Re: [kitten] Kerberos Service Discovery using DNS

Nathaniel McCallum <npmccallum@redhat.com> Wed, 11 March 2015 16:56 UTC

Return-Path: <npmccallum@redhat.com>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2D3331A1B8A for <kitten@ietfa.amsl.com>; Wed, 11 Mar 2015 09:56:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.91
X-Spam-Level:
X-Spam-Status: No, score=-6.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HK_RANDOM_ENVFROM=0.001, RCVD_IN_DNSWL_HI=-5, SPF_HELO_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KLJ6c9TaZ7ga for <kitten@ietfa.amsl.com>; Wed, 11 Mar 2015 09:56:37 -0700 (PDT)
Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B85F11A1B80 for <kitten@ietf.org>; Wed, 11 Mar 2015 09:56:37 -0700 (PDT)
Received: from int-mx13.intmail.prod.int.phx2.redhat.com (int-mx13.intmail.prod.int.phx2.redhat.com [10.5.11.26]) by mx1.redhat.com (8.14.4/8.14.4) with ESMTP id t2BGubYl014461 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Wed, 11 Mar 2015 12:56:37 -0400
Received: from unused (unused [10.10.52.96] (may be forged)) by int-mx13.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id t2BGuZ4k015626 (version=TLSv1/SSLv3 cipher=AES128-GCM-SHA256 bits=128 verify=NO); Wed, 11 Mar 2015 12:56:36 -0400
Message-ID: <1426092995.3471.50.camel@redhat.com>
From: Nathaniel McCallum <npmccallum@redhat.com>
To: Benjamin Kaduk <kaduk@mit.edu>
Date: Wed, 11 Mar 2015 12:56:35 -0400
In-Reply-To: <alpine.GSO.1.10.1503111236240.3953@multics.mit.edu>
References: <1425578271.2715.5.camel@redhat.com> <alpine.GSO.1.10.1503111201350.3953@multics.mit.edu> <1426091451.3471.35.camel@redhat.com> <alpine.GSO.1.10.1503111236240.3953@multics.mit.edu>
Content-Type: text/plain; charset="UTF-8"
Mime-Version: 1.0
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.68 on 10.5.11.26
Archived-At: <http://mailarchive.ietf.org/arch/msg/kitten/wfhfEeU73N34E6MOKzT8UVgiKwY>
Cc: kitten@ietf.org
Subject: Re: [kitten] Kerberos Service Discovery using DNS
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Mar 2015 16:56:39 -0000

On Wed, 2015-03-11 at 12:44 -0400, Benjamin Kaduk wrote:
> On Wed, 11 Mar 2015, Nathaniel McCallum wrote:
> 
> > On Wed, 2015-03-11 at 12:05 -0400, Benjamin Kaduk wrote:
> > > On Thu, 5 Mar 2015, Nathaniel McCallum wrote:
> > >
> > > > I have uploaded a new draft:
> > > >
> > > 
> http://datatracker.ietf.org/doc/draft-mccallum-kitten-krb-service-discovery/
> > > >
> > > > If you'd like to discuss it, reply to this message. :)
> > >
> > > I'm generally in favor of something like this.
> > >
> > > A few things that came to mind while reading it that have not > >
> already been
> > > raised:
> > >
> > > You cover kerberos and kpasswd, but not kadmin.  Any reason why? 
> > > (MIT's code does not currently support using DNS to locate an 
> admin > > server, but that's not a reason to reject adding it to a 
> discovery > > protocol in its own
> > > right.)
> >
> > My understanding is that kadmin is a proprietary protocol and has 
> not > been standardized. If that is incorrect, I can certainly add 
> it. Does > it already have a standardized discovery protocol?
> 
> There are at least two different proprietary kadmin protocols. SRV 
> records for _kerberos-adm._tcp.[realm] are documented by both MIT 
> and Heimdal, and exist at many sites.  It looks like Heimdal doesn't 
> actually implement client support for them, either, though, judging 
> by git
> grep.  (The corresponding draft-ietf-cat-krb-dns-locate seems to 
> have withered and died.)

I am hesitant to attempt to define a discovery method for an 
unstandardized service. I would rather the service be standardized and 
define its own prefix at that time.

Nathaniel