Internet DRAFT - draft-schaad-trust-router-problem

draft-schaad-trust-router-problem







Network Working Group                                          J. Schaad
Internet-Draft                                   Soaring Hawk Consulting
Intended status: Informational                              May 30, 2013
Expires: December 01, 2013


                     Trust Router Problem Statement
                draft-schaad-trust-router-problem-01.txt

Abstract

   There are a number of problems with using the current AAA framework
   for doing access control, this document looks at a number of these
   issues and poses some questions about how to create a new trust
   router system.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on December 01, 2013.

Copyright Notice

   Copyright (c) 2013 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.




Schaad                  Expires December 01, 2013               [Page 1]

Internet-Draft            Trust Router Problem                  May 2013


Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Justification . . . . . . . . . . . . . . . . . . . . . . . .   3
     2.1.  AAA Routing Problems  . . . . . . . . . . . . . . . . . .   3
     2.2.  AAA Security Issues . . . . . . . . . . . . . . . . . . .   4
     2.3.  X.509 Security Issues . . . . . . . . . . . . . . . . . .   5
   3.  Trust Router Objectives . . . . . . . . . . . . . . . . . . .   6
   4.  Entities in the system  . . . . . . . . . . . . . . . . . . .   6
     4.1.  End User  . . . . . . . . . . . . . . . . . . . . . . . .   6
     4.2.  Service Provider  . . . . . . . . . . . . . . . . . . . .   6
     4.3.  Community of Registration (COR) . . . . . . . . . . . . .   7
       4.3.1.  Atomic CORs . . . . . . . . . . . . . . . . . . . . .   7
       4.3.2.  Mesh CORs . . . . . . . . . . . . . . . . . . . . . .   7
       4.3.3.  Release of Information  . . . . . . . . . . . . . . .   8
     4.4.  Communities of Interest (COI) . . . . . . . . . . . . . .   8
       4.4.1.  Security Issues . . . . . . . . . . . . . . . . . . .  10
     4.5.  Trust Backbone  . . . . . . . . . . . . . . . . . . . . .  10
     4.6.  Trusted Introducers . . . . . . . . . . . . . . . . . . .  11
       4.6.1.  Trusted Introducer Initiator  . . . . . . . . . . . .  11
       4.6.2.  Trusted Introducer Router . . . . . . . . . . . . . .  11
       4.6.3.  Trusted Introducer Target . . . . . . . . . . . . . .  11
   5.  Communication Flows . . . . . . . . . . . . . . . . . . . . .  11
     5.1.  COI Distribution  . . . . . . . . . . . . . . . . . . . .  12
     5.2.  COR Connectivity  . . . . . . . . . . . . . . . . . . . .  12
     5.3.  AAA Entity Introduction . . . . . . . . . . . . . . . . .  12
   6.  Putting it all together . . . . . . . . . . . . . . . . . . .  13
     6.1.  Scenario - One Trust Backbone . . . . . . . . . . . . . .  13
     6.2.  Scenario - Three Trust Backbones  . . . . . . . . . . . .  14
   7.  Security Considerations . . . . . . . . . . . . . . . . . . .  15
   8.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  16
   9.  Acknowledgments . . . . . . . . . . . . . . . . . . . . . . .  16
   10. References  . . . . . . . . . . . . . . . . . . . . . . . . .  16
     10.1.  Normative References . . . . . . . . . . . . . . . . . .  16
     10.2.  Informative References . . . . . . . . . . . . . . . . .  16
   Author's Address  . . . . . . . . . . . . . . . . . . . . . . . .  17

1.  Introduction

   The following document is a product of my diseased mind as opposed to
   the deceased minds of the Janet Group or Painless Security.
   Specifically, this document uses terms that are defined in
   [I-D.howlett-abfab-trust-router-ps] and in
   [I-D.mrw-abfab-trust-router] but in completely different ways.  One
   therefor needs to be clear about which document one is looking at
   when referring to these documents as oppose to this one.





Schaad                  Expires December 01, 2013               [Page 2]

Internet-Draft            Trust Router Problem                  May 2013


   The ABFAB architecture as outlined by [I-D.ietf-abfab-arch] provides
   the necessary information for understanding the basic needs of ABFAB.
   As outlined in that document, there are still number of worries in
   terms of trying to implement the ABFAB architecture in the real
   world.  These worries come out of the way that some of the basic
   components used by ABFAB where orignally designed to be used, and the
   way that they are actually used in the AFBAB architecture.  This
   document examines some of the perceived short comings of those
   component and provides a basic paradigm that is believed to address
   those short comings.  In this document a number of issues that any
   solution adopting that paradigm is also going need to be addressed
   are outlined.

