Re: [kitten] An idea to go beyond 32 flags in draft-ietf-kitten-kerberos-iana-registries-03

Benjamin Kaduk <kaduk@MIT.EDU> Sat, 16 April 2016 22:29 UTC

Return-Path: <kaduk@mit.edu>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5103A12B015 for <kitten@ietfa.amsl.com>; Sat, 16 Apr 2016 15:29:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.197
X-Spam-Level:
X-Spam-Status: No, score=-5.197 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id roft2y5-4w5H for <kitten@ietfa.amsl.com>; Sat, 16 Apr 2016 15:29:54 -0700 (PDT)
Received: from dmz-mailsec-scanner-3.mit.edu (dmz-mailsec-scanner-3.mit.edu [18.9.25.14]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B2D1912B00F for <kitten@ietf.org>; Sat, 16 Apr 2016 15:29:53 -0700 (PDT)
X-AuditID: 1209190e-cffff70000004bd5-57-5712bce0388f
Received: from mailhub-auth-1.mit.edu ( [18.9.21.35]) (using TLS with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by (Symantec Messaging Gateway) with SMTP id D3.72.19413.0ECB2175; Sat, 16 Apr 2016 18:29:52 -0400 (EDT)
Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) by mailhub-auth-1.mit.edu (8.13.8/8.9.2) with ESMTP id u3GMTpIY024475; Sat, 16 Apr 2016 18:29:52 -0400
Received: from multics.mit.edu (system-low-sipb.mit.edu [18.187.2.37]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.13.8/8.12.4) with ESMTP id u3GMTnZ8020051 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Sat, 16 Apr 2016 18:29:51 -0400
Received: (from kaduk@localhost) by multics.mit.edu (8.12.9.20060308) id u3GMTmZH018379; Sat, 16 Apr 2016 18:29:48 -0400 (EDT)
Date: Sat, 16 Apr 2016 18:29:48 -0400
From: Benjamin Kaduk <kaduk@MIT.EDU>
To: Rick van Rein <rick@openfortress.nl>
In-Reply-To: <570E0415.5090501@openfortress.nl>
Message-ID: <alpine.GSO.1.10.1604161828410.26829@multics.mit.edu>
References: <570E0415.5090501@openfortress.nl>
User-Agent: Alpine 1.10 (GSO 962 2008-03-14)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFnrAIsWRmVeSWpSXmKPExsUixCmqrPtgj1C4wb5rkhZHN69isXj66h6b A5PHkiU/mTw2/GtiC2CK4rJJSc3JLEst0rdL4MrY9Hwta0GneMXC/+uZGhj3CnUxcnJICJhI fL4yj6WLkYtDSKCNSaJvXTeUs5FRYs/kb1DOISaJhR8bmSCcBkaJxWefMIH0swhoS1w/8pER xGYTUJGY+WYjG4gtIqAh8fnXVDCbWUBYYv25GcxdjBwcwgJpEjuWuoKEOQX0Jfas/ABWwivg KLH4/nJ2kBIhAT2Jo0c5QcKiAjoSq/dPYYEoEZQ4OfMJC8RELYnl07exTGAUmIUkNQtJagEj 0ypG2ZTcKt3cxMyc4tRk3eLkxLy81CJdY73czBK91JTSTYzggJTk28E4qcH7EKMAB6MSD2/G NsFwIdbEsuLK3EOMkhxMSqK8nQVAIb6k/JTKjMTijPii0pzU4kOMEhzMSiK8pruEwoV4UxIr q1KL8mFS0hwsSuK8jAwMDEIC6YklqdmpqQWpRTBZGQ4OJQneBbuBGgWLUtNTK9Iyc0oQ0kwc nCDDeYCGB4HU8BYXJOYWZ6ZD5E8xKkqJ864FSQiAJDJK8+B6wQljN5PqK0ZxoFeEefeBVPEA kw1c9yugwUxAg63fCIIMLklESEk1AH2fFnF3BatH9UqWhpURPlfkrm/vndig8nchj5DGnKtz 181vU7vnXDnDw/oKq0XwobjnnfPWb3iQPMnnoVtDl3e1yMqcWR6Pg+tjtkgVPdorO/+vKN/F HUymBvfLfETY+1ZFWqw5zqSU13J+qdGq6fXvqxV/XVe0Lvv8osn+4VfRuU9rlyl0KLEUZyQa ajEXFScCAHqAZu3zAgAA
Archived-At: <http://mailarchive.ietf.org/arch/msg/kitten/xdtDJXLg0EG-iFHnatQJToVdvu8>
Cc: kitten@ietf.org
Subject: Re: [kitten] An idea to go beyond 32 flags in draft-ietf-kitten-kerberos-iana-registries-03
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 16 Apr 2016 22:29:56 -0000

[sorry for the extra copy, Rick; I had to enter kitten manually since
reply-all tried to send the wrong place, and then I typo'd it]

Hi Rick,

Greg has already covered some of this, but I also wanted to say a few
things.

On Wed, 13 Apr 2016, Rick van Rein wrote:

> Hello Tom / Kitten,
>
> Last week the Kerberos IANA registries draft popped up again.  I find
> the general useful, but I feel strong objections against constraining
> "Named Bit Assignments" to the 0..31 range.  I mentioned this before,
> but now also see a way out.  My proposal is the replacement text at the
> end of this email.
>
> My reasons for my objection + alternative are
>
>  (1) specifications should not follow implementations, and certainly not
> confirm bad ones;

A motto of the IETF says (in part), "we believe in rough consensus and
running code".  In practice, this means that weight is given to actual
existing code, and this point is not really true -- IETF specifications
frequently do follow implementations, even bad ones, since that's the
route to getting things deployed.  A perfect spec that is not implemented
is not particularly useful...

>  (2) limiting to 32 named bits will confirm this lowest common
> denominator and increase the number of flawed implementations;
>  (3) after confirming a 32-bit limit, we have cut off any chance of
> growing beyond this;

This is also not exactly true; a future standards-track document is
permitted to change the registry specification and allow a larger number
of bits to be used.  And implementations still have to be prepared to
decode larger bitstrings with a conformant ASN.1 decoder -- just reading
bits off the wire into a uint32 would lead to software vulnerabilities.
Perhaps it might confirm it in those libraries' API layer, but that does
not seem to be a materially worse situation than what we have at present.

>  (4) software that is incapable of being updated is a security problem,
> not something that a spec should seek to confirm;

I'm not sure what is suggesting that software is fully *incapable* of
being updated; rather that making updates in this case would be a lot of
effort and require churn in the user interface.  Seeking to avoid having
to go through all that effort until it is fully necessary is reasonable to
many people, though reasonable people could certainly disagree.

>  (5) we currently cannot supply bits for experimental/private use, for
> instance for development purposes; developers end up stealing bits and
> the registry becomes an administration of such sins.

This is true, and is somewhat unfortunate.  On the other hand (as Greg
notes), there are usually other places in the protocol where similar
information could be placed for experimental purposes.  That is not a
particularly compelling argument, of course, but in the balance, to me,
the 32-bit limitation still makes sense for now.

-Ben