Re: [kitten] Is id-pkinit-san misnamed? Can it be reused by kca?

Luke Howard <lukeh@padl.com> Thu, 05 December 2013 07:33 UTC

Return-Path: <lukeh@padl.com>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 331921AC3FA for <kitten@ietfa.amsl.com>; Wed, 4 Dec 2013 23:33:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.903
X-Spam-Level:
X-Spam-Status: No, score=-1.903 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BI7Hx39dguic for <kitten@ietfa.amsl.com>; Wed, 4 Dec 2013 23:33:23 -0800 (PST)
Received: from us.padl.com (us.padl.com [216.154.215.154]) by ietfa.amsl.com (Postfix) with ESMTP id 3A1471AC3DD for <kitten@ietf.org>; Wed, 4 Dec 2013 23:33:23 -0800 (PST)
Received: by us.padl.com with ESMTP id rB57X7sx005934; Thu, 5 Dec 2013 02:33:11 -0500
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1822\))
From: Luke Howard <lukeh@padl.com>
In-Reply-To: <20131205071852.GO21240@localhost>
Date: Thu, 05 Dec 2013 18:33:07 +1100
Content-Transfer-Encoding: quoted-printable
Message-Id: <325FF802-C49E-4D99-AFC4-F7B78F182A38@padl.com>
References: <20131205071852.GO21240@localhost>
To: Nicolas Williams <nico@cryptonector.com>
X-Mailer: Apple Mail (2.1822)
X-SMTP-Vilter-Version: 1.3.6
X-Spamd-Symbols: BAYES_00,RDNS_NONE,USER_IN_WHITELIST
X-SMTP-Vilter-Spam-Backend: spamd
X-Spam-Threshold: 5.0
X-Spam-Probability: -20.5
Cc: "kitten@ietf.org" <kitten@ietf.org>
Subject: Re: [kitten] Is id-pkinit-san misnamed? Can it be reused by kca?
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Dec 2013 07:33:25 -0000

PKU2U (draft-zhu-pku2u), BrowserID (draft-howard-gss-browserid) also use id-pkinit-san. So I don't think there is a problem using it in other specifications.

-- Luke

On 5 Dec 2013, at 6:18 pm, Nico Williams <nico@cryptonector.com> wrote:

> PKINIT (RFC4556) adds a PKIX certicate SAN (id-pkinit-san) for representing Kerberos
> principal names of AS clients and servers.
> 
> I believe that id-pkinit-san does not denote "for PKINIT", and therefore
> was misnamed.  It should have been named id-kerberos-san.
> 
> Presense of a id-pkinit-san in a certificate is not sufficient to grant
> the subject access to the given Kerberos principal name nor to resources
> that that name is authorized to access.  Additional policy is needed,
> and I believe the RFC is clear about this.
> 
> I ask because I'd like RFC6717 (kerberized online CA protocol) servers
> to include the client's cname and crealm in an id-pkinit-san in the
> certificate to be issued.  I see no reason not to, though it is probably
> important to note that the kx509 service's PKIX issuer credentials
> should not be acceptable as issuers of PKINIT client certs by any KDCs
> (particularly the same as the issuing kx509 service's realm's)...
> 
> ...unless one *really* wants to use Kerberos->kx509->PKINIT as a form of
> PKCROSS... :)
> 
> ...which conveniently just happens to be my proposal for PKCROSS!
> 
> Nico
> -- 
> _______________________________________________
> Kitten mailing list
> Kitten@ietf.org
> https://www.ietf.org/mailman/listinfo/kitten

--
www.lukehoward.com | www.padl.com