[Ietf-krb-wg] Publication Request: draft-josefsson-kerberos5-starttls-07.txt (fwd)

Jeffrey Hutzelman <jhutz@cmu.edu> Tue, 01 December 2009 21:26 UTC

Return-Path: <ietf-krb-wg-bounces@lists.anl.gov>
X-Original-To: ietfarch-krb-wg-archive@core3.amsl.com
Delivered-To: ietfarch-krb-wg-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2629228C130 for <ietfarch-krb-wg-archive@core3.amsl.com>; Tue, 1 Dec 2009 13:26:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.676
X-Spam-Level:
X-Spam-Status: No, score=-4.676 tagged_above=-999 required=5 tests=[AWL=1.923, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aI6oxZehXPOz for <ietfarch-krb-wg-archive@core3.amsl.com>; Tue, 1 Dec 2009 13:26:09 -0800 (PST)
Received: from mailhost.anl.gov (mailhost.anl.gov [130.202.113.50]) by core3.amsl.com (Postfix) with ESMTP id 801353A6809 for <krb-wg-archive@lists.ietf.org>; Tue, 1 Dec 2009 13:26:09 -0800 (PST)
Received: from mailhost.anl.gov (mailhost.anl.gov [130.202.113.50]) by localhost.anl.gov (Postfix) with ESMTP id 929C09D; Tue, 1 Dec 2009 15:26:01 -0600 (CST)
Received: from lists.anl.gov (katydid.it.anl.gov [146.137.96.32]) by mailhost.anl.gov (Postfix) with ESMTP id DC4668E; Tue, 1 Dec 2009 15:25:57 -0600 (CST)
Received: from katydid.it.anl.gov (localhost [127.0.0.1]) by lists.anl.gov (Postfix) with ESMTP id 89AD280E34; Tue, 1 Dec 2009 15:25:57 -0600 (CST)
X-Original-To: ietf-krb-wg@lists.anl.gov
Delivered-To: ietf-krb-wg@lists.anl.gov
Received: from mailhost.anl.gov (mailhost.anl.gov [130.202.113.50]) by lists.anl.gov (Postfix) with ESMTP id 7F2D480E32 for <ietf-krb-wg@lists.anl.gov>; Tue, 1 Dec 2009 15:25:55 -0600 (CST)
Received: by mailhost.anl.gov (Postfix) id 6F24681; Tue, 1 Dec 2009 15:25:55 -0600 (CST)
Delivered-To: ietf-krb-wg@anl.gov
Received: from mailhost.anl.gov (mailhost.anl.gov [130.202.113.50]) by localhost.anl.gov (Postfix) with ESMTP id 67B7B8E for <ietf-krb-wg@anl.gov>; Tue, 1 Dec 2009 15:25:55 -0600 (CST)
Received: from mailrelay.anl.gov (mailrelay.anl.gov [130.202.101.22]) by mailhost.anl.gov (Postfix) with ESMTP id 5CBC381 for <ietf-krb-wg@anl.gov>; Tue, 1 Dec 2009 15:25:55 -0600 (CST)
Received: from localhost (localhost [127.0.0.1]) by localhost.it.anl.gov (Postfix) with ESMTP id 38A687CC084; Tue, 1 Dec 2009 15:25:55 -0600 (CST)
Received: from mailrelay.anl.gov ([127.0.0.1]) by localhost (mailrelay.anl.gov [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 02293-06-7; Tue, 1 Dec 2009 15:25:55 -0600 (CST)
Received: from mailgateway.anl.gov (mailgateway.anl.gov [130.202.101.28]) by mailrelay.anl.gov (Postfix) with ESMTP id 7F48F7CC082 for <ietf-krb-wg@anl.gov>; Tue, 1 Dec 2009 15:25:54 -0600 (CST)
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvkAAC8ZFUuAAtnFmWdsb2JhbACbdwEBAQEBCAsKBxOtMSKGMYhNgj2BdASKXg
X-IronPort-AV: E=Sophos;i="4.47,322,1257141600"; d="scan'208";a="34263671"
Received: from smtp02.srv.cs.cmu.edu ([128.2.217.197]) by mailgateway.anl.gov with ESMTP; 01 Dec 2009 15:25:46 -0600
Received: from ATLANTIS.WV.CS.CMU.EDU (SIRIUS.FAC.CS.CMU.EDU [128.2.216.216]) (authenticated bits=0) by smtp02.srv.cs.cmu.edu (8.13.6/8.13.6) with ESMTP id nB1LPkPn023563 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 1 Dec 2009 16:25:46 -0500 (EST)
Date: Tue, 01 Dec 2009 16:25:46 -0500
From: Jeffrey Hutzelman <jhutz@cmu.edu>
To: ietf-krb-wg@anl.gov
Message-ID: <1851CFF190996BE86D1E4820@atlantis.pc.cs.cmu.edu>
X-Mailer: Mulberry/4.0.8 (Linux/x86)
MIME-Version: 1.0
Content-Disposition: inline
X-Scanned-By: mimedefang-cmuscs on 128.2.217.197
X-Virus-Scanned: Debian amavisd-new at frigga.it.anl.gov
Cc: jhutz@cmu.edu
Subject: [Ietf-krb-wg] Publication Request: draft-josefsson-kerberos5-starttls-07.txt (fwd)
X-BeenThere: ietf-krb-wg@lists.anl.gov
X-Mailman-Version: 2.1.11
Precedence: list
List-Id: "This is a list for the IETF Kerberos Working Group. {WORLDPUB, EXTERNAL}" <ietf-krb-wg.lists.anl.gov>
List-Unsubscribe: <https://lists.anl.gov/mailman/options/ietf-krb-wg>, <mailto:ietf-krb-wg-request@lists.anl.gov?subject=unsubscribe>
List-Archive: <https://lists.anl.gov/pipermail/ietf-krb-wg>
List-Post: <mailto:ietf-krb-wg@lists.anl.gov>
List-Help: <mailto:ietf-krb-wg-request@lists.anl.gov?subject=help>
List-Subscribe: <https://lists.anl.gov/mailman/listinfo/ietf-krb-wg>, <mailto:ietf-krb-wg-request@lists.anl.gov?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: ietf-krb-wg-bounces@lists.anl.gov
Errors-To: ietf-krb-wg-bounces@lists.anl.gov