   This write up of the problem statement reflects to some degree a
   proposed solution to the problem, however it does so in the most
   general terms possible.  Some pieces are fixed by the ABFAB
   architecture, such as the use of RADIUS clients and servers for user
   authentication, however other pieces are intentionally left nebulous
   (what does the inter AAA server routing look like).  A basic picture
   of how the different pieces are put together can be found in Figure
   1.

2.  Justification

   This section outlines a number of different areas where components of
   the current architecture are considered to be deficient.

2.1.  AAA Routing Problems

   The fist selection of problems that are examined are related to how
   routing is done in the AAA architecture.  These issues are, in many
   cases, specific to the RADIUS version of AAA.  The problems may or
   may not also apply to Diameter, however as ABFAB as currently
   deployed is focused on RADIUS rather than Diameter these issues still
   need to be addressed.

   o  There is expected to be a large amount of data that is passed
      between the EAP server and the EAP client as part of the
      validation process.  This is a logical consequence of the fact
      that we will be using TEAP [I-D.ietf-emu-eap-tunnel-method] which
      is based on TLS and thus can contain large certificates, CRLs and
      other cryptographic information.  Hosting this on top of UDP is
      not going to be successful in the long run, the amount of
      fragmenting both at the UDP level and at the RADIUS and EAP levels
      will lead to poor performance in many cases.  The use of TLS/TCP
      [RFC6613][RFC6614], with it's session state and recovery will help
      this problem.




Schaad                  Expires December 01, 2013               [Page 3]

Internet-Draft            Trust Router Problem                  May 2013


   o  Routing needs to be static rather than dynamic from end-to-end.
      Given that the routing is based on the conditions required for the
      set of messages under consideration, the policy enforcement needs
      to be consistent, allowing for routing of each packet in the
      stream independently means that enforcement of constraints cannot
      be consistently enforced.  Again, the use of TLS/TCP helps if one
      assumes that sessions are kept up for longer

   o  Adding and removing destinations from the routing tables is hard
      as it must be done for every entity on the backbone.

   o  There is currently no way to apply policy to the routing of items
      based on such things as the LOA desired by the message.

2.2.  AAA Security Issues

   The next selection of problems to be examined are the security issues
   related to the AAA routing infrastructure is deficient to meet the
   needs of a truly secure system.

   The following represents a set of reasons why the current RADIUS
   security is not adequate.

   o  Link level security is the current state of the art for RADIUS
      servers, however it is frequently missing on individual links and
      it is not possible for either end point to verify that link level
      security is provided over the entirety of the system.

   o  Link level security is currently configured on each hop in the
      link.  It would be preferable that the security could be
      "centrally" configured.

   o  Different message need to be routed differently based on the level
      of security needed for the message.  This is currently addressed
      by either having all of the links configured to be at the highest
      level of security or for there to be multiple links between
      different entities based on the different levels.  Since the
      configuration is done on each pair of RADIUS entities, there is no
      easy way for a third party auditing service to either add or
      remove entities from the backbone based on an evaluation of their
      security practices.

   o  RADIUS security is monolithic in concept, this means that one
      cannot readily have multiple different communities with different
      needs use a single RADIUS network.  The network would need to be
      configured at the highest needs, but that may not be is not
      necessary for all of the communities.




Schaad                  Expires December 01, 2013               [Page 4]

Internet-Draft            Trust Router Problem                  May 2013


   RADIUS dynamic discovery [I-D.ietf-radext-dynamic-discovery] has
   attempted to address some of these issues, however based on the
   discussions on the RADEXT mailing list this has not always been
   successful.  Some of the issues found are:

   o  Setting up the correct security infrastructure based on X.509
      certificates is still too high of a bar for some RADIUS server
      operators.  This means that people are setting up proxy servers
      which are discoverer and these then talk to the actual RADIUS
      server.

   o  There are problems with how naming of entities should be done and
      what name checking needs to be done when comparing a RADIUS server
      with the contents of an X.509 certificate.  This becomes even more
      complex when there are proxy servers in the path.

   o  The use of unsecured DNS records to do the lookup from the
      original AAA domain name to a server name is problematic as there
      is no reason to believe that this cannot be easily attacked by DNS
      cache poisoning.

