Re: [kitten] Token Preauth for Kerberos
"Zheng, Kai" <kai.zheng@intel.com> Fri, 13 June 2014 07:31 UTC
Return-Path: <kai.zheng@intel.com>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 735211A0204 for <kitten@ietfa.amsl.com>; Fri, 13 Jun 2014 00:31:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.552
X-Spam-Level:
X-Spam-Status: No, score=-7.552 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.651, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XyL637yoAcga for <kitten@ietfa.amsl.com>; Fri, 13 Jun 2014 00:31:12 -0700 (PDT)
Received: from mga09.intel.com (mga09.intel.com [134.134.136.24]) by ietfa.amsl.com (Postfix) with ESMTP id 302C11A014E for <kitten@ietf.org>; Fri, 13 Jun 2014 00:31:12 -0700 (PDT)
Received: from orsmga001.jf.intel.com ([10.7.209.18]) by orsmga102.jf.intel.com with ESMTP; 13 Jun 2014 00:25:53 -0700
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.01,470,1400050800"; d="scan'208";a="527877181"
Received: from fmsmsx108.amr.corp.intel.com ([10.19.9.228]) by orsmga001.jf.intel.com with ESMTP; 13 Jun 2014 00:31:11 -0700
Received: from fmsmsx154.amr.corp.intel.com (10.18.116.70) by FMSMSX108.amr.corp.intel.com (10.19.9.228) with Microsoft SMTP Server (TLS) id 14.3.123.3; Fri, 13 Jun 2014 00:31:10 -0700
Received: from shsmsx152.ccr.corp.intel.com (10.239.6.52) by FMSMSX154.amr.corp.intel.com (10.18.116.70) with Microsoft SMTP Server (TLS) id 14.3.123.3; Fri, 13 Jun 2014 00:31:10 -0700
Received: from shsmsx103.ccr.corp.intel.com ([169.254.4.210]) by SHSMSX152.ccr.corp.intel.com ([169.254.6.36]) with mapi id 14.03.0123.003; Fri, 13 Jun 2014 15:31:08 +0800
From: "Zheng, Kai" <kai.zheng@intel.com>
To: Wang Weijun <weijun.wang@oracle.com>
Thread-Topic: [kitten] Token Preauth for Kerberos
Thread-Index: Ac95oBHY/v5P0th/QSGCBpa/sVINTQMo1vwAABRlhDAAENj7gA==
Date: Fri, 13 Jun 2014 07:31:08 +0000
Message-ID: <8D5F7E3237B3ED47B84CF187BB17B666118ED053@SHSMSX103.ccr.corp.intel.com>
References: <8D5F7E3237B3ED47B84CF187BB17B666118D870F@SHSMSX103.ccr.corp.intel.com> <1402609038.22737.57.camel@willson.usersys.redhat.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.239.127.40]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/kitten/8b8KLvx6mNfmSR0e3QKVg7P3smE
Cc: "kitten@ietf.org" <kitten@ietf.org>, Simo Sorce <simo@redhat.com>, "krbdev@mit.edu" <krbdev@mit.edu>
Subject: Re: [kitten] Token Preauth for Kerberos
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Jun 2014 07:31:13 -0000
Hi Max, Would you help clarify the support situation or plan/schedule in JRE/JDK for the mentioned protocol transition (s4u2self) + constrained delegation (s4u2proxy) if I'm not correct? Thanks. Regards, Kai -----Original Message----- From: Zheng, Kai Sent: Friday, June 13, 2014 3:16 PM To: 'Simo Sorce' Cc: kitten@ietf.org; krbdev@mit.edu Subject: RE: [kitten] Token Preauth for Kerberos Hi Simo, >> have you considered protocol transition (s4u2self) + constrained delegation (s4u2proxy) to get tickets at an authentication gateway instead of a new pre auth mechanism ? Yes we proposed for the Hadoop community a centralized Authn & Authz Server (HAS) that might be like the gateway as you mentioned. It's widely discussed and confirmed that it would be great the server allows plugin of authentication module/provider but all mechanisms output token. Sure I guess it's possible to use token to go thru s4u2self and s4u2proxy in the Kerberos facility across the ecosystem but as far as I know JRE just starts to support it from JDK8. Anyhow I would check this and make sure it's a doable option not in so long future. A question regarding this: Is it possible to contain the token in service ticket resulted from s4u2self and s4u2proxy as authorization data so that services can get it as proposed in token-preauth? Note in our wanted solution, token not just serves for authentication, but also is meant to be passed (or the token attributes) to service side for fine-grained authorization. Thanks & regards, Kai -----Original Message----- From: Simo Sorce [mailto:simo@redhat.com] Sent: Friday, June 13, 2014 5:37 AM To: Zheng, Kai Cc: kitten@ietf.org; krbdev@mit.edu Subject: Re: [kitten] Token Preauth for Kerberos On Tue, 2014-06-10 at 12:19 +0000, Zheng, Kai wrote: > Hi all, > > I would like to mention an effort regarding Kerberos and propose a new > Kerberos preauth mechanism, token-preauth. Before dive into that, > please kindly allow me to introduce, mainly for the background and > scenario for the proposal. > > I'm an engineer from Intel and develop identity and security related > products. The current focus is Apache Hadoop, and our goal is enabling > Hadoop to support more authentication mechanisms and providers. > Currently Hadoop only supports Kerberos authentication method as the > built-in secured one and it's not easy to add more since it involves > changing into many projects on top of it in the large ecosystem. The > community had proposed a token based authentication, planned to add > TokenAuth method for Hadoop and by TokenAuth then all kinds of > authentication providers can be supported since their authentication > results can be wrapped into token, and the token can be employed to > authenticate to Hadoop across the ecosystem. The effort is still > undergoing. Considering the complexity, risk and deployment overhead > of this approach, our team investigate and think of another possible > solution, i.e. support token in Kerberos. The basic idea is allow end > users to authenticate to Kerberos with their tokens and obtain > tickets, then access Hadoop services using the tickets as current flow > goes. The PoC was already done, and we make it work seamlessly from > MIT Kerberos to Java world and Hadoop. However we think it's very > important to get the key point token-preauth be reviewed by you > security and Kerberos experts, to make sure it's defined and > implemented in compliance with the existing standards and protocols, > without involving security critical leaks. So please kindly give your > feedback and we appreciate it. Kai, have you considered protocol transition (s4u2self) + constrained delegation (s4u2proxy) to get tickets at an authentication gateway instead of a new pre auth mechanism ? Simo. -- Simo Sorce * Red Hat, Inc * New York
- [kitten] Token Preauth for Kerberos Zheng, Kai
- Re: [kitten] Token Preauth for Kerberos Thomas Hardjono
- Re: [kitten] Token Preauth for Kerberos Greg Hudson
- Re: [kitten] Token Preauth for Kerberos Nordgren, Bryce L -FS
- Re: [kitten] Token Preauth for Kerberos Zheng, Kai
- Re: [kitten] Token Preauth for Kerberos Zheng, Kai
- [kitten] Verified authorization data Peter Mogensen
- Re: [kitten] Token Preauth for Kerberos Zheng, Kai
- Re: [kitten] Token Preauth for Kerberos Zheng, Kai
- Re: [kitten] Verified authorization data Simo Sorce
- Re: [kitten] Verified authorization data Peter Mogensen
- Re: [kitten] Verified authorization data Simo Sorce
- Re: [kitten] Token Preauth for Kerberos Nathaniel McCallum
- Re: [kitten] Verified authorization data Peter Mogensen
- Re: [kitten] Verified authorization data Simo Sorce
- Re: [kitten] Verified authorization data Peter Mogensen
- Re: [kitten] Verified authorization data Simo Sorce
- Re: [kitten] Verified authorization data Peter Mogensen
- Re: [kitten] Verified authorization data Simo Sorce
- Re: [kitten] Verified authorization data Peter Mogensen
- Re: [kitten] Verified authorization data Simo Sorce
- Re: [kitten] Token Preauth for Kerberos Simo Sorce
- Re: [kitten] Token Preauth for Kerberos Zheng, Kai
- Re: [kitten] Token Preauth for Kerberos Zheng, Kai
- Re: [kitten] Token Preauth for Kerberos Wang Weijun
- Re: [kitten] Token Preauth for Kerberos Zheng, Kai
- Re: [kitten] Token Preauth for Kerberos Zheng, Kai
- Re: [kitten] Token Preauth for Kerberos Simo Sorce
- Re: [kitten] Token Preauth for Kerberos Dr. Greg Wettstein
- Re: [kitten] Token Preauth for Kerberos Zheng, Kai
- Re: [kitten] Token Preauth for Kerberos Zheng, Kai
- Re: [kitten] Token Preauth for Kerberos Simo Sorce
- Re: [kitten] Token Preauth for Kerberos Zheng, Kai
- Re: [kitten] Token Preauth for Kerberos Greg Hudson
- Re: [kitten] Token Preauth for Kerberos Zheng, Kai
- Re: [kitten] Token Preauth for Kerberos Benjamin Kaduk
- Re: [kitten] Token Preauth for Kerberos Zheng, Kai