[gnso-rds-pdp-wg] Definitions: Authentication and Anonymity
Paul Keating
Paul at law.es
Tue May 16 12:56:46 UTC 2017
I agree which is why I supported the change of times.
However, I also stated that it essentially duplicated calls because
consensus must be measured across more than one call IMHO.
PRK
From: <gnso-rds-pdp-wg-bounces at icann.org> on behalf of "Gomes, Chuck via
gnso-rds-pdp-wg" <gnso-rds-pdp-wg at icann.org>
Reply-To: "Gomes, Chuck" <cgomes at verisign.com>
Date: Tuesday, May 16, 2017 at 2:46 PM
To: "vgreimann at key-systems.net" <vgreimann at key-systems.net>,
"gnso-rds-pdp-wg at icann.org" <gnso-rds-pdp-wg at icann.org>
Subject: Re: [gnso-rds-pdp-wg] Definitions: Authentication and Anonymity
> I understand the difficulty of participating in the middle of the night and do
> not criticize anyone for not doing so, but I do think it is important to
> realize that WG members from the Asia Pacific region have that problem for at
> least 34 of our meetings.
>
> Chuck
>
>
> From: gnso-rds-pdp-wg-bounces at icann.org
> [mailto:gnso-rds-pdp-wg-bounces at icann.org] On Behalf Of Volker Greimann
> Sent: Tuesday, May 16, 2017 4:54 AM
> To: gnso-rds-pdp-wg at icann.org
> Subject: [EXTERNAL] Re: [gnso-rds-pdp-wg] Definitions: Authentication and
> Anonymity
>
> Same here. That time is just not workable for me.
>
>
>
> Am 16.05.2017 um 02:13 schrieb Greg Aaron:
>> Thanks you, Lisa.
>>
>> I will be unable to make the next meeting because the 05:00 UTC meeting time.
>>
>> Based on last week¹s meeting, I I think we are aiming for something like:
>> "Thin data elements must be accessible to anonymous requestors, without
>> authentication.²
>>
>> If we say:
>> "Thin data elements must be accessible without requestor authentication"
>> then that means consumers of registration data might or might not be
>> anonymous.
>> For example, a registry operator could make me register my IP address, from
>> which I can query registration data. Those queries could be made without
>> authentication (a username/password), and so the registry¹s registration
>> program could be allowed. But arguably I would not be anonymous.
>>
>> Whatever policy language is proposed must be examined for how it can be
>> interpreted and possibly bypassed. Both the intent of the WG and the
>> specific language will eventually need to be laid out.
>>
>> So I also suggest it be made explicit that access to registration data remain
>> free, without charge.
>>
>> All best,
>> --Greg
>>
>>
>>
>>
>>
>>
>> From: Lisa Phifer [mailto:lisa at corecom.com]
>> Sent: Wednesday, May 10, 2017 12:04 PM
>> To: Greg Aaron <gca at icginc.com> <mailto:gca at icginc.com> ; Gomes, Chuck
>> <cgomes at verisign.com> <mailto:cgomes at verisign.com> ;
>> gnso-rds-pdp-wg at icann.org
>> Subject: Definitions: Authentication and Anonymity
>>
>> All,
>>
>> Starting a new thread to pursue Greg's suggestion to agree upon definitions
>> for "authentication" and "anonymity" to help the WG address the charter
>> question now under deliberation.
>>
>> Below are a few definitions copied verbatim from RFC 4949 (
>> https://tools.ietf.org/html/rfc4949 <https://tools.ietf.org/html/rfc4949> )
>> as a starting point for WG discussion of these and other possible
>> sources/definitions.
>>
>> Lisa
>>
>> From RFC 4949:
>> $ anonymity
>> (I) The condition of an identity being
>> unknown or concealed. (See:
>> alias, anonymizer, anonymous credential,
>> anonymous login,
>> identity, onion routing, persona
>> certificate. Compare: privacy.)
>>
>> Tutorial: An application may require
>> security services that
>> maintain anonymity of users or other
>> system entities, perhaps to
>> preserve their privacy or hide them from
>> attack. To hide an
>> entity's real name, an alias may be used;
>> for example, a financial
>> institution may assign account numbers.
>> Parties to transactions
>> can thus remain relatively anonymous, but
>> can also accept the
>> transactions as legitimate. Real names of
>> the parties cannot be
>> easily determined by observers of the
>> transactions, but an
>> authorized third party may be able to map
>> an alias to a real name,
>> such as by presenting the institution with
>> a court order. In other
>> applications, anonymous entities may be
>> completely untraceable.
>>
>> From RFC 4949:
>> $ anonymous login
>> (I) An access control feature (actually,
>> an access control
>> vulnerability) in many Internet hosts that
>> enables users to gain
>> access to general-purpose or public
>> services and resources of a
>> host (such as allowing any user to
>> transfer data using FTP)
>> without having a pre-established,
>> identity-specific account (i.e.,
>> user name and password). (See:
>> anonymity.)
>>
>> Tutorial: This feature exposes a system to
>> more threats than when
>> all the users are known, pre-registered
>> entities that are
>> individually accountable for their
>> actions. A user logs in using a
>> special, publicly known user name (e.g.,
>> "anonymous", "guest", or
>> "ftp"). To use the public login
>> name, the user is not required to
>> know a secret password and may not be
>> required to input anything
>> at all except the name. In other cases, to
>> complete the normal
>> sequence of steps in a login protocol, the
>> system may require the
>> user to input a matching, publicly known
>> password (such as
>> "anonymous") or may ask the user
>> for an e-mail address or some
>> other arbitrary character string.
>>
>> From RFC 4949:
>> $ authenticate
>> (I) Verify (i.e., establish the truth of)
>> an attribute value
>> claimed by or for a system entity or
>> system resource. (See:
>> authentication, validate vs. verify,
>> "relationship between data
>> integrity service and authentication
>> services" under "data
>> integrity service".)
>>
>> Deprecated Usage: In general English
>> usage, this term is used with
>> the meaning "to prove genuine"
>> (e.g., an art expert authenticates
>> a Michelangelo painting); but IDOCs should
>> restrict usage as
>> follows:
>> - IDOCs SHOULD NOT use this term to
>> refer to proving or checking
>> that data has not been
>> changed, destroyed, or lost in an
>> unauthorized or
>> accidental manner. Instead, use "verify".
>> - IDOCs SHOULD NOT use this term to
>> refer to proving the truth or
>> accuracy of a fact or
>> value such as a digital signature.
>> Instead, use
>> "verify".
>> - IDOCs SHOULD NOT use this term to
>> refer to establishing the
>> soundness or correctness
>> of a construct, such as a digital
>> certificate. Instead,
>> use "validate".
>>
>> From RFC 4949:
>> $ authentication
>> (I) The process of verifying a claim that
>> a system entity or
>> system resource has a certain attribute
>> value. (See: attribute,
>> authenticate, authentication exchange,
>> authentication information,
>> credential, data origin authentication,
>> peer entity
>> authentication, "relationship between
>> data integrity service and
>> authentication services" under
>> "data integrity service", simple
>> authentication, strong authentication,
>> verification, X.509.)
>>
>> Tutorial: Security services frequently
>> depend on authentication of
>> the identity of users, but authentication
>> may involve any type of
>> attribute that is recognized by a system.
>> A claim may be made by a
>> subject about itself (e.g., at login, a
>> user typically asserts its
>> identity) or a claim may be made on behalf
>> of a subject or object
>> by some other system entity (e.g., a user
>> may claim that a data
>> object originates from a specific source,
>> or that a data object is
>> classified at a specific security level).
>>
>> An authentication process consists of two
>> basic steps:
>> - Identification step: Presenting
>> the claimed attribute value
>> (e.g., a user
>> identifier) to the authentication subsystem.