------------ Forwarded Message ------------
Date: Tuesday, December 01, 2009 04:24:59 PM -0500
From: Jeffrey Hutzelman <jhutz@cmu.edu>
To: tim.polk@nist.gov
Cc: jhutz@cmu.edu, iesg-secretary@ietf.org
Subject: Publication Request: draft-josefsson-kerberos5-starttls-07.txt

This is a request to the IESG to approve publication of "Using Kerberos
V5 over the Transport Layer Security (TLS) protocol",
draft-josefsson-kerberos5-starttls-07.txt, as an Informational RFC.
This document is a product of the Kerberos Working Group.

(1.a)  Who is the Document Shepherd for this document?  Has the
       Document Shepherd personally reviewed this version of the
       document and, in particular, does he or she believe this
       version is ready for forwarding to the IESG for publication?

       >> The Document Shepherd for this document is Jeffrey Hutzelman,
       >> <jhutz@cmu.edu>.  I have reviewed this document, and I believe
       >> it is ready for IETF-wide review and publication as a
       >> Proposed Standard.

(1.b)  Has the document had adequate review both from key WG members
       and from key non-WG members?  Does the Document Shepherd have
       any concerns about the depth or breadth of the reviews that
       have been performed?

       >> This document has received review both within the working group
       >> and from key experts outside the working group.  Any issues raised
       >> have been resolved.

(1.c)  Does the Document Shepherd have concerns that the document
       needs more review from a particular or broader perspective,
       e.g., security, operational complexity, someone familiar with
       AAA, internationalization or XML?

       >> This document defines the use of TLS to protect exchanges
       >> between a Kerberos client and Key Distribution Center (KDC).
       >> As such, it depends on the security properties of TLS in
       >> ways that may warrant further review from subject-matter
       >> experts.  To date, no such review has been solicited or
       >> received.
       >>
       >> In addition, as described below, there is an issue which may
       >> benefit from input from PKIX experts.

