Re: [kitten] [EXTERNAL] Re: Windows Intent to revive and implement IAKerb draft-ietf-kitten-iakerb-03

"Steve Syfuhs (AP)" <Steve.Syfuhs@microsoft.com> Fri, 17 February 2023 19:04 UTC

Return-Path: <Steve.Syfuhs@microsoft.com>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3E1FCC14F74B for <kitten@ietfa.amsl.com>; Fri, 17 Feb 2023 11:04:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level:
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8OeH8zJsafjj for <kitten@ietfa.amsl.com>; Fri, 17 Feb 2023 11:04:05 -0800 (PST)
Received: from DM6FTOPR00CU001-vft-obe.outbound.protection.outlook.com (mail-cusazlp170100000.outbound.protection.outlook.com [IPv6:2a01:111:f403:c111::]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 494F8C14F72F for <kitten@ietf.org>; Fri, 17 Feb 2023 11:04:05 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ZLIIFuWbRYj36DsieF0vXSflZCrweq1HX1Y2UEWiBuhnC6LNi+5t7oRy/lZCnxYbqP7rbf4tUMKyaIZim5/uHFUCnk5xcd09YoTogphpsFzRAFxKPItkT5VGlnPc6nJ3+JILo5yWCE+y0YesEFE2ndqGY/8uf6BbAprm4E+vjAbZaLF+MVweT8YroDYF4o9b514fBv1GBnLhYFm9OUFLHHNy6e7mGoGyjn++6mm9IzvOmWUiJysYZCPdHkonQh1T3ib0E/tjTuIL2c0z7nPp8cO7kqTGBwlnDRIr6F2bVjWKLeEsRPG7dgZ0e4nigtL0lTW6DtLMPkIrjr231vWXwg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=D1q+Ela14sj2/x6N7Isdb34PhjupAUAUdssITr95Pe4=; b=YV//rQ2cV6u1DA/EisbQicURoBX/rzpsO1T7bqOj2Afyxvme1e1gNrnShQ2LBtIESFKMhxcsJw/OaX7km+tPUuPW5DmTb+y8F+Ucpffh/bYvWrAQZKkWYr5MQ/zXuy/xah8UfOd8TlJtnXCDudhgX0rsP/uubpTgLIWbZqeK+LZJnBV6cVPhaY2mtHTdiOtN6OLb6TRqGfEk9ghCGOqZaaZQu1WPWnyMkTk7hm7fkQLz0uRbmEhrRgEzhs86dde2yyWf2Os2iuh7LX4kkj2u9ruNcKG67Ndl5PyFnPkI1+t19aLxZJIcxAYXgy5X2eB0cwdzvewOA8flUEFCfmEjEw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=D1q+Ela14sj2/x6N7Isdb34PhjupAUAUdssITr95Pe4=; b=UMXIkNacFPWjNW/e3zeuojWXoe5XPUVd1JR8AOlaesDujLS8S5Uj701giW7sik6Lh5G262Jbf2tC9l9jDLtb80ynqQon2HIdaXMPDPqph0d0gB52M5HnIA7Uyky47fVluoEDgDjsDN/YNF7XIugUHdf81LZxvh7fTrmyfp8zQNU=
Received: from MW4PR21MB1970.namprd21.prod.outlook.com (2603:10b6:303:70::14) by CH2PR21MB1509.namprd21.prod.outlook.com (2603:10b6:610:84::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6134.12; Fri, 17 Feb 2023 19:04:02 +0000
Received: from MW4PR21MB1970.namprd21.prod.outlook.com ([fe80::5e00:89be:2491:e25]) by MW4PR21MB1970.namprd21.prod.outlook.com ([fe80::5e00:89be:2491:e25%7]) with mapi id 15.20.6134.011; Fri, 17 Feb 2023 19:04:02 +0000
From: "Steve Syfuhs (AP)" <Steve.Syfuhs@microsoft.com>
To: Jeffrey Altman <jaltman@secure-endpoints.com>, "kitten@ietf.org" <kitten@ietf.org>
Thread-Topic: [EXTERNAL] Re: [kitten] Windows Intent to revive and implement IAKerb draft-ietf-kitten-iakerb-03
Thread-Index: AdlCYBceCBvDn8+PTpigjXQ22G/pWQAdAZoAAAJKXIAACLeOQA==
Date: Fri, 17 Feb 2023 19:04:02 +0000
Message-ID: <MW4PR21MB197060FB388E7922FAADEB079CA19@MW4PR21MB1970.namprd21.prod.outlook.com>
References: <MW4PR21MB1970A9D254B943A1763C55FF9CA09@MW4PR21MB1970.namprd21.prod.outlook.com> <de4cbe7b-85b5-7001-3a8c-74787990c6e0@secure-endpoints.com> <eb9fa7a4-a00d-f388-27aa-3624df8ce4f2@secure-endpoints.com>
In-Reply-To: <eb9fa7a4-a00d-f388-27aa-3624df8ce4f2@secure-endpoints.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=a81bb085-b876-49e3-a882-7c7373415008; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=true; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=Internal; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2023-02-17T18:46:28Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47;
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=microsoft.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: MW4PR21MB1970:EE_|CH2PR21MB1509:EE_
x-ms-office365-filtering-correlation-id: 4fcd31b7-ef58-46c7-237b-08db1119bb8e
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MW4PR21MB1970.namprd21.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230025)(4636009)(39860400002)(376002)(346002)(136003)(396003)(366004)(451199018)(76116006)(8936002)(52536014)(66446008)(66946007)(41300700001)(5660300002)(64756008)(110136005)(66556008)(66476007)(10290500003)(71200400001)(2906002)(8676002)(316002)(478600001)(966005)(55016003)(7696005)(8990500004)(186003)(6506007)(9686003)(53546011)(83380400001)(166002)(82950400001)(33656002)(122000001)(82960400001)(38100700002)(86362001)(38070700005); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_MW4PR21MB197060FB388E7922FAADEB079CA19MW4PR21MB1970namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MW4PR21MB1970.namprd21.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4fcd31b7-ef58-46c7-237b-08db1119bb8e
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Feb 2023 19:04:02.1410 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: wk4OAsnGF0i9aiX+VWqcjpVBdIM8BjpsmIDPCqFU6X05xo8of6/L8T+I5S+FL7EPa8fTkMoPSjVK2VJX+7qRlg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH2PR21MB1509
Archived-At: <https://mailarchive.ietf.org/arch/msg/kitten/N_1c_nsqnbk6IzAOf_2ptnJeTZU>
Subject: Re: [kitten] [EXTERNAL] Re: Windows Intent to revive and implement IAKerb draft-ietf-kitten-iakerb-03
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 Feb 2023 19:04:09 -0000

