Re: [kitten] GSS-only enctypes

Nico Williams <nico@cryptonector.com> Wed, 01 April 2015 21:05 UTC

Return-Path: <nico@cryptonector.com>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4A4201AC3A7 for <kitten@ietfa.amsl.com>; Wed, 1 Apr 2015 14:05:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.044
X-Spam-Level:
X-Spam-Status: No, score=-1.044 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FM_FORGED_GMAIL=0.622, IP_NOT_FRIENDLY=0.334, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FwlrLQBemara for <kitten@ietfa.amsl.com>; Wed, 1 Apr 2015 14:05:55 -0700 (PDT)
Received: from homiemail-a63.g.dreamhost.com (sub4.mail.dreamhost.com [69.163.253.135]) by ietfa.amsl.com (Postfix) with ESMTP id 071871AC3A1 for <kitten@ietf.org>; Wed, 1 Apr 2015 14:05:55 -0700 (PDT)
Received: from homiemail-a63.g.dreamhost.com (localhost [127.0.0.1]) by homiemail-a63.g.dreamhost.com (Postfix) with ESMTP id BB91E2F4071 for <kitten@ietf.org>; Wed, 1 Apr 2015 14:05:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=cryptonector.com; h= mime-version:in-reply-to:references:date:message-id:subject:from :to:cc:content-type; s=cryptonector.com; bh=2uC/1uxV3Uw1bIdIjWYk GLWeTl0=; b=kmpEDd9iwDmNUx0RMStqiqrfxN2NGidzREOr9yBCDdkGb3p06OMr nj8QMsb7jlG0sCgY1yrZonXu9IRNS7dJ9HBhj5nNIQXWjwZTyJdXuns2zg4cmPD6 /XfmbuSNkbgEup6InpHHICFd4Kx1HPsbQEh1Jz998dyxubNaUMbKEpY=
Received: from mail-ie0-f177.google.com (mail-ie0-f177.google.com [209.85.223.177]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: nico@cryptonector.com) by homiemail-a63.g.dreamhost.com (Postfix) with ESMTPSA id 964AC2F406A for <kitten@ietf.org>; Wed, 1 Apr 2015 14:05:54 -0700 (PDT)
Received: by iedm5 with SMTP id m5so54276747ied.3 for <kitten@ietf.org>; Wed, 01 Apr 2015 14:05:53 -0700 (PDT)
MIME-Version: 1.0
X-Received: by 10.50.171.170 with SMTP id av10mr15102735igc.28.1427922353983; Wed, 01 Apr 2015 14:05:53 -0700 (PDT)
Received: by 10.64.130.66 with HTTP; Wed, 1 Apr 2015 14:05:53 -0700 (PDT)
In-Reply-To: <551C5C53.10901@mit.edu>
References: <CAK3OfOj+Pe8kdAqfXR5EJgw38ekHSUwYv7NBEAZU3FpScbH3cw@mail.gmail.com> <alpine.GSO.1.10.1504011603320.22210@multics.mit.edu> <551C5C53.10901@mit.edu>
Date: Wed, 01 Apr 2015 16:05:53 -0500
Message-ID: <CAK3OfOgPg1xs7yg=Mh5+qb2L5j2ZDZVwr1D+NXs5QOzpnHA3Hw@mail.gmail.com>
From: Nico Williams <nico@cryptonector.com>
To: Greg Hudson <ghudson@mit.edu>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <http://mailarchive.ietf.org/arch/msg/kitten/FqbzX0CRXgF7etwY5RMoKMoWAac>
Cc: "kitten@ietf.org" <kitten@ietf.org>
Subject: Re: [kitten] GSS-only enctypes
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Apr 2015 21:05:56 -0000

On Wed, Apr 1, 2015 at 4:00 PM, Greg Hudson <ghudson@mit.edu> wrote:
> On 04/01/2015 04:04 PM, Benjamin Kaduk wrote:
>> I'm not sure that we got enough active input at the meeting on this
>> question to be able to declare consensus.  Regardless, we should ask the
>> list if there are objections to (or support for) using the Kerberos
>> enctype number space for enctypes with restricted usability (i.e., only
>> for subsession keys, or GSS, etc.).
>
> I didn't totally understand all of Nico's reasoning about this when he
> spoke at the meeting.  In general I think it's fine; it lets us
> negotiate AEAD enctypes using RFC 4537 enctype negotation and the
> existing subkey fields when mutual auth is used.

Conversely, not reusing the RFC3961 enctype namespace means a) adding
a new extension like RFC4537 to carry the client's/initiator's AEAD
enctype list and sub-keys, b) extending AP-REP to carry the
server's/acceptor's sub-key and choice of AEAD enctype.  That seems
like lots of unnecessary complexity.

That's my reasoning.

Nico
--