Re: [kitten] Finding Kerberos Realm Descriptors in secure DNS

Rick van Rein <rick@openfortress.nl> Wed, 16 September 2015 06:15 UTC

Return-Path: <rick@openfortress.nl>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C511F1B36EA for <kitten@ietfa.amsl.com>; Tue, 15 Sep 2015 23:15:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level:
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ok4kohyfYo8a for <kitten@ietfa.amsl.com>; Tue, 15 Sep 2015 23:15:49 -0700 (PDT)
Received: from lb1-smtp-cloud6.xs4all.net (lb1-smtp-cloud6.xs4all.net [194.109.24.24]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 421B61B368E for <kitten@ietf.org>; Tue, 15 Sep 2015 23:14:58 -0700 (PDT)
Received: from airhead.local ([83.161.146.46]) by smtp-cloud6.xs4all.net with ESMTP id HiEt1r00A10HQrX01iEuRC; Wed, 16 Sep 2015 08:14:56 +0200
Message-ID: <55F908DB.4070907@openfortress.nl>
Date: Wed, 16 Sep 2015 08:14:51 +0200
From: Rick van Rein <rick@openfortress.nl>
User-Agent: Postbox 3.0.11 (Macintosh/20140602)
MIME-Version: 1.0
To: Nico Williams <nico@cryptonector.com>
References: <55F686EA.30206@openfortress.nl> <55F6EA7C.8070608@mit.edu> <20150914161100.GC13294@localhost> <55F6F843.2070609@openfortress.nl> <20150914170757.GC13284@localhost> <55F72B14.8030409@openfortress.nl> <55F7C40F.9000509@openfortress.nl> <55F86534.50109@mit.edu> <20150915185700.GI13294@localhost>
In-Reply-To: <20150915185700.GI13294@localhost>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/kitten/g1GmCQGQZTf-CMTKoUXq9cB5atw>
Cc: "kitten@ietf.org" <kitten@ietf.org>
Subject: Re: [kitten] Finding Kerberos Realm Descriptors in secure DNS
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Sep 2015 06:15:50 -0000

Hi,

> I believe it could be done, and certainly LDAP and other things add
> pressure to implement async evented KDCs, so that adding DNS queries
> into the mix wouldn't be a big deal, but I suspect implementors are not
> ready to bite that bullet.
>
> Would this proposal (or variants discussed) really solve a _pressing_
> problem?  Or a problem we believe will be pressing?

Realm crossover outside a fixed KDC set or federation needs KREALM or a variation on that theme; and could then be used to connect arbitrary domains using something like PKCROSS -- which is my hope and intention.

A KDC-side implementation of this mechanism would require DNS queries in the KDC.  It would be the place where an admin can manage this mechanism in a central place, without having to deal with various clients in various contexts.

-Rick