(1.d)  Does the Document Shepherd have any specific concerns or
       issues with this document that the Responsible Area Director
       and/or the IESG should be aware of?  For example, perhaps he
       or she is uncomfortable with certain parts of the document, or
       has concerns whether there really is a need for it.  In any
       event, if the WG has discussed those issues and has indicated
       that it still wishes to advance the document, detail those
       concerns here.  Has an IPR disclosure related to this document
       been filed?  If so, please include a reference to the
       disclosure and summarize the WG discussion and conclusion on
       this issue.

       >> This document allows for two methods for Kerberos clients to
       >> verify the certificate of a KDC: preshared certificates and
       >> RFC5280 path validation.  For the later case, a new type is
       >> defined for the otherName field, containing the name of the
       >> Kerberos realm for which the certificate subject acts as KDC;
       >> the presence of a name of this type is taken to mean that the
       >> certificate may be used with this protocol.  No extended key
       >> purpose is defined for this protocol.
       >>
       >> Several concerns about this approach have been raised by some
       >> working group participants, including myself.  Particularly,
       >> it would seem appropriate to reuse the method used by PKINIT
       >> (RFC4556), which identifies a realm's KDC's using a particular
       >> value in the KRB5PrincipalName type defined in that document
       >> (see section 3.2.4), rather than defining a new name type.
       >> More importantly, the failure to define an extended key purpose
       >> means it would be impossible to issue a certificate which
       >> restricted to use only with this protocol, or with this
       >> protocol in combination with some other specific set of
       >> protocols, such as PKINIT.
       >>
       >> PKINIT defines a key purpose for use in certificates issued
       >> to KDC's, and requires its presence except in certificates
       >> which are identified as belonging to KDC's by use of the
       >> KRB5PrincipalName type with an appropriate value.  However, it
       >> does not waive RFC5280's requirement that a certificate which
       >> contains the extendedKeyUsage extension be used only for the
       >> specific purposes identified there.  We believe this approach
       >> to also be appropriate for the present document.
       >>
       >> The working group was unable to reach a consensus on this
       >> question, but there was a strong consensus that it would be
       >> preferable to move forward with the document rather than delay
       >> indefinitely attempting to come to a resolution.  Therefore,
       >> it was agreed that the document be submitted in its present
       >> form, with this issue called out and described in the writeup,
       >> and that participants who felt strongly about this issue would
       >> have the opportunity to re-raise it during IETF Last Call.
       >>
       >> This consensus and agreement to move forward was supported by
       >> all of those who participated in discussion of this issue,
       >> including myself.  Therefore, I expect no appeals or similar
       >> problems as a result.  However, I feel that additional input
       >> from PKIX experts may be helpful, and I do expect this issue
       >> to be raised during IETF Last Call.
       >>
       >> No IPR disclosures related to this document have been filed.

(1.e)  How solid is the WG consensus behind this document?  Does it
       represent the strong concurrence of a few individuals, with
       others being silent, or does the WG as a whole understand and
       agree with it?

       >> This is solid consensus within the working group to publish
       >> this document.  It is worth noting that a partial overlap
       >> exists between the functionality of this document and of the
       >> FAST preauthentication mechanism described in section 6.4 of
       >> draft-ietf-krb-wg-preauth-framework-15.txt, which provides
       >> an encrypted tunnel to protect exchange of preauthentication
       >> data between a client and a KDC.  The intended status of the
       >> latter document is standards track, and there exists a rough
       >> consensus to require implementation of the FAST mechanism
       >> in Kerberos implementations which conform to the framework
       >> defined in that document.  Therefore, we are requesting the
       >> publication of the present document as an Informational RFC,
       >> and may request that it be upgraded to Proposed Standard at
       >> a later time.

(1.f)  Has anyone threatened an appeal or otherwise indicated extreme
       discontent?  If so, please summarise the areas of conflict in
       separate email messages to the Responsible Area Director.  (It
       should be in a separate email because this questionnaire is
       entered into the ID Tracker.)