Thanks folks, good context. I'll review the diffs and threads on this. Happy to help with any logistical issues.

As for why we care - Luke is spot on. NTLM deprecation. Despite the good intentions of our corporate overlords over the last few years, Kerberos ain't going away anytime soon, and with that NTLM certainly isn't going away without us giving it a good shove. So...

Caveat that numbers are anonymized Windows telemetry, so it's inherently biased in our direction. We know fallback from Kerberos to NTLM via SPNego occurs approximately 7% of the time because of line of sight issues. KDC Proxy [MS-KKDCP] technically solves this for us, but is a bit of a deployment joke. Spinning up yet another public-facing web server, plus certificate, plus configuring policy on machines that by definition do not have line of sight to policy sources is rather a pain in the butt for customers.

52% of NTLM usage is because of hardcoding the package in GSS or SSPI. We know why this happens some of the time - lack of visibility into outer negotiation processes like HTTP - and sometimes just lack of knowledge on the implementers part. Internally, we're working with the top offenders to move them to SPNego. Once that happens we predict it will increase line of sight issues a fair bit, though relative to the rest of the fallback reasons.

As it stands, we've actually already implemented IAKerb as per draft 3, less some minor Appendix A interop concerns.

100% - 52% - 7% != 0%, so obviously there would have to be some other things going on to kill NTLM. We have a plan, but aren't ready to talk about it yet. Suffice to say IAKerb is an integral part of it.

From: Kitten <kitten-bounces@ietf.org> On Behalf Of Jeffrey Altman
Sent: Friday, February 17, 2023 6:37 AM
To: kitten@ietf.org
Subject: [EXTERNAL] Re: [kitten] Windows Intent to revive and implement IAKerb draft-ietf-kitten-iakerb-03


It should also be noted that in 2019 it was determined that there was no longer any interest in further development of IAKerb and the Working Group State for the document was set to "Dead WG Document".   Although IAKerb was never removed from the Kitten Charter.

  https://datatracker.ietf.org/wg/kitten/about/<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fwg%2Fkitten%2Fabout%2F&data=05%7C01%7Csteve.syfuhs%40microsoft.com%7Cefc22916f2934e43dbdd08db10f47a15%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638122414447051754%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=RFtk6otA1rdnU52XEOMl2x%2F0kVX5%2BT6mFbUZfTr0IPM%3D&reserved=0>

Its unclear to me from a process perspective whether the charter document is simply out of date and IAKerb needs to be once again added as a working group work item OR whether the Dead WG Document state can be removed by publishing an update.

