Re: [kitten] Updating IANA krb5 GSSAPI token type registry

Benjamin Kaduk <kaduk@MIT.EDU> Thu, 06 March 2014 00:41 UTC

Return-Path: <kaduk@mit.edu>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CB8BA1A0004 for <kitten@ietfa.amsl.com>; Wed, 5 Mar 2014 16:41:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.148
X-Spam-Level:
X-Spam-Status: No, score=-3.148 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RP_MATCHES_RCVD=-0.547, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d3wrDOA-N_e8 for <kitten@ietfa.amsl.com>; Wed, 5 Mar 2014 16:41:27 -0800 (PST)
Received: from dmz-mailsec-scanner-6.mit.edu (dmz-mailsec-scanner-6.mit.edu [18.7.68.35]) by ietfa.amsl.com (Postfix) with ESMTP id B616E1A0010 for <kitten@ietf.org>; Wed, 5 Mar 2014 16:41:26 -0800 (PST)
X-AuditID: 12074423-f79726d000000cc9-c6-5317c432b1dc
Received: from mailhub-auth-4.mit.edu ( [18.7.62.39]) (using TLS with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) by dmz-mailsec-scanner-6.mit.edu (Symantec Messaging Gateway) with SMTP id AA.E0.03273.234C7135; Wed, 5 Mar 2014 19:41:22 -0500 (EST)
Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) by mailhub-auth-4.mit.edu (8.13.8/8.9.2) with ESMTP id s260fMUO005696 for <kitten@ietf.org>; Wed, 5 Mar 2014 19:41:22 -0500
Received: from multics.mit.edu (system-low-sipb.mit.edu [18.187.2.37]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.13.8/8.12.4) with ESMTP id s260fKfZ024226 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT) for <kitten@ietf.org>; Wed, 5 Mar 2014 19:41:22 -0500
Received: (from kaduk@localhost) by multics.mit.edu (8.12.9.20060308) id s260fK3m021837; Wed, 5 Mar 2014 19:41:20 -0500 (EST)
Date: Wed, 05 Mar 2014 19:41:20 -0500
From: Benjamin Kaduk <kaduk@MIT.EDU>
To: kitten@ietf.org
In-Reply-To: <5317BD6E.6080309@oracle.com>
Message-ID: <alpine.GSO.1.10.1403051916110.1213@multics.mit.edu>
References: <20130806223553.CD3401A8EC@ld9781.wdf.sap.corp> <29F4D66E-3E8F-4033-8779-8EA158C1B72A@padl.com> <alpine.GSO.1.10.1308062018070.24720@multics.mit.edu> <alpine.GSO.1.10.1309041148130.16692@multics.mit.edu> <alpine.GSO.1.10.1403041135510.1213@multics.mit.edu> <tslzjl4ohbn.fsf@mit.edu> <1394031556.4290.53.camel@destiny.pc.cs.cmu.edu> <5317BD6E.6080309@oracle.com>
User-Agent: Alpine 1.10 (GSO 962 2008-03-14)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; format="flowed"; charset="US-ASCII"
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFrrKIsWRmVeSWpSXmKPExsUixG6nrmt0RDzY4NB+E4ujm1exODB6LFny kymAMYrLJiU1J7MstUjfLoEr421LZMFlqYqFL5uYGxhniHYxcnJICJhIPN5+mxHCFpO4cG89 WxcjF4eQwGwmidcb5zJCOMcYJdoW32KBcK4zSfx5+YAJpEVIoF5iz8MpLCA2i4CWROPHjWCj 2ARUJGa+2cgGYosICEvs3vqOuYuRg0NYwFli464IkDAnUHnHz2lMIGFeAQeJw21uEOO/M0nc Pf0NbLyogI7E6v0Q43kFBCVOznwCZjMLWEr8W/uLdQKjwCwkqVlIUgsYmVYxyqbkVunmJmbm FKcm6xYnJ+blpRbpmunlZpbopaaUbmIEh56L8g7GPweVDjEKcDAq8fBu8BMPFmJNLCuuzD3E KMnBpCTKq30YKMSXlJ9SmZFYnBFfVJqTWnyIUYKDWUmE9/wBoBxvSmJlVWpRPkxKmoNFSZy3 1uJXkJBAemJJanZqakFqEUxWhoNDSYJX5iBQo2BRanpqRVpmTglCmomDE2Q4D9BwfpDFvMUF ibnFmekQ+VOMilLivD8OASUEQBIZpXlwvbDU8IpRHOgVYd47IFU8wLQC1/0KaDAT0OBoPrDB JYkIKakGRrWjrUqXu/2ZZz9/bnFld/IKzVsW1yKuV3uI/Ft1Q2LZf8F+Fe87Z8/Z1MRpMTnL md5tZYjUfPHLI/h+cXx468yGvp13yrtsuMoES7zmfpDfl9yUt+SH1muOfx41v/81zCv88OlY hX5weZB/TdYn65M34pbnLvhz9EjQnbtnfz2deITzQIPJEyWW4oxEQy3mouJEAA1b7KXoAgAA
Archived-At: http://mailarchive.ietf.org/arch/msg/kitten/TL2KR2vtVZav1r7kFcpB0T66mZc
Subject: Re: [kitten] Updating IANA krb5 GSSAPI token type registry
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Mar 2014 00:41:29 -0000

