Re: [Ietf-krb-wg] RFC 4537 question
Luke Howard <lukeh@padl.com> Tue, 30 December 2008 11:49 UTC
Return-Path: <ietf-krb-wg-bounces@lists.anl.gov>
X-Original-To: ietfarch-krb-wg-archive@core3.amsl.com
Delivered-To: ietfarch-krb-wg-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E90033A63EC for <ietfarch-krb-wg-archive@core3.amsl.com>; Tue, 30 Dec 2008 03:49:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BCI9TiFYiG8r for <ietfarch-krb-wg-archive@core3.amsl.com>; Tue, 30 Dec 2008 03:49:30 -0800 (PST)
Received: from mailhost.anl.gov (mailhost.anl.gov [130.202.113.50]) by core3.amsl.com (Postfix) with ESMTP id B76683A686B for <krb-wg-archive@lists.ietf.org>; Tue, 30 Dec 2008 03:49:30 -0800 (PST)
Received: from mailhost.anl.gov (localhost [127.0.0.1]) by localhost.ctd.anl.gov (Postfix) with ESMTP id BC3BD33; Tue, 30 Dec 2008 05:49:19 -0600 (CST)
Received: from lists.anl.gov (katydid.it.anl.gov [146.137.96.32]) by mailhost.anl.gov (Postfix) with ESMTP id BDA282E; Tue, 30 Dec 2008 05:49:12 -0600 (CST)
Received: from katydid.it.anl.gov (localhost [127.0.0.1]) by lists.anl.gov (Postfix) with ESMTP id 0014880DDF; Tue, 30 Dec 2008 05:49:11 -0600 (CST)
X-Original-To: ietf-krb-wg@lists.anl.gov
Delivered-To: ietf-krb-wg@lists.anl.gov
Received: from mailhost.anl.gov (mailhost.anl.gov [130.202.113.50]) by lists.anl.gov (Postfix) with ESMTP id 0D06D80D9E for <ietf-krb-wg@lists.anl.gov>; Tue, 30 Dec 2008 05:49:10 -0600 (CST)
Received: by mailhost.anl.gov (Postfix) id F211718; Tue, 30 Dec 2008 05:49:09 -0600 (CST)
Delivered-To: ietf-krb-wg@anl.gov
Received: from mailhost.anl.gov (localhost [127.0.0.1]) by localhost.ctd.anl.gov (Postfix) with ESMTP id CCF002A for <ietf-krb-wg@anl.gov>; Tue, 30 Dec 2008 05:49:09 -0600 (CST)
Received: from mailrelay.anl.gov (mailrelay.anl.gov [130.202.101.22]) by mailhost.anl.gov (Postfix) with ESMTP id B419018 for <ietf-krb-wg@anl.gov>; Tue, 30 Dec 2008 05:49:09 -0600 (CST)
Received: from localhost (localhost [127.0.0.1]) by localhost.it.anl.gov (Postfix) with ESMTP id 97C0B7CC07F; Tue, 30 Dec 2008 05:49:09 -0600 (CST)
Received: from mailrelay.anl.gov ([127.0.0.1]) by localhost (mailrelay.anl.gov [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 05806-10; Tue, 30 Dec 2008 05:49:09 -0600 (CST)
Received: from mailgateway.anl.gov (mailgateway.anl.gov [130.202.101.28]) by mailrelay2.anl.gov (Postfix) with ESMTP id 6C7C07CC079 for <ietf-krb-wg@anl.gov>; Tue, 30 Dec 2008 05:49:09 -0600 (CST)
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AmEDAHuZWUnLDSABgWdsb2JhbACTdAEBFiKoWFiQSYZE
X-IronPort-AV: E=Sophos;i="4.36,301,1228111200"; d="scan'208";a="22744373"
Received: from au.padl.com ([203.13.32.1]) by mailgateway.anl.gov with ESMTP; 30 Dec 2008 05:49:07 -0600
Received: from [10.241.26.177] ([58.171.206.64]) (authenticated bits=0) by au.padl.com (8.13.6/8.13.6/SuSE Linux 0.8) with ESMTP id mBUBmqg3021730 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Tue, 30 Dec 2008 22:49:00 +1100
References: <52A05C71-A84F-46C5-AE02-65C759E27586@padl.com> <AB1E5627D2489D45BD01B84BD5B900461499B69DC0@NA-EXMSG-W601.wingroup.windeploy.ntdev.microsoft.com> <57E3D46C-270A-4227-9AEC-9249E02320BD@padl.com> <8CCC225A-F023-4528-8D7F-C5DC7E67F5BB@mit.edu> <AB1E5627D2489D45BD01B84BD5B900461499B69ECD@NA-EXMSG-W601.wingroup.windeploy.ntdev.microsoft.com>
Message-Id: <41C8F9AE-86D4-4EA7-85F9-BDF432A4D134@padl.com>
From: Luke Howard <lukeh@padl.com>
To: Larry Zhu <lzhu@windows.microsoft.com>
In-Reply-To: <AB1E5627D2489D45BD01B84BD5B900461499B69ECD@NA-EXMSG-W601.wingroup.windeploy.ntdev.microsoft.com>
X-Mailer: iPhone Mail (5G77)
Mime-Version: 1.0 (iPhone Mail 5G77)
Date: Tue, 30 Dec 2008 22:48:48 +1100
X-Virus-Scanned: Debian amavisd-new at frigga.it.anl.gov
Cc: "ietf-krb-wg@anl.gov" <ietf-krb-wg@anl.gov>, Ken Raeburn <raeburn@MIT.EDU>
Subject: Re: [Ietf-krb-wg] RFC 4537 question
X-BeenThere: ietf-krb-wg@lists.anl.gov
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "This is a list for the IETF Kerberos Working Group. {WORLDPUB, EXTERNAL}" <ietf-krb-wg.lists.anl.gov>
List-Unsubscribe: <https://lists.anl.gov/mailman/listinfo/ietf-krb-wg>, <mailto:ietf-krb-wg-request@lists.anl.gov?subject=unsubscribe>
List-Archive: <https://lists.anl.gov/pipermail/ietf-krb-wg>
List-Post: <mailto:ietf-krb-wg@lists.anl.gov>
List-Help: <mailto:ietf-krb-wg-request@lists.anl.gov?subject=help>
List-Subscribe: <https://lists.anl.gov/mailman/listinfo/ietf-krb-wg>, <mailto:ietf-krb-wg-request@lists.anl.gov?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: ietf-krb-wg-bounces@lists.anl.gov
