JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for MOONSHOT-DEV Archives


MOONSHOT-DEV Archives

MOONSHOT-DEV Archives


MOONSHOT-DEV@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

MOONSHOT-DEV Home

MOONSHOT-DEV Home

MOONSHOT-DEV  September 2013

MOONSHOT-DEV September 2013

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

Comments on constraints

From:

Sam Hartman <[log in to unmask]>

Date:

Mon, 9 Sep 2013 18:17:05 -0400

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (61 lines)

Margaret and I were discussing how we expect constraints to be
communicated between trust_router and freeradius.

Within Freeradius, we'll receive an access-request packet including the
gss-acceptor-host-name and gss-acceptor-realm-name


It's possible that new constraint types will be added in the future
perhaps related to how a specific service considers
gss-acceptor-service-specifics.  Or perhaps related to
gss-acceptor-service-name.

The current constraints are strings containing  possibly prefix-matched
wildcards.

So, a constraint might look like "print-server.painless-security.com" or
"*.painless-security.com"

Currently the trust router and  Freeradius use an sqlite database to
communicate.

We'd like to set up things so that  it's efficient to  perform a single
database query for each type of constraint.

Also, the we need to discuss how we'll index the constraints.
From the standpoint of the trust router, a connection is identified by a
key ID.  However, as we've discussed, An RP proxy will tend to use the
most-recently created  key to a given realm.
So we want to merge privileges based on the DH public key used by the RP
proxy.

So, we include a dh_key column in the keys table along with the PSK key
name and the PSK.  This will allow Freeradius which DH public key is
used to set up the association.

Then we establish a table for each type of constraint looking something
like:

create table host_constraints (dh_key string, host_constraint string,
unique(dh_key, host_constraint));

Then we can do
select from host_constraints hc, keys k where k.dh_key = hc.dh_key
       and k.key_id = key_id_from_tls
       and constraint_from_packet like hc.host_constraint

If we encode the host_constraint to be compatible with an SQL like
clause, then everything works.

So, we'll want a function to iterate over all the constraints of a
specified type that are present in a request.

we'll also need a function to convert from our prefix match form into an
SQL like clause form, but that's relatively easy.

This set of queries is only efficient if there are a relatively small
number of constraint rows for a given dh_key.  I think that's going to
be very likely though.

Thoughts?

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

April 2024
March 2022
December 2021
October 2021
September 2021
August 2021
June 2021
April 2021
February 2021
January 2021
December 2020
November 2020
October 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
July 2019
June 2019
May 2019
April 2019
March 2019
February 2019
January 2019
December 2018
November 2018
April 2018
February 2018
January 2018
December 2017
November 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
February 2017
January 2017
December 2016
October 2016
September 2016
August 2016
June 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
August 2015
July 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
July 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager