InCommon Technical Advisory Committee Meeting Minutes

Thursday, January 23, 2014

Attending: Steve Carmody, Ian Young, Michael Gettes, Chris Misra, Jim Jokl, Jim Basney, David Walker, Tom Barton, Scott Cantor

With: Tom Scavo, IJ Kim, Ann West, Joe St Sauver, Nate Klingenstein, John Krienke

Action Items

(AI) John and Steven will review the Phase 2 Recommendations and propose to TAC a list of items that need to be addressed as a result of accepting the Recommendations

(AI) Ann will propose a Community Review process to TAC on the next call

(AI) TomS will add "Certificate Service Next Steps" to the next TAC agenda

(AI) Steven will send an email with a few suggested meeting times for the regularly scheduled TAC meeting

Ops Update

TAC comments re metadata server:

  1. The FOG survey showed 10 of 13 federations enable TLS on their metadata server.
  2. Multiple TAC members agree that enabling TLS on the metadata server will circumvent questions from customers in the future.
  3. Multiple TAC members disagree that the absence of TLS on the metadata server will cause deployers to do the Right Thing (in particular, verify the signature on the metadata).
  4. Multiple TAC members agree we should clearly document that deployers should do the Right Thing (in particular, verify the signature on the metadata).
  5. Make it as easy as possible for deployers to do the Right Thing. For example, provide clear and explicit documentation for configuring metadata refresh in the Shibboleth software.
  6. Enabling TLS on the metadata server is a perception issue more than anything else.
  7. If we haven’t received any questions about HTTPS yet, why would we start receiving questions now?
  8. If we did start receiving questions from deployers, it’s likely those same people won’t understand TLS at all.
  9. Regardless of what we decide to do with respect to TLS on the metadata server, this should have no effect on a deployer’s decision to migrate to the new server by March 29. [NOTE: Actually, it does. If you have an outbound firewall, and we enable TLS on the metadata server, you must migrate or your deployment will break.]

Ops comments re metadata server:

  1. Ops recommends to NOT deploy TLS on md.incommon.org
  2. Metadata signed with a secure, offline signing key can not be replaced by HTTPS.
  3. Metadata refresh via HTTPS assumes the metadata server is secure. Recall, however, that we run multiple physical servers, only one of which is under our direct control in Ann Arbor.
  4. Signed metadata can be served from any server, regardless of whether it is TLS-enabled or not.
  5. A TLS-enabled metadata server provides no real value.
  6. InCommon has never advertised an HTTPS endpoint for metadata.
  7. Even though we’ve never advertised an HTTPS endpoint for metadata, 2% of GET requests for metadata are HTTPS requests. [NOTE: This was erroneously reported as 20% on the call.]
  8. Is TAC suggesting we publish an HTTPS endpoint for metadata? [inctac:that’s not what we heard but we just want to be sure]
  9. We do not want have the HTTP vs HTTPS conversation with deployers. We would rather avoid this conversation altogether.

TAC comments re metadata signing certificate:

  1. https://lists.incommon.org/sympa/arc/tac/2014-01/msg00130.html
  2. At least two TAC members strongly agree that the metadata signing certificate should be served from a secure server protected with an EV cert.
  3. The trust anchor (and its fingerprint) need to be served from the strongest location possible, and moreover, we should do this independently of any decision made about metadata distribution.

Other TAC comments:

  1. The documentation should make it clear to deployers what happens if they don’t migrate. If things are gonna break, we should make that clear.
  2. Is the March 29 milestone date negotiable?
  3. There is concern about the redirect failing (or not being supported) at some point in the future.
  4. Except for RHEL4, it is best to assume nothing will break. This isn’t entirely true (a few deployments will break) but we don’t expect significant numbers of deployments to break (otherwise we wouldn’t be doing this).

Metadata Distribution WG

Approval of the IGTF SSL CPS

Certificate Service Next Steps

Software Guidelines

New TAC meeting time

As mentioned at the beginning of this call, Steven wants to suggest that a new call time may be necessary since there is a conflicting NET+ call that is drawing folks away from the regularly scheduled TAC call. It is somewhat painful to even bring this up since this group has probably met at this time slot for close to 10 years now.

AI: Steven will send an email with a few suggested meeting times for the regularly scheduled TAC meeting