       >> There have been no threats of appeal or other expressions of
       >> of discontent as a result of publication of this document.
       >> There is some dismay at the length of time it has taken to
       >> progress this document, as both the author and working group
       >> believed the technical aspects of the document were ready
       >> well over a year ago.  Unfortunately, this document has been
       >> through multiple cycles of long silence followed by a new
       >> issue surfacing just as the chair was about to move forward
       >> on it.

(1.g)  Has the Document Shepherd personally verified that the
       document satisfies all ID nits?  (See
       http://www.ietf.org/ID-Checklist.html and
       http://tools.ietf.org/tools/idnits/).  Boilerplate checks are
       not enough; this check needs to be thorough.  Has the document
       met all formal review criteria it needs to, such as the MIB
       Doctor, media type and URI type reviews?

       >> This document has been run through the idnits tool, and was
       >> reviewed manually for compliance with requirements not checked
       >> by the automatic tool.  No additional formal review criteria
       >> apply to this document.

(1.h)  Has the document split its references into normative and
       informative?  Are there normative references to documents that
       are not ready for advancement or are otherwise in an unclear
       state?  If such normative references exist, what is the
       strategy for their completion?  Are there normative references
       that are downward references, as described in [RFC3967]?  If
       so, list these downward references to support the Area
       Director in the Last Call procedure for them [RFC3967].

       >> References have been split appropriately.  All references
       >> are to published RFC's, and all normative references are
       >> to BCP or standards-track documents.

(1.i)  Has the Document Shepherd verified that the document IANA
       consideration section exists and is consistent with the body
       of the document?  If the document specifies protocol
       extensions, are reservations requested in appropriate IANA
       registries?  Are the IANA registries clearly identified?  If
       the document creates a new registry, does it define the
       proposed initial contents of the registry and an allocation
       procedure for future registrations?  Does it suggest a
       reasonable name for the new registry?  See [RFC2434].  If the
       document describes an Expert Review process has Shepherd
       conferred with the Responsible Area Director so that the IESG
       can appoint the needed Expert during the IESG Evaluation?

       >> The IANA considerations section correctly reflects the one
       >> action required of IANA, which is to assign a Kerberos TCP
       >> extension number.
       >>
       >> This document also requires the assignment of a Kerberos
       >> Preauthentication Data Type number; however, that registry
       >> is currently controlled by the Kerberos working group and
       >> an appropriate number will be assigned before the document
       >> is published.  We hope soon to begin preparing a document
       >> which will turn this and several other Kerberos registries
       >> over to IANA.

(1.j)  Has the Document Shepherd verified that sections of the
       document that are written in a formal language, such as XML
       code, BNF rules, MIB definitions, etc., validate correctly in
       an automated checker?

       >> No part of this document is written in a formal language
       >> requiring such verification.  It does contain an ASN.1
       >> sequence definition which appears normatively in RFC4120
       >> and is copied in this document for clarity.

(1.k)  The IESG approval announcement includes a Document
       Announcement Write-Up.  Please provide such a Document
       Announcement Write-Up?  Recent examples can be found in the
       "Action" announcements for approved documents.  The approval
       announcement contains the following sections:


Technical Summary


   This document specify how the Kerberos V5 protocol can be transported
   over the Transport Layer Security (TLS) protocol, to provide
   additional security features.


Working Group Summary

   This technical specification represents the consensus of the
   Kerberos Working Group.  However, the working group is also
   working on an alternate solution to an overlapping problem.  It
   is not yet clear whether either or both specifications will win
   in the marketplace or whether either will become mandatory in a
   future version of the base Kerberos specification.  However, we
   feel it is important to publish these specifications to gain
   implemention and deployment experience.  Therefore, we are
   requesting publication of this document as an Informational RFC,
   and may request that it be upgraded to Proposed Standard at a
   later time.


Document Quality

   At least one implementor has indicated an intention to support
   the extension described in this document.


Personnel

   The Document Shepherd for this document is Jeffrey Hutzelman.
   The responsible Area Director is Tim Polk.



---------- End Forwarded Message ----------


_______________________________________________
ietf-krb-wg mailing list
ietf-krb-wg@lists.anl.gov
https://lists.anl.gov/mailman/listinfo/ietf-krb-wg