Re: [kitten] [EXTERNAL] Re: Windows Intent to revive and implement IAKerb draft-ietf-kitten-iakerb-03

Luke Howard Bentata <lukeh@padl.com> Tue, 21 February 2023 00:54 UTC

Return-Path: <lukeh@padl.com>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AD859C16950B for <kitten@ietfa.amsl.com>; Mon, 20 Feb 2023 16:54:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.098
X-Spam-Level:
X-Spam-Status: No, score=-7.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=padl.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RDg8ndUrwTgK for <kitten@ietfa.amsl.com>; Mon, 20 Feb 2023 16:54:23 -0800 (PST)
Received: from us.padl.com (us.padl.com [216.154.215.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6D461C169509 for <kitten@ietf.org>; Mon, 20 Feb 2023 16:54:23 -0800 (PST)
Received: from auth (localhost [127.0.0.1]) by us.padl.com (8.14.7/8.14.7) with ESMTP id 31L0s7jN017995 (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Tue, 21 Feb 2023 00:54:11 GMT
DKIM-Filter: OpenDKIM Filter v2.11.0 us.padl.com 31L0s7jN017995
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=padl.com; s=default; t=1676940853; bh=EdM/egdThX+HgdrM8w/ee9veYMskouP2VWuHIqLsmC8=; h=Subject:From:In-Reply-To:Date:Cc:References:To:From; b=SmKzgs4c9aIpawRg3OinBwASjhritdHMG3rmBgl3umrW3BlRjGK3gHmDh4X6pLopG kiPWdd4grDh/E1O5VgTRheUuOZdgK8M7xbYEPRiKrs+mfS/e1USRkz6ROs+1EaYI9h MnhHLKq8pmTtyG7PgIxyfa5fF9G6TnWqT7pz9+rxvIbrhBJI2ErJLhpODkGTzS+DRX re/bZHhbmsFzkWdFR9tNxG8ZKTNekNhp+YqVEIdtaQBxzHsZZG+GO85pZdwrf8sdp6 dVaFlamGSAAw7fRVXMWm+m2v4IgXeaDnFbuinQly/y19B7tYnxuiVtSe1WqCyRGjMS QGvQPoj/vN2mA==
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.120.41.1.1\))
From: Luke Howard Bentata <lukeh@padl.com>
In-Reply-To: <Y/QT7BxdTHq0RYTz@gmail.com>
Date: Tue, 21 Feb 2023 11:54:06 +1100
Cc: Ken Hornstein <kenh@pobox.com>, "kitten@ietf.org" <kitten@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <7064A9EB-EB01-426C-9BED-AFB97FA93551@padl.com>
References: <MW4PR21MB1970A9D254B943A1763C55FF9CA09@MW4PR21MB1970.namprd21.prod.outlook.com> <de4cbe7b-85b5-7001-3a8c-74787990c6e0@secure-endpoints.com> <eb9fa7a4-a00d-f388-27aa-3624df8ce4f2@secure-endpoints.com> <MW4PR21MB197060FB388E7922FAADEB079CA19@MW4PR21MB1970.namprd21.prod.outlook.com> <6cb6f5ddfc7b9b150b4eef72db5a3f3b9566fd80.camel@redhat.com> <20230219194355.36139173DDE@pb-smtp2.pobox.com> <Y/K2IEhX6c+b05Ye@gmail.com> <Y/QT7BxdTHq0RYTz@gmail.com>
To: Nicolas Williams <nico@cryptonector.com>
X-Mailer: Apple Mail (2.3696.120.41.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/kitten/jCBXsrqpWoOpA01zH7FP00zsqy0>
Subject: Re: [kitten] [EXTERNAL] Re: Windows Intent to revive and implement IAKerb draft-ietf-kitten-iakerb-03
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Feb 2023 00:54:27 -0000


> On 21 Feb 2023, at 11:44 am, Nico Williams <nico@cryptonector.com> wrote:
> 
> On Sun, Feb 19, 2023 at 05:52:00PM -0600, Nico Williams wrote:
>> There are good reasons why Kerberos is still around; the shortcomings of
>> other systems are among them.  But there's been zero work in 30 years on
>> making Kerberos easy to deploy, orchestrate, and operate.  [...]
> 
> Ah, not to give offense to folks like Simo and Roland that have done a
> lot of work in that space.  I was referring to IETF work.

Not to mention Microsoft: authorisation data without a separate privilege service,* protocol transition, enctype negotiation, constrained delegation, AEAD in GSS, IAKERB, PKU2U, reply cache avoidance (DCE_STYLE), plus their contributions to anonymity and FAST.

* some may argue this isn’t an improvement on DCE!