On Wed, 5 Mar 2014, Shawn M Emery wrote:

> On 3/5/14 7:59 AM, Jeffrey Hutzelman wrote:
>> On Wed, 2014-03-05 at 09:23 -0500, Sam Hartman wrote:
>>> 
>>> I do not support reserving the iakerb value in another document.
>>> The right solution there is to finish iakerb and get it published.
>> Agreed.  For better or worse, our process generally allocates values on
>> publication, not when a spec first appears that needs one.  The right
>> way to avoid conflicts here is for the iakerb document to say "TBA"
>> until a value is assigned by IANA, and to mention this in its IANA
>> considerations section.

For future allocation of values, leaving it TBA until a value is assigned 
by IANA is absolutely the right thing to do.  I am concerned only with 
values that were already in use prior to the establishment of the 
registry.

>> In this particular case, I don't feel like I'm in a position to develop
>> an opinion on whether the code points needs to be reserved, because I
>> don't know what the existing implementation does with it.

It has been many months since I looked at the MIT code in question, but I 
am absolutely confident that we do process tokens that we receive, which 
use these values.  I did end up looking a little bit, again; more below.

> Implementers could interpret text from 2743 as requiring a token that is 
> emitted for deleting security contexts:
>
>   Optionally, the server-side application may provide a token buffer to
>   GSS_Delete_sec_context(), to receive a context_token to be transferred to 
> the client in
>   order to request that client-side context-level information be deleted.

If a buffer is provided, I think (but would have to reread to be sure) 
that the GSS-API library is required to produce a token.  We recommend 
that applications neither provide a buffer nor send such tokens, of 
course, but not all applications heed the recommendation.

>> Here, we're talking about a code point used in a document which was in
>> progress and then abandoned or superseded before the registry was
>> created; thus, it never appeared in any published protocol
>> specification.  If we're concerned that use of such a code point might
>> cause interop problems, then having marked it as reserved in the initial
>> registry would have been a fine thing to do, and there is ample
>> precedent for that.  If it didn't, and we consider that an oversight,
>> then it seems to me that publication of a new IETF-reviewed RFC is a
>> rather heavyweight process to correct the oversight.

It never appeared in any published protocol specification, but both of 
these code points have appeared in shipping code, and we have no way of 
updating all the existing deployments.

Doing a little poking in the source, it looks like MIT krb5 probably does 
emit tokens of type 0x0405 when asked to produce context deletion tokens. 
(I will try to look at what bits are actually produced, just to be sure, 
at some point.)  Similarly, the MIT krb5 IAKERB implementation is using 
0x0501 for the tokens it produces.

Given that IAKERB has been in the MIT krb5 tree since 2010, and the 
context deletion tokens since 2009, I think it would be irresponsible to 
leave these code points open in the registry.  I don't really care what 
mechanism we use to modify the registry (but of course less effort is 
nice).

-Ben