2.3.  X.509 Security Issues

   Finally we look at the some issues with X.509 security.  There is no
   way when using the ABFAB architecture to avoid the possibility of
   using X.509 certificates.  The EAP method TEAP uses TLS, and thus
   will likely use an X.509 certificate, even if it is self-signed.

   With in the community of ABFAB architecture proponents, is it an
   article of faith that the PKIX architecture [RFC5280] is broken and
   cannot be trusted.  There are many components that go into this
   statement, however it is as much a statement of religion as it is of
   reality for the proponents of the ABFAB architecture.  That being
   said, there are a number of reasons why this position can be taken.

   o  Correct and usable name formats are very difficult to get correct.
      This is especially true when proxying needs to be done for.  As an
      example see [I-D.ietf-radext-dynamic-discovery] for why this is
      the case.

   o  Revocation processing and checking of PKIX systems is frequently
      missing.

   o  Trust Anchors are a problem when looking in these scenarios.  One
      cannot generally have a single trust anchor due to political a
      trust problems, however having a multiplicity of trust points can
      yield problems when trying to decide who and why trust can be
      placed.  Either one is dependent on a general purpose trust system



Schaad                  Expires December 01, 2013               [Page 5]

Internet-Draft            Trust Router Problem                  May 2013


      (i.e., the current set of commercial Certificate Authorities) or
      one needs to setup a special purpose CA for the requirements of
      the current infrastructure.

   o  Attribute certificates [RFC5755] have never been readily adopted
      as a way to convey attributes.

   o  Provisioning and restricting of trust anchors is proving
      problematic in many cases.  This can even be seen in terms of how
      one should provision a clients computer with the appropriate trust
      anchor for doing EAP validation in the case of using TEAP.

3.  Trust Router Objectives

   There are three main objectives for this work:

   1.  Publish the location of AAA servers in a secure manner to all AAA
       clients within a trusted network.

   2.  Create a mechanism to allow for creation of sub-communities
       within a AAA system.

   3.  Create a temporary "short-lived" direct link with a DH or ECDH
       key pair for validation between an AAA client/proxy (near the
       service) and the AAA server for the user (near the IDP).  The
       link created will carry policy information for governing the
       release of information from the IDP to the AAA client.

4.  Entities in the system

   This section documents a number of basic entities that are
   participating in the trust router system.  Some of these entities are
   included for completeness as they are part of the ABFAB architecture,
   but are not direct participants in the Trust Router architecture.

4.1.  End User

   The end user is the entity that is requesting a service from the
   service provider.

   The end user has no pre-existing relationship with the service
   provider.  The end user does have a pre-existing relationship with an
   IDP.  The relationship with the IDP will include the ability for a
   set of cryptographic credentials to be used to validate the user to
   the IDP.  This validation is done using one or more EAP methods.

4.2.  Service Provider




Schaad                  Expires December 01, 2013               [Page 6]

Internet-Draft            Trust Router Problem                  May 2013


   The Service Provider is used by the end user to get some service.
   The Service Provider has a pre-exsting relationship with a local AAA
   proxy.  The Service Provider itself will be a AAA client.

   There is an issue with the current AAA system that needs to be
   examined, the ABFAB architecture requires that the AAA proxy that the
   SP connects to validate information about the SP.  With a large
   number of SPs being added to and removed from the AAA network, we
   need to look for a way of using the AAA architecture itself to do the
   validation of the SP rather than using the configuration of public
   keys in the AAA proxy.  This can be done with a X.509 certificate
   architecture, however this would not match the overall principle of
   not using X.509 certificates.  The use of EAP and a AAA server to do
   the authentication and attribute checking would make the
   administration of SPs and End Users similar which would reduce
   administrative problems.

4.3.  Community of Registration (COR)

   At its most basic level, a Community of Registration (COR) consists
   of a set of entities and an IDP that can authenticate those entities.
   A COR operator has a specific set of requirements about how entities
   are to be initially identified, how they are to be authenticated each
   time they appear and what information is to released to third parties
   upon request.  A COR operator may have a multiplicity of such
   requirements based on internal policies and requests from service
   providers.  A Level Of Assurance (LOA) is one of the pieces of
   information that a COR would have in this set of requirements.

