[ietf-enroll] Updated Charter
Jim Schaad
jimsch at nwlink.com
Mon May 12 22:25:47 EDT 2003
Max,
> -----Original Message-----
> From: ietf-enroll-bounces at mit.edu
> [mailto:ietf-enroll-bounces at mit.edu] On Behalf Of Max Pritikin
> Sent: Monday, May 12, 2003 8:39 AM
> To: jimsch at exmsft.com
> Cc: 'IETF-Enroll'
> Subject: Re: [ietf-enroll] Updated Charter
>
>
> Inlines,
>
> On Sun, 2003-05-11 at 23:26, Jim Schaad wrote:
> > Here is the updated charter based on the comments that I
> have seen on
> > the list. Max, I have not completely ignored your comments,
> however I
> > feel that many of them deal with what the model should look like
> > rather than the scope of the work of the group and have
> therefore not
> > directly incorperated them.
>
> Thanks Jim. No worries, the following is developing in a
> direction I'm happy with. I've been bringing up the model
> discussion early to keep the charter from being focused on an
> 'enrollment' vs 'introduction' model. (I consider them distinct).
>
> A couple of quick comments,
>
> > Jim
> >
> >
> > Description of Working Group:
> >
> > There are many cases where a service consumer needs to obtain
> > credential information from a service provider and provide for some
> > type of information for validation of identity. This working group
> > will look at some of the cases dealing with the use of
> cryptographic
> > algorithms for providing this information.
> >
> > When doing enrollment of a service consumer against a service
> > provider, three pieces of information need to be provided
> or created
> > in order to support authentication of the service consumer to the
> > service provider (and visa versa) and to allow for
> additional security
> > services to be provided any information exchanged. These pieces of
> > data are:
> >
> > 1. The "entity label" for the service consumer,
> > 2. A piece of keying information to be used
> > 3. A set of permissions for operations for the service consumer.
> >
> > Each of these data items could be created by either the consumer or
> > provider at any point during the enrollment process.
>
> In my prototypes I've found that in addition to distributing
> this introductory material to any interested additional
> security services it has also been useful to allow such
> services to provide their own introductory material during
> the exchange.
>
> I guess I'm suggesting that the phrase "and to allow for
> additional security services to be provided any information
> exchanged" to be changed to something like "Additional
> security services may provide additional 3tuples of
> introductory material to be exchanged at the same time, or
> may recieve copies of the primary material."
>
> Starts to sound unwieldy and may not be an important
> clarification at this level.
I would rather argue this out in the framework document, but I see what
you mean.
>
>
> > This group will create a model to be used in describing enrollment
> > procedures and create a document for a framework how this is to be
> > done. The group will then produce three documents profiling
> the use of
> > the framework for the following cases:
> >
> > 1. A shared secret key
> > 2. A bare asymmetric key
> > 3. A bound asymmetric key (e.g. an X.509 certificate).
>
> Plus one document describing the framework as a whole?
"and create a document for a framework..." is already there.
>
> Thanks,
>
> - Max
>
> > As part of the validation of the framework, the group will
> examine how
> > other real world enrollment procedures could be profiled.
> (An example
> > of this would be credit card usage.)
> >
> > Goals and Milestones:
> >
> > Sept 2003 First draft of model
> > Dec 2003 Last call on model document
> > Nov 2003 First draft of Framework document
> > April 2004 Last call on module document
> > March 2004 First draft of secret key profile
> > March 2004 First draft of bare asymmetric key profile
> > March 2004 First draft of bound asymmetric key profile
> > Aug 2004 Last call on secret key profile
> > Aug 2004 Last call on bare asymmetric key profile
> > Aug 2004 Last call on bound asymmetric key profile
> >
> > _______________________________________________
> > ietf-enroll mailing list
> > ietf-enroll at mit.edu
> > https://mailman.mit.edu/mailman/listinfo/ietf-enroll
>
> _______________________________________________
> ietf-enroll mailing list
> ietf-enroll at mit.edu
> https://mailman.mit.edu/mailman/listinfo/ietf-> enroll
>
Jim
More information about the ietf-enroll
mailing list