[ietf-enroll] Please help with TTI model document v2

max pritikin pritikin at cisco.com
Fri Oct 8 01:32:24 EDT 2004


On Thu, 2004-10-07 at 20:46, Jim Schaad wrote:
> Max,
> 
> So this means that you would consider a data port line between the two
> entities to be a mediated data flow since there is bi-direction
> communication.

In a manner of speaking. When we discuss a simple direct physical
connection the full model may feel unwieldy. Consider section 4.2 (where
figure 4 is similar to what you describe, a direct data port line
between two entities):

>  This is essentially equivalent to a mediated introduction where the
>    initial connection between (I) and (P) is un-authenticated and the
>    (I) to (R) connection is ignored.  As noted above the TTI entities
>    are logical and may be both provided by the same physical system thus
>    (I) to (R) can safely be considered an internal communication path
>    (and thus physically secured).

If I-P is authenticated then the value of the model becomes more clear.
Particularly if I-R also happens to be some intra process communication
channel which may include it's own authentication/authorization
mechanisms. 

I hope that the model would now allow us to consider the security
aspects of the introduction as it is effected by the relationship
between the various possible data port (I-P) authentication mechanisms
and the various possible intra process communication authentication
mechanisms. (Where direct physical secure connections and a flat shared
memory model are only the simplest instantiations of the model).

	- max


> jim 
> 
> > -----Original Message-----
> > From: max pritikin [mailto:pritikin at cisco.com] 
> > Sent: Wednesday, October 06, 2004 8:36 PM
> > To: jimsch at exmsft.com
> > Cc: ietf-enroll at mit.edu
> > Subject: RE: [ietf-enroll] Please help with TTI model document v2
> > 
> > Hi Jim,
> > 
> > I don't think the difference is in the introducer's behaviour so much
> > as:
> > 
> > >    A courier introduction could be said to be one in which 
> > one element
> > >    of the exchange does not supply any introduction material (or
> > >    possibly that the material is supplied and the remote element
> > >    refuses/ignores them).
> > 
> > Where in a mediated introduction there is a bi-directional data flow.
> > Namely that in Figure 5 the petitioner would send some 
> > introduction data (such as a public key, hash of a secret 
> > key, cleartext secret key etc) back.  
> > 
> > 	- Max
> > 
> > On Wed, 2004-10-06 at 20:07, Jim Schaad wrote:
> > >  Max,
> > > 
> > > I am in the process of reviewing this document.  During this time I 
> > > have come across a problem in my thinking and I was hoping that you 
> > > could potentially do some clarification for me.
> > > 
> > > When comparing the Courier and Mediated data flow modes.  
> > What do you 
> > > see as the difference in the responsiblities/activiites of 
> > the introducer?
> > > 
> > > Jim
> > > 
> > 
> > 
> 



More information about the ietf-enroll mailing list