4.3.1.  Atomic CORs

   An Atomic COR consists of a single database of registration.  It may
   consist of one or more on-line presences, but each on-line presence
   is required to produce exactly the same results.

4.3.2.  Mesh CORs

   The following is a potential feature and may not make it into the
   final output.

   It makes sense to allow for CORs to be aggregated together into a
   single unit, thus for example the University of Washington could run
   a mesh COR that comprises of the CORs for the undergraduate school,
   the law school, the medical school, etc..







Schaad                  Expires December 01, 2013               [Page 7]

Internet-Draft            Trust Router Problem                  May 2013


   There is a known privacy issue with allowing the existence of mesh
   CORs, multiple correlated queries can be constructed that can leak
   information about which COR an entity is associated, even if that
   information is not directly provided to the SP.

4.3.3.  Release of Information

   The main function of a COR in the ABFAB architecture is to release
   information about the end user to the service provider.  The smallest
   amount of information that can be provided is to say that the COR
   does or does not recognized the end user.  At the larger end of
   infomration provided, the COR can responde to an SP request with a
   large number of attributes about the end user as part of a SAML
   statement.

   The decision of releasing attributes about the end user is an
   important issue, the least possible amount of information should
   generally be released.  If the user can participate in the decision
   to release information then that should be encouraged, such
   participation is not always possible.  The release of information
   should always be in accordance with the policy of the IDP and, in
   many cases, should be an auditible function.

   There is a need to look at how policies are to be provided for both
   external review and auditing.  It is not clear that this is a strong
   requirement ala the CPS framework that PKIX created [RFC3647].
   However, the more standardized and machine readable this information
   is, the simpler it would be for tools to be able to process and look
   at this information.  This may be an issue when starting to look at
   how things such as attributes are mapped when crossing trust
   boundaries.

4.4.  Communities of Interest (COI)

   One of the goals of this work is to allow for the formation of closed
   subsets of users and services within the overall trust architecture
   that is created.  These closed subsets are called Communities of
   Interest.

   A COI is defined by the following properties:

   o  The name of the COI.  COIs are expected to be uniquely named
      within some domain.  The domain that is used and how that is
      expressed needs to be determined.

   o  Version control on the COI.  This may be some type of
      monotonically increasing value or a time of last update indicator.
      If there are multiple possible configuration locations in the



Schaad                  Expires December 01, 2013               [Page 8]

Internet-Draft            Trust Router Problem                  May 2013


      system then a time value may be better as collisions on a counter
      could collide.  In any event there may be a requirement for
      detection of update collisions.

   o  The set of users that can participate in the COI.  The set of
      users are defined by the use of one or more attribute.  These
      attributes can include the name of the user (expressed as an NAI),
      the COR for a group of users (i.e. everyone at the University of
      Washington) roles, departments and so forth.  The method of
      expressing the attributes needs to be defined, however one of the
      issues that needs to be dealt with is that fact that the
      attributes are frequently dependent on the COR that issues them.
      This means that attributes will either need to be defined by the
      COI, the trust backbone, a global attribute definier or have the
      ability to some type of mapping of attribute names.

   o  The set of security properties that are required for users.  Even
      when a user might be able to participate in a COI, the location of
      the user and the methods of authentication used by the user may
      rule out participating in the COI at a given moment.  The security
      proprities represent a set of dynamic properpties based on how the
      user is attached to the network rather than relatively static
      properties that the COR will maintain over time.  The security
      properites may also represent tasks that the COR is requried to
      perform during the authentication.  An example would be that a COI
      requires a specific LOA to be used in authenticating the user.
      This is a property of the COI and not a property of the user.

   o  The set of service providers that are permitted to use the COI.
      SPs may be specified by name or other attributes in a similar
      manner to that done for users.

   o  The set of security properties that are required for SPs.  This is
      similar to the set of security proprieties that are required for
      users.

   o  The set of security properties that are required for the Trusted
      Introducers.  This is similar to the set of security properties
      that are required for users.

   COIs are managed in a central location rather than being distributed
   through the system.  It is presumed that the management of COIs is
   connected to the management of Trust Introducers, but that is an
   issue that will need to be resolved by the protocol.

