There have been a lot of proposals about EAP and authorization in the past. At its very basis EAP performs authentication at the time of service access and the data resulting from the authentication can then be used for authorization and accounting purposes. Some of the proposals attempt to enhance this in various ways.
One way is to carry additional data for use in the authorization process. EAP channel bindings are perhaps the simplest form of authorization data proposed for EAP. The authorization data is directly related to the service which is performing the authentication, at the time of authentication and the exchange is relatively simple; data sent from client and result response from server. This exchange helps to ensure that an authenticator isn't trying to provide services that it is not authorized to. I don't see much purpose in channel bindings if they are not used for authorization or accounting for later forensic analysis of authorization after the event. There are other types of data that may be collected for authorization. One example is the validation of the "security posture" of the peer in which information about the peers compliance with a particular policy is collected. This example may require the exchange of more data and require more complex exchanges than channel bindings. This process may even involve authentication. There are other ways in which EAP has proposed authorization enhancements. Other proposals have dealt with requesting authorizations for or providing authorization data to services other than the one that is performing the authentication. In addition proposals have discussed authorization after the initial authentication to the service. I think carrying channel bindings within EAP is useful and necessary. I believe it is also reasonable to carry other exchanges to establish data for authorization. However, I think there are some limitations. For example carrying large amounts of data is probably not a good thing. I also think we have to be careful to not leave end stations with the only means to communicate is through EAP. I don't think we should be applying patches or browsing the web through EAP (I don't think anyone is proposing this, but I'm not certain). This means that a some point other communication channels have to be established to perform these functions. When we get into the realm of using EAP for establishing authorization data for other services, requesting authorization or invoking authorization at times other than authentication I think there is a much bigger gray area. Joe > -----Original Message----- > From: emu-boun...@ietf.org [mailto:emu-boun...@ietf.org] On > Behalf Of Alper Yegin > Sent: Friday, August 07, 2009 6:31 AM > To: emu@ietf.org > Subject: [Emu] EAP and authorization > > This issue came up during the last IETF meeting when the WG > discussed channel binding. > > > > Pasi said the discussion was within the scope of EMU WG charter. > > > > - A document that defines EAP channel bindings and provides > guidance for establishing EAP channel bindings within EAP methods. > > > > > > - A mechanism to support extensible communication within a > TLS protected tunnel. > > > > > > I'm not against this. But let's face it, this is venturing > into dealing with authorization parameters with EAP (EAP > layer? EAP method layer? Etc.) I'm not against that either. > In fact, I know there are a lot of people who'd be happy to > see that happen. > > > > So, my question is, is this what we are doing: Enabling EAP > to exchange authorization parameters among the EAP peer - > authenticator - authentication server? If not, I hope someone > can explain how this is different than what it takes to solve > channel binding problem. > > > > Thanks. > > > > Alper > > > > > > _______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu