Re: [kitten] draft-ietf-kitten-cammac kdc-verifier omission

Simo Sorce <simo@redhat.com> Thu, 26 February 2015 20:48 UTC

Return-Path: <simo@redhat.com>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 67C0B1A8793 for <kitten@ietfa.amsl.com>; Thu, 26 Feb 2015 12:48:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.912
X-Spam-Level:
X-Spam-Status: No, score=-6.912 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ye1__qtnzRho for <kitten@ietfa.amsl.com>; Thu, 26 Feb 2015 12:48:02 -0800 (PST)
Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AA4121A879B for <kitten@ietf.org>; Thu, 26 Feb 2015 12:47:58 -0800 (PST)
Received: from int-mx11.intmail.prod.int.phx2.redhat.com (int-mx11.intmail.prod.int.phx2.redhat.com [10.5.11.24]) by mx1.redhat.com (8.14.4/8.14.4) with ESMTP id t1QKlvAc025927 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Thu, 26 Feb 2015 15:47:58 -0500
Received: from [10.3.113.41] (ovpn-113-41.phx2.redhat.com [10.3.113.41]) by int-mx11.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id t1QKlvPH016357; Thu, 26 Feb 2015 15:47:57 -0500
Message-ID: <1424983676.640.21.camel@willson.usersys.redhat.com>
From: Simo Sorce <simo@redhat.com>
To: Tom Yu <tlyu@mit.edu>
Date: Thu, 26 Feb 2015 15:47:56 -0500
In-Reply-To: <ldv4mq8wgny.fsf@sarnath.mit.edu>
References: <x7d7fvo404h.fsf@equal-rites.mit.edu> <alpine.GSO.1.10.1502121341360.3953@multics.mit.edu> <54DD194D.2010201@mit.edu> <ldv1tluzpt6.fsf@sarnath.mit.edu> <alpine.GSO.1.10.1502181348460.3953@multics.mit.edu> <1424287116.6980.35.camel@willson.usersys.redhat.com> <alpine.GSO.1.10.1502201601450.3953@multics.mit.edu> <ldv4mq8wgny.fsf@sarnath.mit.edu>
Organization: Red Hat, Inc.
Content-Type: text/plain; charset="UTF-8"
Mime-Version: 1.0
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.68 on 10.5.11.24
Archived-At: <http://mailarchive.ietf.org/arch/msg/kitten/h19eNq-mrkl0LyqqAeSOFCsMBqU>
Cc: kitten@ietf.org
Subject: Re: [kitten] draft-ietf-kitten-cammac kdc-verifier omission
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Feb 2015 20:48:04 -0000

On Thu, 2015-02-26 at 15:40 -0500, Tom Yu wrote:
> Benjamin Kaduk <kaduk@MIT.EDU> writes:
> 
> > On Wed, 18 Feb 2015, Simo Sorce wrote:
> >
> >> On Wed, 2015-02-18 at 13:55 -0500, Benjamin Kaduk wrote:
> >>
> >> Would it make more sense to say something like:
> >>
> >>         The KDC MUST NOT make verbatim copies of CAMMAC contents into a
> >>         new CAMMAC unless the original CAMMAC is authenticated by an
> >>         originator that is fully trusted by the KDC.
> >>         The KDC MAY choose to filter, transform, or propagate elements
> >>         from the original CAMMAC according to local policy.
> >
> > It might.  Is this the first time we are using the word "trusted" in a
> > Kerberos RFC, though?  And being concrete does have something going for
> > it (we just have to get it right).
> 
> I prefer to avoid using the word "trusted" here.

Can we use "authorized" or something similar ?

> The KDC makes a policy decision about which CAMMACs have contents that
> are safe to copy verbatim into a new CAMMAC.  We can recommend that the
> KDC limit verbatim CAMMAC copying to cases where only the local realm
> KDCs know the key that authenticates the CAMMAC.
> 
> We could define a term "authenticated as originating from a local realm
> KDC" to mean:
> 
> 1. kdc-verifier is present and validates;
> 
> 2. svc-verifier is present, validates, and uses a key known only to
>    local realm KDCs; or
> 
> 3. no verifiers are present, the ticket-encrypting key is known only to
>    local realm KDCs, and all local realm KDCs properly filter out
>    client-submitted CAMMACs

This definition fails to include cross-realm tgts, because in (2) you
say the key must be known only by the local realm KDCS and it is not the
case fro cross-realm.

> (I think I didn't include case 2 in my earlier message, and think it's
> somewhat unlikely to get used in practice, but I think mentioning it
> makes the definition more complete.)

(2) is fundamental for the cross-realm case where the only thing you can
verify in the local KDC is the svc-verifier, given the kdc-verifier uses
a key you do not known (the other's realm tgt key).

We need to state that it is ok consider the CAMMAC if local policy says
you "trust" another REALM (you will probably not fully trust it, and
perform some filtering, but that is local policy and is captured in the
part that mentions filtering).

> We can say that the KDC SHOULD only make verbatim copies of CAMMAC
> contents to a new CAMMAC when it has authenticated the CAMMAC as
> originating from a local realm KDC.  We might also say that when the KDC
> has not authenticated a CAMMAC as originating from a local realm KDC, it
> SHOULD NOT apply a kdc-verifier to a new CAMMAC whose contents are a
> verbatim copy from that first CAMMAC.  (The cross-realm case is somewhat
> of an exception, though there generally should be some filtering.)
> 
> I guess "verbatim copying" is really shorthand for "verbatim copying
> without a complete policy check on the copied stuff".

I think we should say the KDC should apply policy but not dictate
whether there should necessarily be any filtering.
In a cross-realm case you may "fully-trust" the originating realm and
decide to verbating copy the CAMMAC, in other cases you may have a
different level of trust and apply filtering. The KDC should follow
whatever policy the amdin applies, with reasonable defaults in
implementations (but that is an implementation detail, we just need to
tell implementors what to pay attention to).

Simo.

-- 
Simo Sorce * Red Hat, Inc * New York