or not someone is who they say they are or a machine is what
it says it is. This is authentication. Think of this in the terms of the
security guard that checks ID badges when you enter the building. If a
homeless person, all dressed in rags walks in to Chase Bank headquarters
with a valid ID badge, the Security Guard will probably not trust his
authentication, the ID badge. Even though the ID badge is valid. The ID
badge grants the holder to access certain resources, but the Security Guard
through visual inspection is able to make a better determination of are
these authentication credentials valid. The username / password presented is
often not enough to guarantee that the user is who the user says they are. A
business may want to make sure they are using a certain computer, the
computer is in a certain location, the computer is being used a certain time
of day, and the computer has certain things, before they grant network
access. This is NOT authorization. It is all about making sure people are
really and honestly who they say they are.  Some businesses and government
agencies build profiles of work habits.  So if I try to use my
username/password after what is deemed my normal work patterns, that
username/password is not accepted.  It is not that I am not authorized to
use the systems at weird hours, the system just knows that it is out side my
normal usage times and thus it may need to ask me follow up questions to
verify that I really am who I say I am.  This is all about authentication.


Bret



On Wed, Aug 12, 2009 at 7:33 AM, Dave Nelson <d.b.nel...@comcast.net> wrote:

> Stephen Hanna writes...
>
> > I suppose that my basic argument is a practical one. Password
> > change, channel bindings, and NEA assessments are useful things
> > to do during the EAP exchange.
>
> That much I think most of us would agree with.  EAP is a convenient
> protocol
> to use for exchanging that kind of information, even if it's stretching the
> original purpose of EAP.  Remember, EAP was to be used during the
> authentication phase of PPP.
>
> > They are relevant to the authentication process and the server's
> > decision about whether to grant network access.
>
> I really hate to have to agree with Glen's position on this, but I do.  I
> firmly believe that you, and others, are conflating elements of
> authorization into the meaning of authentication.  Authentication is about
> proof of identity.  I can be authenticated as Dave Nelson, by various
> means.
> I'm still Dave Nelson whether I'm a good guy or a bad guy.  If I'm a bad
> guy, you may not want to grant me access to your home.  If I'm a good guy,
> but an active carrier for Swine Flue, you still may not want to grant me
> access to your home.  In any case I'm still Dave Nelson, and none of the
> other "access control" considerations affect my proof of identity.  All
> those other considerations are authorization considerations, not
> authentication considerations.
>
> I agree that using words clearly and with their exact meaning is important.
>
> However, it appears that the real point of this semantic debate is whether
> the "domain of applicability" for EAP will admit the introduction on very
> useful, but clearly non-authentication, data elements.  It's quite possible
> for the WG to have consensus to do so and at the same time be in apparent
> conflict with the "domain of applicability" for EAP.  Of course, maybe the
> WG has within its charter the authority to revise the "domain of
> applicability" for EAP.
>
> > There is no harm in doing them as part of the EAP exchange. And there
> > is no better way to implement them.
>
> Assuming that's true -- and it may well be -- then EMU ought to expand the
> definition of EAP to explicitly include authorization related data, rather
> than making semantic, re-definitional, arguments that the authorization
> data
> is really authentication data.
>
>
> _______________________________________________
> Emu mailing list
> Emu@ietf.org
> https://www.ietf.org/mailman/listinfo/emu
>



-- 

---------------------------------------------------------------------------------
Bret Jordan CISSP
Treasurer, OpenSEA Alliance
jor...@open1x.org
---------------------------------------------------------------------------------
"Without cryptography vihv vivc ce xhrnrw, however,
the only thing that can not be unscrambled is an egg."
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to