>> - Verification step: Presenting or
>> generating authentication
>> information (e.g., a
>> value signed with a private key) that acts
>> as evidence to prove the
>> binding between the attribute and that
>> for which it is claimed.
>> (See: verification.)
>>
>> ---------
>>
>>
>>
>> _______________________________________________
>> gnso-rds-pdp-wg mailing list
>> gnso-rds-pdp-wg at icann.org
>> https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg
>
>
> --
> Bei weiteren Fragen stehen wir Ihnen gerne zur Verfügung.
>
> Mit freundlichen Grüßen,
>
> Volker A. Greimann
> - Rechtsabteilung -
>
> Key-Systems GmbH
> Im Oberen Werk 1
> 66386 St. Ingbert
> Tel.: +49 (0) 6894 - 9396 901
> Fax.: +49 (0) 6894 - 9396 851
> Email: vgreimann at key-systems.net
>
> Web: www.key-systems.net <http://www.key-systems.net> / www.RRPproxy.net
> <http://www.RRPproxy.net>
> www.domaindiscount24.com <http://www.domaindiscount24.com> /
> www.BrandShelter.com <http://www.BrandShelter.com>
>
> Folgen Sie uns bei Twitter oder werden Sie unser Fan bei Facebook:
> www.facebook.com/KeySystems <http://www.facebook.com/KeySystems>
> www.twitter.com/key_systems <http://www.twitter.com/key_systems>
>
> Geschäftsführer: Alexander Siffrin
> Handelsregister Nr.: HR B 18835 - Saarbruecken
> Umsatzsteuer ID.: DE211006534
>
> Member of the KEYDRIVE GROUP
> www.keydrive.lu <http://www.keydrive.lu>
>
> Der Inhalt dieser Nachricht ist vertraulich und nur für den angegebenen
> Empfänger bestimmt. Jede Form der Kenntnisgabe, Veröffentlichung oder
> Weitergabe an Dritte durch den Empfänger ist unzulässig. Sollte diese
> Nachricht nicht für Sie bestimmt sein, so bitten wir Sie, sich mit uns per
> E-Mail oder telefonisch in Verbindung zu setzen.
>
> --------------------------------------------
>
> Should you have any further questions, please do not hesitate to contact us.
>
> Best regards,
>
> Volker A. Greimann
> - legal department -
>
> Key-Systems GmbH
> Im Oberen Werk 1
> 66386 St. Ingbert
> Tel.: +49 (0) 6894 - 9396 901
> Fax.: +49 (0) 6894 - 9396 851
> Email: vgreimann at key-systems.net
>
> Web: www.key-systems.net <http://www.key-systems.net> / www.RRPproxy.net
> <http://www.RRPproxy.net>
> www.domaindiscount24.com <http://www.domaindiscount24.com> /
> www.BrandShelter.com <http://www.BrandShelter.com>
>
> Follow us on Twitter or join our fan community on Facebook and stay updated:
> www.facebook.com/KeySystems <http://www.facebook.com/KeySystems>
> www.twitter.com/key_systems <http://www.twitter.com/key_systems>
>
> CEO: Alexander Siffrin
> Registration No.: HR B 18835 - Saarbruecken
> V.A.T. ID.: DE211006534
>
> Member of the KEYDRIVE GROUP
> www.keydrive.lu <http://www.keydrive.lu>
>
> This e-mail and its attachments is intended only for the person to whom it is
> addressed. Furthermore it is not permitted to publish any content of this
> email. You must not use, disclose, copy, print or rely on this e-mail. If an
> addressing or transmission error has misdirected this e-mail, kindly notify
> the author by replying to this e-mail or contacting us by telephone.
>
>
>
> _______________________________________________ gnso-rds-pdp-wg mailing list
> gnso-rds-pdp-wg at icann.org
> https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mm.icann.org/pipermail/gnso-rds-pdp-wg/attachments/20170516/0548b8a5/attachment-0001.html>
More information about the gnso-rds-pdp-wg
mailing list