   It can be seen that ability to make COIs be hierarchical would be a
   convenient practice.  As an example, a COI could be maintained for
   every physical location of the University of Washington.  It would



Schaad                  Expires December 01, 2013               [Page 9]

Internet-Draft            Trust Router Problem                  May 2013


   then be able to group those COIs in a hierarchical manner grouping by
   larger and larger locations until the entire school is covered.  This
   means that if a new user or service provider were added to one of the
   leafs in the tree then it automatically propagates into all of the
   nodes above it in the tree without additional administrative work.

4.4.1.  Security Issues

   There are a number of security issues that will need to be addressed:

   o  Should a COI be able to coop a COR without the consent of the COR.

   o  Depending on how COIs are defined, they can be turned into oracles
      about the members of CORs.

   o  If an SP can use multiple COIs, then it needs a way to select
      which COI to use for any single transaction.  The choice of the
      COI then needs to be provided to the Trust Backbone.

   o  There are no provisions for the existence of a COI to be published
      to either SPs or users.  Does there need to be a method for doing
      so?

   o  When COIs are propagated around the trust backbone, does the data
      about them need to be kept confidential.  While the existence of a
      COI is probably not a big security risk, knowledge of the security
      parameters and entity attributes about the users of the COI may
      constitute a security risk.

4.5.  Trust Backbone

   The trust backbone is a generic term that is being used to designate
   the network of systems which are responsible for connecting the
   different CORs together.  A trust backbone can come in two flavors:
   Intra backbones are maintained by a single entity and operate at a
   single level of security.  Inter backbones consist of multiple intra
   backbones with special systems that operate on the boundaries between
   the different intra backbone to mediate the differences in security
   practices.

   Information flows both within a single backbone and between different
   backbones.  Within a single backbone, all information flows
   unmodified.  However when information crosses between backbones it is
   frequently modified to deal with differences in policies or simply
   prevented from passing across the boundary.

   A trust backbone will normally have multiple CORs in it.  A trust
   backbone is the location where COIs are introduced into the system.



Schaad                  Expires December 01, 2013              [Page 10]

Internet-Draft            Trust Router Problem                  May 2013


4.6.  Trusted Introducers

   The concept of a trusted introducer has been around for a long time.
   This is the basic method by which webs of trust are created.  The
   basic model that is to be used will be based on a web of trust and
   trusted introducers.

   The trusted introducer subsystem is the method where a direct link is
   going to be established between the AAA proxy near the SP and the AAA
   server for the end user.

4.6.1.  Trusted Introducer Initiator

   The Trusted Introducer Initiator (TII) is expected to be integrated
   into the AAA proxy that is adjacent to the SP.  The TII is the
   location where the introduction protocol is kicked off.  The TII is
   required to do the necessary enforcement of the SP identity and
   attributes with the security properties of the backbone and the COI
   selected by the SP.

4.6.2.  Trusted Introducer Router

   The Trusted Introducer Router (TIR) is the basic routing element of
   the trusted introducer network.  TIRs come in two flavors, internal
   and boundary TIRs.  The internal TIR is a simple thing that just does
   routing and the necessary security enforcements.  A boundary TIR on
   the other hand is responsible to dealing with all of the security
   problems that are needed with crossing a security boundary.

4.6.3.  Trusted Introducer Target

   A Trusted Introducer Target (TIT) is expected to be integrated into
   the AAA server.  The TIT is the target of the trusted initiator
   protocol.  The TIT is required to do the necessary enforcement of
   security parameters that are imposed by the AAA server and then
   return the necessary information for the AAA proxy associated with
   the TII to setup a direct TLS link between it and the AAA server.

   Once a TLS link between the AAA server and the AAA proxy has been
   established, it may be used for more than one AAA protocol exchange.
   This means that it is a requirement that the AAA server apply all of
   the security information setup on the TLS link be enforced on each
   AAA protocol exchange.

5.  Communication Flows






Schaad                  Expires December 01, 2013              [Page 11]

Internet-Draft            Trust Router Problem                  May 2013


   There are going to be three different sets of information that will
   need to flow through the system.  We examine each of those flows and
   the properties that are needed.

5.1.  COI Distribution

   The system will need to distribute information about all COIs from
   the centralized configuration points to all of the AAA entities in
   the system.

