Re: [kitten] An idea to go beyond 32 flags in draft-ietf-kitten-kerberos-iana-registries-03

Rick van Rein <rick@openfortress.nl> Mon, 18 April 2016 06:33 UTC

Return-Path: <rick@openfortress.nl>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B997612DF6A for <kitten@ietfa.amsl.com>; Sun, 17 Apr 2016 23:33:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.621
X-Spam-Level:
X-Spam-Status: No, score=-2.621 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iWLQ7Ebtl7oh for <kitten@ietfa.amsl.com>; Sun, 17 Apr 2016 23:33:10 -0700 (PDT)
Received: from lb2-smtp-cloud3.xs4all.net (lb2-smtp-cloud3.xs4all.net [194.109.24.26]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7CC7012DF87 for <kitten@ietf.org>; Sun, 17 Apr 2016 23:33:07 -0700 (PDT)
Received: from airhead.local ([83.161.146.46]) by smtp-cloud3.xs4all.net with ESMTP id jiZ11s00L10HQrX01iZ2bV; Mon, 18 Apr 2016 08:33:05 +0200
Message-ID: <57147F9C.7030306@openfortress.nl>
Date: Mon, 18 Apr 2016 08:33:00 +0200
From: Rick van Rein <rick@openfortress.nl>
User-Agent: Postbox 3.0.11 (Macintosh/20140602)
MIME-Version: 1.0
To: Benjamin Kaduk <kaduk@MIT.EDU>, Greg Hudson <ghudson@mit.edu>
References: <570E0415.5090501@openfortress.nl> <alpine.GSO.1.10.1604161828410.26829@multics.mit.edu>
In-Reply-To: <alpine.GSO.1.10.1604161828410.26829@multics.mit.edu>
X-Enigmail-Version: 1.2.3
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/kitten/bQ7SJywS_20epNy6IkFitYZgdj0>
Cc: kitten@ietf.org
Subject: Re: [kitten] An idea to go beyond 32 flags in draft-ietf-kitten-kerberos-iana-registries-03
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Apr 2016 06:33:14 -0000

Hello Greg and Ben,

Thanks for your responses.  On a scale between idealism and pragmatism,
perhaps I'm leaning over too much towards idealism.

I am not deeply concerned if KDC implementations choose to setup 32 bit
flags; a KDC is run centrally and can be upgraded.  I'm already more
concerned about clients but mostly about services that make same this
choice in firmware; firmware is at some point not updated anymore.  I
can't remember the instance, but have seen in this group how such
backlog drove choices away from what would otherwise be possible.  It is
this backlog that concerns me.

I understand that the registry can be updated, but I think a registry
that states a 32 bit limit gives rise to the creation of aforementioned
backlog, especially because there is no reason to state the limitation
there.  Given that the values are registered under a formal
specification process, and so that values 32+ are not going to be
released easily, I see no positive side but a potentially strongly
negative side, to making a statement in the registry about an upper
limit to the number of flags.

The rest of my change proposal introduced uses for 32+ values, as a
suggestion to implementations to care for those flags.  As Greg stated,
there is a little more to this than silently ignoring them, so we could
discuss whether that is such a good idea.  To me, that's a gray area; it
is desirable to have Experimental / Private flags but requiring
implementations to support such flags may be too much asked.  The
Specification Required suggestion is more something that arose as a
side-effect possibility, it is not that important on its own.

Cheers,
 -Rick