Errors-To: ietf-krb-wg-bounces@lists.anl.gov
Option #2 is essentialy what I implemented. Sent from my iPhone On 30/12/2008, at 4:57 PM, Larry Zhu <lzhu@windows.microsoft.com> wrote: > The client has to deal with servers that do not support RFC4537, > thus I tend to believe it is acceptable to ignore the etype list > from the client. This is option #2 from the list Ken provided. > > > -----Original Message----- > From: Ken Raeburn [mailto:raeburn@MIT.EDU] > Sent: Monday, December 29, 2008 6:19 PM > To: Luke Howard > Cc: Larry Zhu; ietf-krb-wg@anl.gov > Subject: Re: [Ietf-krb-wg] RFC 4537 question > > On Dec 29, 2008, at 09:46, Luke Howard wrote: >> Consider the case where the ticket session key enctype is absent >> from EtypeList but the server prefers that enctype over any proposed >> by the client. Presumably the server is free to ignore the EtypeList >> and use that enctype (even though that may mean using the ticket >> session key rather than a server subkey). As far as the client is >> concerned this is identical behaviour to a server that doesn't >> implement RFC 4537. > > Yes, the spec is kind of unclear here, and I think this was an area I > complained about when it was in draft status, though I didn't see the > scope of it then. If the server prefers the session key or client- > subkey enctype over all of those in the proposed list, it MUST NOT > "negotiate" that type, but it also is not required to pick one of the > others unless in prefers that other. > > So I see three options, none of them all that great: > * Pick an enctype from the list anyways, despite it not being > preferred; this seems counter-indicated by the "...and the server > prefers an enctype from the client's enctype list" bit. > * Don't "negotiate", and instead fall back to pre-4537 behavior, > namely, using the same enctype or one known a priori to be supported > (though the client might then choose not to continue talking to the > server). Which essentially negates the "MUST NOT be negotiated" part, > and hinges on how you define "negotiate" in this context. > * Treat it as an error, and refuse to finish the authentication > exchange, which seems kind of silly given that a pre-4537 > implementation would succeed in authenticating (though the client > might then choose not to continue talking to it). And perhaps some > error code should be recommended. > > Of course, option #1 assumes that at least one of the indicated > enctypes is known and supported by the server implementation. > > We should also get the spec fixed. While it's an important technical > point without (IMO) a clear and obvious single solution, in terms of > document changes it might be just one or two new sentences. > Procedurally, I don't know if it would qualify as an erratum or if we > need to republish. > > So, when might this come up? The only example I can come up with off > the top of my head is a telnet client sending an authenticator with an > AES session key, but sending a list of DES enctypes (I'm assuming here > that server-supplied subkey would be used under that protocol spec) > because that's all it supports for telnet encryption. The server > might be configured to prefer DES over AES for this one application, > but if its telnet implementation has an update to support AES, or it > hasn't been updated to know about RFC 4537 (but the Kerberos library > has, and enables it by default, with AES preferred over DES by > default), then, maybe not. I guess the only approach that would work > in this case (in the sense of letting the two parties talk) is #1 -- > select an enctype from the list even if you like the session key type > better. > > If none of the enctypes are acceptable at all (e.g., you disabled DES, > or the enctypes are not recognized by the server implementation)... > well, I think #2 might let the client give a better error message, and > gives a more secure indication that the server can't fulfill the > request than an unprotected KRB-ERROR (which I assume would be the > result of #3), but that doesn't mean that's what the spec says.... > > Ken > > _______________________________________________ ietf-krb-wg mailing list ietf-krb-wg@lists.anl.gov https://lists.anl.gov/mailman/listinfo/ietf-krb-wg
- [Ietf-krb-wg] RFC 4537 question Luke Howard
- Re: [Ietf-krb-wg] RFC 4537 question Larry Zhu
- Re: [Ietf-krb-wg] RFC 4537 question Luke Howard
- Re: [Ietf-krb-wg] RFC 4537 question Ken Raeburn
- Re: [Ietf-krb-wg] RFC 4537 question Larry Zhu
- Re: [Ietf-krb-wg] RFC 4537 question Luke Howard
- Re: [Ietf-krb-wg] RFC 4537 question Jeffrey Hutzelman