[kitten] I-D: Realm Crossover for SASL and GSS-API via Diameter

Rick van Rein <rick@openfortress.nl> Tue, 21 January 2020 15:36 UTC

Return-Path: <rick@openfortress.nl>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A2C781208B6 for <kitten@ietfa.amsl.com>; Tue, 21 Jan 2020 07:36:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.697
X-Spam-Level:
X-Spam-Status: No, score=-2.697 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=openfortress.nl
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zcAG3rkcvw7B for <kitten@ietfa.amsl.com>; Tue, 21 Jan 2020 07:36:04 -0800 (PST)
Received: from lb3-smtp-cloud9.xs4all.net (lb3-smtp-cloud9.xs4all.net [194.109.24.30]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1DB531208C6 for <kitten@ietf.org>; Tue, 21 Jan 2020 07:36:03 -0800 (PST)
Received: from popmini.vanrein.org ([83.161.146.46]) by smtp-cloud9.xs4all.net with ESMTP id tvZPin1trT6sRtvZQirLvQ; Tue, 21 Jan 2020 16:36:01 +0100
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=openfortress.nl; i=rick@openfortress.nl; q=dns/txt; s=fame; t=1579620953; h=message-id : date : from : mime-version : to : subject : content-type : content-transfer-encoding : date : from : subject; bh=vu5C331jAkgaqFq2NtJ87+rTtwQ6n2tI5xgrWKcwpHo=; b=h2W9gq5WNpYhxf2j8zvFGSw6RXGGTNqxRzCRURRIL5W1y48VKDan/Ioa S8/dOoDehXUOxF1qvbhqETAovPKJkW1jwLvUnox5AX5N9DB7b4sKBT3Sp/ JtS//UtTfdidyE25iPN7RqsHz/J0kb8sEBpHDTWXC0hoDeBGXy+qeKo1E=
Received: by fame.vanrein.org (Postfix, from userid 1006) id 004D524138; Tue, 21 Jan 2020 15:35:52 +0000 (UTC)
X-Original-To: kitten@ietf.org
Received: from airhead.local (phantom.vanrein.org [83.161.146.46]) by fame.vanrein.org (Postfix) with ESMTPA id D34EB2413D; Tue, 21 Jan 2020 15:35:45 +0000 (UTC)
Message-ID: <5E271A50.3040509@openfortress.nl>
Date: Tue, 21 Jan 2020 16:35:44 +0100
From: Rick van Rein <rick@openfortress.nl>
User-Agent: Postbox 3.0.11 (Macintosh/20140602)
MIME-Version: 1.0
To: "kitten@ietf.org" <kitten@ietf.org>
X-Enigmail-Version: 1.2.3
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
X-Bogosity: Unsure, tests=bogofilter, spamicity=0.520000, version=1.2.4
X-CMAE-Envelope: MS4wfOn6saWqhNsMsVUP3I7JSn+cvs6ZLuCb0yo4cyCJpg1ry7lUn9ffYMgwVblCIJtpVVIogrCgpNdI9C5I6UVqcxPBC9E6sBsVPnjCuDfWV2/6ZKmsT2nf 2NbnhdeGsHZgoUUsANTEZBe/TcUBnkAt/IOcy8P0fhlNkc8Y/Rf8vYk/
Archived-At: <https://mailarchive.ietf.org/arch/msg/kitten/P3GXispRb4GhXUkMtoirmpwatBk>
Subject: [kitten] I-D: Realm Crossover for SASL and GSS-API via Diameter
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Jan 2020 15:36:10 -0000

Hello,

The following I-D proposes a method to relay SASL authentication to a
backend over Diameter.  This is achieved by wrapping it in an outer SASL
mechanism GS2-SXOVER-PLUS for end-to-end encryption.

The intention is to allow identities under a home realm to be used with
foreign servers.  Diameter can do this securely while still scaling up.

Your input on this is quite welcome; I intend to forward it to Diameter
expertise before actually claiming the GS2-SXOVER-PLUS name.


Best wishes,

Rick van Rein
for InternetWide.org


-----

Name:		draft-vanrein-diameter-sasl
Revision:	03
Title:		Realm Crossover for SASL and GSS-API via Diameter
Document date:	2020-01-21
Group:		Individual Submission
Pages:		17
URL:
https://www.ietf.org/internet-drafts/draft-vanrein-diameter-sasl-03.txt
Status:
https://datatracker.ietf.org/doc/draft-vanrein-diameter-sasl/
Htmlized:       https://tools.ietf.org/html/draft-vanrein-diameter-sasl-03
Htmlized:
https://datatracker.ietf.org/doc/html/draft-vanrein-diameter-sasl
Diff:
https://www.ietf.org/rfcdiff?url2=draft-vanrein-diameter-sasl-03

Abstract:
   SASL and GSS-API are used for authentication in many application
   protocols.  This specification extends them to allow credentials of a
   home realm to be used against external services.  To this end, it
   introduces end-to-end encryption for SASL that is safe to relay to
   the client's home realm.