Re: [kitten] [Curdle] I-D Action: draft-ietf-curdle-des-des-des-die-die-die-03.txt

Benjamin Kaduk <kaduk@mit.edu> Mon, 26 June 2017 02:11 UTC

Return-Path: <kaduk@mit.edu>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F37B3127873; Sun, 25 Jun 2017 19:11:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.222
X-Spam-Level:
X-Spam-Status: No, score=-4.222 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NuXnhJtSQDQm; Sun, 25 Jun 2017 19:11:43 -0700 (PDT)
Received: from dmz-mailsec-scanner-5.mit.edu (dmz-mailsec-scanner-5.mit.edu [18.7.68.34]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 40BA1128D3E; Sun, 25 Jun 2017 19:11:43 -0700 (PDT)
X-AuditID: 12074422-975ff70000003ff1-a2-59506d5d30a2
Received: from mailhub-auth-1.mit.edu ( [18.9.21.35]) (using TLS with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by dmz-mailsec-scanner-5.mit.edu (Symantec Messaging Gateway) with SMTP id E5.F4.16369.D5D60595; Sun, 25 Jun 2017 22:11:41 -0400 (EDT)
Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) by mailhub-auth-1.mit.edu (8.13.8/8.9.2) with ESMTP id v5Q2Be6M031932; Sun, 25 Jun 2017 22:11:40 -0400
Received: from kduck.kaduk.org (24-107-191-124.dhcp.stls.mo.charter.com [24.107.191.124]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.13.8/8.12.4) with ESMTP id v5Q2BZja020527 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Sun, 25 Jun 2017 22:11:39 -0400
Date: Sun, 25 Jun 2017 21:11:35 -0500
From: Benjamin Kaduk <kaduk@mit.edu>
To: Martin Rex <mrex@sap.com>, jaltman@secure-endpoints.com
Cc: kitten@ietf.org, curdle@ietf.org
Message-ID: <20170626021135.GF17840@kduck.kaduk.org>
References: <20170621174558.GK39245@kduck.kaduk.org> <20170623120341.C93721A6BE@ld9781.wdf.sap.corp>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <20170623120341.C93721A6BE@ld9781.wdf.sap.corp>
User-Agent: Mutt/1.7.1 (2016-10-04)
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrFIsWRmVeSWpSXmKPExsUixCmqrBubGxBp8GiijcXWhbOYLf6snMRm cXTzKhaL3t87mB1YPJYs+cnkMeXzVkaPk33nWQOYo7hsUlJzMstSi/TtErgy/n9rYiy4I1Xx r/EpYwPjIdEuRk4OCQETiTmLf7F3MXJxCAksZpLoW9wO5WxklHjwbDMLhHOVSWLzlkksIC0s AqoSU5f/BrPZBFQkGrovM4PYIgLWEtuXrWUDsZmB4pueNrGC2MICsRKnfnwHq+cFWnfn/W0w W0ggTeL6+x/MEHFBiZMzn7BA9GpJ3Pj3kqmLkQPIlpZY/o8DJMwpYCOxbOIrsPGiAsoSfw/f Y5nAKDALSfcsJN2zELoXMDKvYpRNya3SzU3MzClOTdYtTk7My0st0jXVy80s0UtNKd3ECApi dhelHYwT/3kdYhTgYFTi4c2wDIgUYk0sK67MPcQoycGkJMrb6O8fKcSXlJ9SmZFYnBFfVJqT WnyIUYKDWUmENyMRqJw3JbGyKrUoHyYlzcGiJM4rrtEYISSQnliSmp2aWpBaBJOV4eBQkuDl ywFqFCxKTU+tSMvMKUFIM3FwggznARpu7AYyvLggMbc4Mx0if4pRUUqcd3k2UEIAJJFRmgfX C0oyEtn7a14xigO9IsxrDLKCB5ig4LpfAQ1mAho8Y40PyOCSRISUVANjfmvAuWXcvHL39U66 rfRWFfhT9nRve+PXpdpGBT8XM823n6vDMD199/3F57bPS5Ry0Lk+dStnMJvHt5/tCXePbZxc XLXi8ZmotQqRd34cNcip0FlSG3ZZysDbj6P28QaD/ppdzSG9sSd95Nk7hHim255nLVeIN3Nq Mu66/1Bnytxf11+c7mRTYinOSDTUYi4qTgQAaH0zUg0DAAA=
Archived-At: <https://mailarchive.ietf.org/arch/msg/kitten/eQ50jC4pCRkhNVL9Nnhi7qObyPg>
Subject: Re: [kitten] [Curdle] I-D Action: draft-ietf-curdle-des-des-des-die-die-die-03.txt
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Jun 2017 02:11:45 -0000

Hi Martin,

On Fri, Jun 23, 2017 at 02:03:41PM +0200, Martin Rex wrote:
> Benjamin Kaduk wrote:
> > 
> > It sounds like you are asking for the addition of some text along
> > the lines of:
> > 
> >   Software support is only a bare minimum requirement for deprecating
> >   RC4 enctypes; there may be additional logistical considerations
> >   involved such as provisioning AES keys for all principals and
> >   updating software configuration to enable AES and disable deprecated
> >   encryption types.
> > 
> > Is that something you are asking for?
> 
> Yes, thank your.  This sounds good to me.  I consider it even more
> helpful than the reference to particular versions of particular
> OpenSource Kerberos implementations, because this is a characteristic
> that is sort-of implied by how kerberos-enctypes keys are created
> (derived by string2key) and probably affect all implementations of
> Kerberos, yet it is non-obvious to consumers of the technology.

Thank you for clarifying your comment into a request.

> 
> There is a substantial difference between cipher suites in TLS, where
> key length, strength and algorithm for the symmetric crypto is mostly
> irrelevant to the (PKI) credentials, and where using new TLS cipher suites
> and deprecating old TLS cipher suites does not have a rekeying requirement.

To some extent this is inherent in Kerberos's use of symmetric crypto for
authentication, as opposed to TLS which uses asymmetric crypto for
authentication and switches to symmetric crypto for efficiency for
bulk data transfer.


(Jeffrey Altman wrote:)
% In my opinion, such text is inappropriate for an RFC.  The deprecation
% of the encryption type is a protocol action.  The RFC is not guidance
% for system administrators.  Such guidance should come from the protocol
% implementations.
%
% As such I believe the addition of text similar to the above is
% unnecessary for publication.

> 
> I do believe that it is very appropriate to provide such kind of a
> guidance in an RFC, so that it this recommendation for deprecation
> becomes more comprehensible and the trade-offs clearer to mere consumers
> of the Kerberos technology, readers that aren't Kerberos protocol experts
> and senior Kerberos implementers.

In general I tend to hew more to Jeffrey's track that protocol specifications
should limit themseles to protocol-level work.  I could see some grounds
for an exception here, though, in that the deployment difficulties are
inherent to any Kerberos deployment that follows best practice of not storing
user passwords (only derived keys).

Given Jeffrey's reasoning, I do not think my above "proposed text"
(to get clarification from Martin) should be used as-is; if we do want
to provide the clarification that Martin wants, I would want to rephrase
things somewhat.  But, it still seems unclear where the WG consensus lies
on the question of including any guidance at all, here.  Can others
please weigh in?


> When making admins sufficiently aware of predictable interop-problems,
> we may actually see more administrative deprecation of weak Kerberos
> enctypes than leaving them in the dark, and it helps reducing the amount
> of stumped users, helpdesks and admins.

Admins are more likely to read software-provided documentation than
protocol specs; this argument seems speculative to me.

-Ben