5.2.  COR Connectivity

   The system will need to distribute the information necessary to build
   a path from any specific Trust Introducer to any given COR.  In point
   of fact, there may be CORs in the system that will not be reachable
   from a specific Trust Introducer due to security constraints on the
   distribution of COR connectivity.

   One of the interesting questions that will need to be explored is:
   Can the COR and COI information be distributed independently and
   combined on the AAA systems or does it need to be combined by the
   Trust Brokers that are doing the distribution of this information.

5.3.  AAA Entity Introduction

   This flow of communication represents the final goal of the protocol.
   We want to be able to build up a TLS connection between the AAA proxy
   that resides nearest to the SP and the AAA server that is going to be
   used to validate the user.

   In building the connection between the proxy and the server the
   following will need to be taken into account:

   o  The identity of the service provider.

   o  The security properties of the connection between the service
      provider and the AAA proxy.

   o  The COI that will govern the connection.

   o  The possible routes between the AAA proxy and the AAA server and
      their security properties.

   Note that no information about the user except the target COR is used
   in the path construction as no such information is both available and
   reliable.  Until the authentication between the user and the COR has
   completed the network will have no idea about the user except for the
   claimed COR.



Schaad                  Expires December 01, 2013              [Page 12]

Internet-Draft            Trust Router Problem                  May 2013


6.  Putting it all together

   In this section there are a number of pictures of different
   configurations that are germane to the problem

6.1.  Scenario - One Trust Backbone

   In this scenario, we are looking at what is the basic roll out that
   will be done.  In this scenario there are four different security
   zones:

   o  The trust backbone,

   o  The COR for organization A,

   o  The COR for organization B,

   o  The external world


                             +----------+
                             |  COI     |
                             | Manager  |
                             +----------+
                                 ^                      |
                                 |
                                 v                      |
            +----------+        +----------+       +----------+
            |          |        |          |       |  Edge    |
            |  TIR  B  |<------>| TIR A    |<----->|  TIR     |
            |          |        |          |       |          |
            +----------+        +----------+       +----------+
                 ^                    ^                 |
                 |                    |
                 v                    v                 |
            +----------+          +----------+
            | TIT      |          | TII      |          |
       -  - |          |  -+- - - |          | - - - -  +
            +----------+   |      +----------+          |
                 ^                     ^
                 |         |           |
                 v                     v                |
            +----------+   |      +----------+
            |AAA Server|<-------->| AAA      |          |   External
            | IDP      |   |      | Proxy    |              World
            +----------+          +----------+          |
                           |           ^
                                       |                |



Schaad                  Expires December 01, 2013              [Page 13]

Internet-Draft            Trust Router Problem                  May 2013


                           |           |
                                       v                |
            +----------+   |      +----------+
            | Subject  |--------->| Relying  |          |
            |          |   |      | Party &  |
            +----------+          | AAA      |          |
                           |      | Client   |
                                  +----------+          |
                           |
              COR B        |        COR A               |



                    Multiple CORs - One Trust Backbone

   There may be a need to create a different scenario for discussion
   about what happens if there is a single COR.  Specifically, on needs
   to look at the question: Does one still need to go through a AAA
   proxy and the trusted introducer protocol or can the SP go directly
   to the AAA Server?  If one goes directly, then there are some
   security gateways that might not get checked.

6.2.  Scenario - Three Trust Backbones

   In this scenario, we are looking at a more complex roll out.  In this
   scenario there are five different security zones:

   o  The trust backbone for A,

   o  The trust backbone for B,

   o  The trust backbone for C,

   o  The COR D,

   o  The COR E.

   In the picture, there is a distinction between the internal and the
   edge trust routers.  In an actual roll out there may not be distinct
   components.  However for conversation purposes it is easier to keep
   then separate.

           Trust Realm A       | Trust Realm B |      Trust Realm C

            +----------+       |               |        +----------+
            |  COI     |                                |  COI     |
            | Manager  |       |               |        | Manager  |
            +----------+                                +----------+



Schaad                  Expires December 01, 2013              [Page 14]