The initial individual draft was published in 2006.  At that time there was a very narrow use case which drove the effort.   Over time the range of use cases grew broader without being reflected in the text of the draft.   Re-reading the draft today for first time in years I believe the draft fails to sufficiently describe the use cases for which it is intended and those which should be considered out of scope.

I am in favor of IAKerb or something like it being adopted and implemented.   I would appreciate it if Steve could describe the 2023 use cases for which Microsoft intends to use it in case they have significantly diverged from those considered in 2006.

Jeffrey Altman
On 2/17/2023 8:31 AM, Jeffrey Altman (jaltman@secure-endpoints.com<mailto:jaltman@secure-endpoints.com>) wrote:

Please note that draft 3 does not include all of the feedback provided on draft 2.

The draft 2 feedback starts with this archived message

  https://mailarchive.ietf.org/arch/msg/kitten/5l6CknOZBF39aZps7wQIsl_L-6o/<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmailarchive.ietf.org%2Farch%2Fmsg%2Fkitten%2F5l6CknOZBF39aZps7wQIsl_L-6o%2F&data=05%7C01%7Csteve.syfuhs%40microsoft.com%7Cefc22916f2934e43dbdd08db10f47a15%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638122414447051754%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=90ulxdfe%2Fjh4RqIVyZ81a5CJR2aiVcig4GJqk9sEs20%3D&reserved=0>

and the diff between drafts 2 and 3 can be found here

  https://www.ietf.org/rfcdiff?url2=draft-ietf-kitten-iakerb-03<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Frfcdiff%3Furl2%3Ddraft-ietf-kitten-iakerb-03&data=05%7C01%7Csteve.syfuhs%40microsoft.com%7Cefc22916f2934e43dbdd08db10f47a15%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638122414447051754%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=bmWJl39j%2FF9mXt5poqkAjXfLO8AGrtgb39MX%2B9T4SYM%3D&reserved=0>

The discussion around error handling and default realm determination is particularly important in my opinion.

I do not believe there are any implementations of draft 3.

Jeffrey Altman
On 2/16/2023 6:57 PM, Steve Syfuhs (AP) (Steve.Syfuhs=40microsoft.com@dmarc.ietf.org<mailto:Steve.Syfuhs=40microsoft.com@dmarc.ietf.org>) wrote:
Howdy folks,

I'm a developer on the Windows auth team that oversees Kerberos development. We were handed the torch from Larry, Michiko, and crew when they went off to do other exciting things.

We're currently in the process of implementing IAKerb as per the latest expired draft and want to revive it and see it through to full RFC. Happy to go into detail about why, but the benefits are I think fairly self explanatory.

Unfortunately there's a fair amount of institutional knowledge around this protocol that's been lost to time and I was wondering if someone could provide background on where things were last? What is required in order to see it through?

We have a few open questions, specifically around interop.

What is the state of the MIT implementation? The draft refers to interop with earlier versions. Is this something we need to reasonably care about? The draft says the Finished checksum key usage is implemented as int 42, but specced as 41. Why wasn't 42 used in the spec (that's otherwise a rather obnoxious interop hack)?

As mentioned, happy to go into more detail about our plans.

Cheers
Steve



_______________________________________________

Kitten mailing list

Kitten@ietf.org<mailto:Kitten@ietf.org>

https://www.ietf.org/mailman/listinfo/kitten<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fkitten&data=05%7C01%7Csteve.syfuhs%40microsoft.com%7Cefc22916f2934e43dbdd08db10f47a15%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638122414447051754%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=oFMTyCHTrlzUCxEKY2cf0s0KShGBQroqwO7PjOmCAmw%3D&reserved=0>



_______________________________________________

Kitten mailing list

Kitten@ietf.org<mailto:Kitten@ietf.org>

https://www.ietf.org/mailman/listinfo/kitten<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fkitten&data=05%7C01%7Csteve.syfuhs%40microsoft.com%7Cefc22916f2934e43dbdd08db10f47a15%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638122414447051754%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=oFMTyCHTrlzUCxEKY2cf0s0KShGBQroqwO7PjOmCAmw%3D&reserved=0>