Re: [kitten] Verified authorization data

Simo Sorce <simo@redhat.com> Thu, 12 June 2014 13:23 UTC

Return-Path: <simo@redhat.com>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 319421B2A17 for <kitten@ietfa.amsl.com>; Thu, 12 Jun 2014 06:23:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.553
X-Spam-Level:
X-Spam-Status: No, score=-7.553 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.651, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2m3IUlk7DKBp for <kitten@ietfa.amsl.com>; Thu, 12 Jun 2014 06:23:29 -0700 (PDT)
Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) by ietfa.amsl.com (Postfix) with ESMTP id 687871B2A0A for <kitten@ietf.org>; Thu, 12 Jun 2014 06:23:29 -0700 (PDT)
Received: from int-mx09.intmail.prod.int.phx2.redhat.com (int-mx09.intmail.prod.int.phx2.redhat.com [10.5.11.22]) by mx1.redhat.com (8.14.4/8.14.4) with ESMTP id s5CDNQpC007944 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 12 Jun 2014 09:23:27 -0400
Received: from [10.3.113.187] (ovpn-113-187.phx2.redhat.com [10.3.113.187]) by int-mx09.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id s5CDNPA3027374; Thu, 12 Jun 2014 09:23:26 -0400
Message-ID: <1402579405.22737.37.camel@willson.usersys.redhat.com>
From: Simo Sorce <simo@redhat.com>
To: Peter Mogensen <apm@one.com>
Date: Thu, 12 Jun 2014 09:23:25 -0400
In-Reply-To: <5399A8F9.50609@one.com>
References: <8D5F7E3237B3ED47B84CF187BB17B666118D870F@SHSMSX103.ccr.corp.intel.com> <5397328E.6020005@mit.edu> <539849AA.4000506@one.com> <1402503444.13617.1.camel@willson.usersys.redhat.com> <53988BB6.8010409@one.com> <1402506490.13617.9.camel@willson.usersys.redhat.com> <539952CC.8020703@one.com> <1402577232.22737.26.camel@willson.usersys.redhat.com> <5399A341.3070104@one.com> <1402578060.22737.30.camel@willson.usersys.redhat.com> <5399A8F9.50609@one.com>
Organization: Red Hat, Inc.
Content-Type: text/plain; charset="UTF-8"
Mime-Version: 1.0
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.68 on 10.5.11.22
Archived-At: http://mailarchive.ietf.org/arch/msg/kitten/5uNKfx8exGMfsYeT4y91ceCXU2w
Cc: "kitten@ietf.org" <kitten@ietf.org>, "krbdev@mit.edu" <krbdev@MIT.EDU>
Subject: Re: [kitten] Verified authorization data
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Jun 2014 13:23:31 -0000

On Thu, 2014-06-12 at 15:19 +0200, Peter Mogensen wrote:
> On 2014-06-12 15:01, Simo Sorce wrote:
> > Yes, we decided to combine this protection with ticket binding in one
> > single operation by using EncTicketPart in the MAC calculation, makign
> > the CAMMAC *simpler* to build.
> 
> I must have misunderstood something fundamental then.
> 
> The draft says:
> "the KDC computes the MAC in the kdc-
>        verifier over the ASN.1 DER encoding of the EncTicketPart of the
>        surrounding ticket, *but* where the AuthorizationData value in the
>        EncTicketPart contains the AuthorizationData value contained in
>        the CAMMAC instead of the AuthorizationData value that would
>        otherwise be present in the ticket."
> 
> (My emphasis)
> 
> So it's not the actual EncTicketPart which is used for the MAC. It's 
> another version with different AuthorizationData. You have to compute 
> both versions.
> Compared to simply just placing the kdc-verifier outside of the 
> EncTicketPart and using the actual EncTicketPart for computing the MAC.
> ... which I know can give compatability problems, but just so we 
> understand what each other is talking about.
> 
> I would intuitively think it was simpler to just sign the entire actual 
> EncTicketPart with the kdc-verifier. Of course, that will then bind to 
> also any other authdata in the ticket.

The idea is to compute MAC on:

1) EncTicketPart w/o any Authorization Data (otherwise chicken-egg as
you are still computing AD data, CAMMAC is AD data itself)
+
2) AD Data contained in CAMMAC (we want to protect data within the
CAMMAC, anything outside of it is not our business).

Makes sense ?

Simo.

-- 
Simo Sorce * Red Hat, Inc * New York