Re: [kitten] Finding Kerberos Realm Descriptors in secure DNS

Greg Hudson <ghudson@mit.edu> Tue, 15 September 2015 18:36 UTC

Return-Path: <ghudson@mit.edu>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0005E1A90DD for <kitten@ietfa.amsl.com>; Tue, 15 Sep 2015 11:36:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.211
X-Spam-Level:
X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4pus9y6M1C4u for <kitten@ietfa.amsl.com>; Tue, 15 Sep 2015 11:36:42 -0700 (PDT)
Received: from dmz-mailsec-scanner-3.mit.edu (dmz-mailsec-scanner-3.mit.edu [18.9.25.14]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 17D5E1A90C3 for <kitten@ietf.org>; Tue, 15 Sep 2015 11:36:40 -0700 (PDT)
X-AuditID: 1209190e-f79296d00000051c-46-55f86537a4d2
Received: from mailhub-auth-1.mit.edu ( [18.9.21.35]) (using TLS with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by dmz-mailsec-scanner-3.mit.edu (Symantec Messaging Gateway) with SMTP id 9A.AC.01308.73568F55; Tue, 15 Sep 2015 14:36:39 -0400 (EDT)
Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) by mailhub-auth-1.mit.edu (8.13.8/8.9.2) with ESMTP id t8FIacUL027238; Tue, 15 Sep 2015 14:36:38 -0400
Received: from [18.101.8.77] (vpn-18-101-8-77.mit.edu [18.101.8.77]) (authenticated bits=0) (User authenticated as ghudson@ATHENA.MIT.EDU) by outgoing.mit.edu (8.13.8/8.12.4) with ESMTP id t8FIaakI030299 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Tue, 15 Sep 2015 14:36:37 -0400
To: Rick van Rein <rick@openfortress.nl>, "kitten@ietf.org" <kitten@ietf.org>
References: <55F686EA.30206@openfortress.nl> <55F6EA7C.8070608@mit.edu> <20150914161100.GC13294@localhost> <55F6F843.2070609@openfortress.nl> <20150914170757.GC13284@localhost> <55F72B14.8030409@openfortress.nl> <55F7C40F.9000509@openfortress.nl>
From: Greg Hudson <ghudson@mit.edu>
X-Enigmail-Draft-Status: N1110
Message-ID: <55F86534.50109@mit.edu>
Date: Tue, 15 Sep 2015 14:36:36 -0400
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.2.0
MIME-Version: 1.0
In-Reply-To: <55F7C40F.9000509@openfortress.nl>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: 8bit
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFmplleLIzCtJLcpLzFFi42IR4hRV1jVP/RFqMGupoMXRzatYLJ6+usfm wOSxZMlPJo8N/5rYApiiuGxSUnMyy1KL9O0SuDK+zT/OXrCNraLt+RT2BsbprF2MnBwSAiYS b4+vZYGwxSQu3FvPBmILCSxmkri1M6aLkQvI3sgocWLbcxYI5yCTxIe9y8A6hAXcJG63fGAE sUUEfCV+TG1hgyj6wyhxuqUZLMEmoCyxfv9WqBVyEr3dk8BsXgEVibXbL4DZLAKqEm+mzgKz RQUiJE6dfcsGUSMocXLmE7A4p4C+xO5b65lAbGYBPYkd13+xQtjyEs1bZzNPYBSchaRlFpKy WUjKFjAyr2KUTcmt0s1NzMwpTk3WLU5OzMtLLdI11svNLNFLTSndxAgOYUm+HYxfDyodYhTg YFTi4d3Q+T1UiDWxrLgy9xCjJAeTkiivS8qPUCG+pPyUyozE4oz4otKc1OJDjBIczEoivFpB QDnelMTKqtSifJiUNAeLkjjvph98IUIC6YklqdmpqQWpRTBZGQ4OJQner8lAjYJFqempFWmZ OSUIaSYOTpDhPEDDV4Es5i0uSMwtzkyHyJ9i1OVY8OP2WiYhlrz8vFQpcd5DIIMEQIoySvPg 5oBTTyqH7ytGcaC3hHnngFTxANMW3KRXQEuYgJa4p34DWVKSiJCSamBUT2Vv+/F8+y9Og4uX FZpvSEh5rJs5lyOVc1fHxF9lf+2nXFhf+ZFvnYLE9xlc7U0GSjHdZeH2ju++VPYWC+r3bRSv q2a5zf5a1CBbXfVnd4gtQ7jmoUeT5u/esEXWq2HLryaVsmUV2n+yWwRe9nRrmnf5LCp8qHn3 xjmVu2K2Yes79l7dmqXEUpyRaKjFXFScCAAUG4j/GAMAAA==
Archived-At: <http://mailarchive.ietf.org/arch/msg/kitten/GPqwVHWdUcphxWGWSq63FBtU8kI>
Subject: Re: [kitten] Finding Kerberos Realm Descriptors in secure DNS
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Sep 2015 18:36:44 -0000

On 09/15/2015 03:09 AM, Rick van Rein wrote:
> See... we're requiring DNSSEC to validate the KREALM record, and it is going to be difficult in general to rely on clients to accomadate that; they may be subjected to crummy NAT routers that interfere with, and break DNSSEC.  So, we will probably be dependent on KDCs for practical deployment of KREALM, and a KDC could use KREALM records to inspire a Server Referral in the style of RFC 6806.
> 
> So... it may be reasonable to assume that any KREALM client could work with multiple realms, because they will normally be KDCs.  And that'd mean we wouldn't need this priority or go-for-this-one flag.  Agreed?

A KDC can only return one referral, so I'm not sure what it would do
with multiple realms, with or without priorities.  Perhaps I'm missing
something.