Re: [kitten] Updating IANA krb5 GSSAPI token type registry

Shawn M Emery <shawn.emery@oracle.com> Thu, 06 March 2014 00:12 UTC

Return-Path: <shawn.emery@oracle.com>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6F08C1A0005 for <kitten@ietfa.amsl.com>; Wed, 5 Mar 2014 16:12:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.747
X-Spam-Level:
X-Spam-Status: No, score=-4.747 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.547, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oi1lIjDl9f_3 for <kitten@ietfa.amsl.com>; Wed, 5 Mar 2014 16:12:36 -0800 (PST)
Received: from aserp1040.oracle.com (aserp1040.oracle.com [141.146.126.69]) by ietfa.amsl.com (Postfix) with ESMTP id 34FF51A000E for <kitten@ietf.org>; Wed, 5 Mar 2014 16:12:36 -0800 (PST)
Received: from ucsinet21.oracle.com (ucsinet21.oracle.com [156.151.31.93]) by aserp1040.oracle.com (Sentrion-MTA-4.3.2/Sentrion-MTA-4.3.2) with ESMTP id s260CVh8014658 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK) for <kitten@ietf.org>; Thu, 6 Mar 2014 00:12:32 GMT
Received: from userz7022.oracle.com (userz7022.oracle.com [156.151.31.86]) by ucsinet21.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id s260CUA1002267 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <kitten@ietf.org>; Thu, 6 Mar 2014 00:12:31 GMT
Received: from abhmp0002.oracle.com (abhmp0002.oracle.com [141.146.116.8]) by userz7022.oracle.com (8.14.5+Sun/8.14.4) with ESMTP id s260CUVL011401 for <kitten@ietf.org>; Thu, 6 Mar 2014 00:12:30 GMT
Received: from dhcp-a4a7.meeting.ietf.org (/10.175.4.246) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Wed, 05 Mar 2014 16:12:30 -0800
Message-ID: <5317BD6E.6080309@oracle.com>
Date: Wed, 05 Mar 2014 17:12:30 -0700
From: Shawn M Emery <shawn.emery@oracle.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:24.0) Gecko/20100101 Thunderbird/24.3.0
MIME-Version: 1.0
To: kitten@ietf.org
References: <20130806223553.CD3401A8EC@ld9781.wdf.sap.corp> <29F4D66E-3E8F-4033-8779-8EA158C1B72A@padl.com> <alpine.GSO.1.10.1308062018070.24720@multics.mit.edu> <alpine.GSO.1.10.1309041148130.16692@multics.mit.edu> <alpine.GSO.1.10.1403041135510.1213@multics.mit.edu> <tslzjl4ohbn.fsf@mit.edu> <1394031556.4290.53.camel@destiny.pc.cs.cmu.edu>
In-Reply-To: <1394031556.4290.53.camel@destiny.pc.cs.cmu.edu>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Source-IP: ucsinet21.oracle.com [156.151.31.93]
Archived-At: http://mailarchive.ietf.org/arch/msg/kitten/cHsmVFb-NTF0CSP1D6w1DfTyAmA
Subject: Re: [kitten] Updating IANA krb5 GSSAPI token type registry
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Mar 2014 00:12:38 -0000

On 3/5/14 7:59 AM, Jeffrey Hutzelman wrote:
> On Wed, 2014-03-05 at 09:23 -0500, Sam Hartman wrote:
>>>>>>> "Benjamin" == Benjamin Kaduk <kaduk@MIT.EDU> writes:
>>
>>      Benjamin> To me, this seems like a(nother) bug in RFC 7055, but of
>>      Benjamin> course it is not one that can be reasonably fixed.  I
>>      Benjamin> guess that the easiest way forward is to publish a quick
>>      Benjamin> document that reserves 0405 and 0501 noting that they were
>>      Benjamin> in use before the registry was established.
>>
>> I do not support reserving the iakerb value in another document.
>> The right solution there is to finish iakerb and get it published.
> Agreed.  For better or worse, our process generally allocates values on
> publication, not when a spec first appears that needs one.  The right
> way to avoid conflicts here is for the iakerb document to say "TBA"
> until a value is assigned by IANA, and to mention this in its IANA
> considerations section.

Speaking as an individual; I agree, but having some guidance would be 
helpful, as there may be a pattern in the registry that might not be 
intuitive to IANA.

>> my preference is that the CFX context deletion token not be registered.
>> I don't see any protocol issues that are likely to result if that code
>> point were re-used.
>> If the community disagrees, writing a document is the right way forward.
> I think that depends on how mechanisms might get stacked and whether
> there is deployed code that emits or reacts to that code point.  In
> general, tokens used only during context establishment almost don't need
> to be in a common namespace at all, except that it makes it less
> complicated to update things when one mech builds on the context
> establishment of another.  However, tokens which can appear after
> context establishment require a little more care (but are also less
> likely to appear or change outside of 4121 or its successors).
>
> In this particular case, I don't feel like I'm in a position to develop
> an opinion on whether the code points needs to be reserved, because I
> don't know what the existing implementation does with it.

Implementers could interpret text from 2743 as requiring a token that is 
emitted for deleting security contexts:

    Optionally, the server-side application may provide a token buffer to
    GSS_Delete_sec_context(), to receive a context_token to be transferred to the client in
    order to request that client-side context-level information be deleted.


> Here, we're talking about a code point used in a document which was in
> progress and then abandoned or superseded before the registry was
> created; thus, it never appeared in any published protocol
> specification.  If we're concerned that use of such a code point might
> cause interop problems, then having marked it as reserved in the initial
> registry would have been a fine thing to do, and there is ample
> precedent for that.  If it didn't, and we consider that an oversight,
> then it seems to me that publication of a new IETF-reviewed RFC is a
> rather heavyweight process to correct the oversight.
Shawn.
--