Internet-Draft            Trust Router Problem                  May 2013


                ^              |               |              ^
                |                                             |
                v              |               |              v
          +----------+    +----------+    +----------+    +----------+
          |          |    |  Edge    |    |  Edge    |    |          |
          |  TIR A1  |<-->|  TIR AB  |<-->|  TIR BC  |<-->|  TIR C1  |
          |          |    |          |    |          |    |          |
          +----------+    +----------+    +----------+    +----------+
               ^               |   ^        ^  |             ^
               |                   v        v                |
               5               |  +---------+  |             3
               |                  |         |                |
               v               |  | TIR B1  |  |             v
          +----------+            |         |           +----------+
          | TIT      |         |  +---------+  |        | TIC      |
       - -|          |- - - - -                 - - - - |          | - -
          +----------+         |               |        +----------+
               ^                                             ^
               |               |               |             |
               v                                             v
          +----------+         |               |        +----------+
          |AAA Server|<-------------------------------->| AAA      |
          | IDP      |         |               |        | Proxy    |
          +----------+                                  +----------+
                               |               |             ^
                                                             |
                                                             v
          +----------+         |               |        +----------+
          | Subject  |--------------------------------->| Relying  |
          |          |         |               |        | Party &  |
          +----------+                                  | AAA      |
                               |               |        | Client   |
                                                        +----------+
                               |               |
            COR D              |               |    COR E



                          Figure 1: Architecture

7.  Security Considerations

   This document does not define a protocol and as such has no direct
   security considerations.  The document does pose a number of
   questions dealing with security that will need to be addressed by a
   protocol that implements the problem stated here.





Schaad                  Expires December 01, 2013              [Page 15]

Internet-Draft            Trust Router Problem                  May 2013


8.  IANA Considerations

   This document has no IANA considerations.

9.  Acknowledgments

   This document is an expansion of an email message that was originally
   sent to Alan DeKork and was probably passed on to others.

10.  References

10.1.  Normative References

   [I-D.ietf-abfab-arch]
              Howlett, J., Hartman, S., Tschofenig, H., Lear, E., and J.
              Schaad, "Application Bridging for Federated Access Beyond
              Web (ABFAB) Architecture", draft-ietf-abfab-arch-06 (work
              in progress), April 2013.

10.2.  Informative References

   [I-D.howlett-abfab-trust-router-ps]
              Howlett, J., Smith, R., and M. Wasserman, "Trust
              Requirements in a Federated World", draft-howlett-abfab-
              trust-router-ps-03 (work in progress), March 2013.

   [I-D.mrw-abfab-trust-router]
              Wasserman, M., Hartman, S., and J. Howlett, "Application
              Bridging for Federation Beyond the Web (ABFAB) Trust
              Router Protocol", draft-mrw-abfab-trust-router-02 (work in
              progress), February 2013.

   [RFC5280]  Cooper, D., Santesson, S., Farrell, S., Boeyen, S.,
              Housley, R., and W. Polk, "Internet X.509 Public Key
              Infrastructure Certificate and Certificate Revocation List
              (CRL) Profile", RFC 5280, May 2008.

   [I-D.ietf-radext-dynamic-discovery]
              Winter, S. and M. McCauley, "NAI-based Dynamic Peer
              Discovery for RADIUS/TLS and RADIUS/DTLS", draft-ietf-
              radext-dynamic-discovery-06 (work in progress), February
              2013.

   [I-D.ietf-emu-eap-tunnel-method]
              Zhou, H., Cam-Winget, N., Salowey, J., and S. Hanna,
              "Tunnel EAP Method (TEAP) Version 1", draft-ietf-emu-eap-
              tunnel-method-05 (work in progress), February 2013.




Schaad                  Expires December 01, 2013              [Page 16]

Internet-Draft            Trust Router Problem                  May 2013


   [RFC5755]  Farrell, S., Housley, R., and S. Turner, "An Internet
              Attribute Certificate Profile for Authorization", RFC
              5755, January 2010.

   [RFC6613]  DeKok, A., "RADIUS over TCP", RFC 6613, May 2012.

   [RFC6614]  Winter, S., McCauley, M., Venaas, S., and K. Wierenga,
              "Transport Layer Security (TLS) Encryption for RADIUS",
              RFC 6614, May 2012.

   [RFC3647]  Chokhani, S., Ford, W., Sabett, R., Merrill, C., and S.
              Wu, "Internet X.509 Public Key Infrastructure Certificate
              Policy and Certification Practices Framework", RFC 3647,
              November 2003.

Author's Address

   Jim Schaad
   Soaring Hawk Consulting

   Email: ietf@augustcellars.com






























Schaad                  Expires December 01, 2013              [Page 17]