Re: [kitten] Kerberos extra round trips I-D revised

Nico Williams <nico@cryptonector.com> Mon, 10 November 2014 16:34 UTC

Return-Path: <nico@cryptonector.com>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E63DB1A00E8 for <kitten@ietfa.amsl.com>; Mon, 10 Nov 2014 08:34:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.266
X-Spam-Level:
X-Spam-Status: No, score=-0.266 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, IP_NOT_FRIENDLY=0.334, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T4WF26cMpQiC for <kitten@ietfa.amsl.com>; Mon, 10 Nov 2014 08:34:15 -0800 (PST)
Received: from homiemail-a86.g.dreamhost.com (sub4.mail.dreamhost.com [69.163.253.135]) by ietfa.amsl.com (Postfix) with ESMTP id 4315E1A00E4 for <kitten@ietf.org>; Mon, 10 Nov 2014 08:34:15 -0800 (PST)
Received: from homiemail-a86.g.dreamhost.com (localhost [127.0.0.1]) by homiemail-a86.g.dreamhost.com (Postfix) with ESMTP id B0C21360075; Mon, 10 Nov 2014 08:34:14 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=cryptonector.com; h=date :from:to:cc:subject:message-id:references:mime-version :content-type:in-reply-to; s=cryptonector.com; bh=a92+HdS9Fnb/VJ MGjeBQVLBCo40=; b=EnXBwoCj33n/h7/OwPUJj55m0EjpK2F4/NrwBUAK57gDva qpjh7wkPXwD8eAnUmK0Tn+X4udcvTwjGMTwDkE1Ls4rOpX1PuotsLIy29u+HqwtD 2ENENySI/3PM1t7RvT+TcBZWb0Ynk9+ndF1WIFs5odeCLljMpJaXvCkLAZPoA=
Received: from localhost (108-207-244-174.lightspeed.austtx.sbcglobal.net [108.207.244.174]) (Authenticated sender: nico@cryptonector.com) by homiemail-a86.g.dreamhost.com (Postfix) with ESMTPA id 5FA3E36006B; Mon, 10 Nov 2014 08:34:14 -0800 (PST)
Date: Mon, 10 Nov 2014 10:34:13 -0600
From: Nico Williams <nico@cryptonector.com>
To: Benjamin Kaduk <kaduk@MIT.EDU>
Message-ID: <20141110163410.GB3412@localhost>
References: <20141027071704.GC14215@localhost> <alpine.GSO.1.10.1411071543280.27826@multics.mit.edu> <20141107214348.GW7913@localhost> <alpine.GSO.1.10.1411082036360.27826@multics.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <alpine.GSO.1.10.1411082036360.27826@multics.mit.edu>
User-Agent: Mutt/1.5.21 (2010-09-15)
Archived-At: http://mailarchive.ietf.org/arch/msg/kitten/DKOyEBjmk5wH6Qp8eeK-L7gQb9E
Cc: kitten@ietf.org
Subject: Re: [kitten] Kerberos extra round trips I-D revised
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Nov 2014 16:34:21 -0000

On Sat, Nov 08, 2014 at 08:41:12PM -0500, Benjamin Kaduk wrote:
> On Fri, 7 Nov 2014, Nico Williams wrote:
> > That's a fine summary.  (Except that I think we seem to agree that
> > there's no need for an initiator->acceptor error context token.)
> 
> Well, I think the acceptor application should be prepared to handle
> one if it gets one, but maybe the initiator doesn't always need to
> make/send one.

Agreed, acceptor apps should be required to beprepared to handle them.

Q: Should mechanisms specify outputting such error tokens as well?
A: Optionally, yes. (my answer)

Q: Should initiator apps be expected to send them?
A: Optionally, yes. (my answer)

> > >    [[anchor2: Question: how should we address this?  We could say "give
> > >    priority to the user-to-user mechanism", but in some cases that might
> > >    require changes to the acceptor side.]]
> > >
> > > This refers to the potential for conflict with
> > > draft-swift-win2k-krb-user2user, which I haven't read, so I can't say much
> > > about.
> >
> > [...]
> 
> Right, that was clear to me from reading the draft; I just don't have
> an answer.

I'm not convinced that the problem doesn't arise.  (An acceptor that
supports both mechanisms but not u2u in the krb5 mech will not offer the
latter if it doesn't have long-term principal keys with which to accept
sec contexts, and the KDC shouldn't return KDC_ERR_MUST_USE_USER2USER if
the acceptor has long-term keys.  But if this should result for some
reason, then we'd have a problem.  In practice this doesn't happen,
won't happen, and anyways, user2user is exceedingly rare.)

> > >    [[anchor3: We could use the GSS_EXTS_FINISHED extension from
> > >    draft-ietf-kitten-iakerb to implement a strong binding of all context
> > >    tokens.]]
> > >
> > > I haven't thought about things hard enough to decide whether the gain in
> > > strength of binding is worth the extra work.
> >
> > I think it's not worth the extra work, but it's important that the
> > acceptor either insist that the cname/crealm of the two AP-REQs be the
> > same, or else ignore the cname/crealm from the first AP-REQ and then
> > rely only on the second AP-REQ's cname/crealm.  I feel uneasy about the
> > latter.  For PROT_READY purposes it would be convenient if the two
> 
> I also feel uneasy about the latter.

It's trivial to go with the first.  I'll make it so.

Nico
--