Re: [kitten] Finding Kerberos Realm Descriptors in secure DNS

Viktor Dukhovni <viktor1dane@dukhovni.org> Tue, 15 September 2015 07:30 UTC

Return-Path: <viktor1dane@dukhovni.org>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8498C1B470F for <kitten@ietfa.amsl.com>; Tue, 15 Sep 2015 00:30:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.6
X-Spam-Level:
X-Spam-Status: No, score=-102.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Bxd9llg7zUzz for <kitten@ietfa.amsl.com>; Tue, 15 Sep 2015 00:30:32 -0700 (PDT)
Received: from mournblade.imrryr.org (mournblade.imrryr.org [38.117.134.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3723B1B46E7 for <kitten@ietf.org>; Tue, 15 Sep 2015 00:30:32 -0700 (PDT)
Received: by mournblade.imrryr.org (Postfix, from userid 1034) id BE2E5284B70; Tue, 15 Sep 2015 07:30:30 +0000 (UTC)
Date: Tue, 15 Sep 2015 07:30:30 +0000
From: Viktor Dukhovni <viktor1dane@dukhovni.org>
To: kitten@ietf.org
Message-ID: <20150915073030.GD21942@mournblade.imrryr.org>
References: <55F686EA.30206@openfortress.nl> <55F6EA7C.8070608@mit.edu> <20150914161100.GC13294@localhost> <55F6F843.2070609@openfortress.nl> <55F7C3FA.5090802@openfortress.nl>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <55F7C3FA.5090802@openfortress.nl>
User-Agent: Mutt/1.5.24 (2015-08-30)
Archived-At: <http://mailarchive.ietf.org/arch/msg/kitten/XAygiCqV8KKbTo7EaNgfsC1R6qI>
Subject: Re: [kitten] Finding Kerberos Realm Descriptors in secure DNS
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: kitten@ietf.org
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Sep 2015 07:30:33 -0000

On Tue, Sep 15, 2015 at 09:08:42AM +0200, Rick van Rein wrote:

> So, time to simplify.  What we're now looking it is a very simple KREALM
> record that says stuff like
> 
> www.example.org.  IN KREALM  "EXAMPLE.ORG"
>                   IN KREALM "EXAMPLE.COM"

Text strings used to be handy for realm names in DNS when associated
SRV records were plausibly optional.  These days, the REALM *should*
be a DNS name.  Therefore, a simpler design would be:

    ; Realm mapping per-host reduces lookup latency
    ;
    _kerberos.host.name.example.com. IN PTR EXAMPLE.COM.

    ; "Fallback" realm mapping at ancestor domain
    ;
    _kerberos.example.com. IN PTR EXAMPLE.COM.

    ; Associated SRV records
    ;
    _kerberos._udp.example.com. IN SRV 0 100 88 kdc.example.com.
    _kerberos._tcp.example.com. IN SRV 0 100 88 kdc.example.com.

This does not require a new RR type, PTR will do.

-- 
	Viktor.