Re: [Ietf-krb-wg] AD review of draft-ietf-krb-wg-kerberos-referrals-14

Sam Hartman <hartmans-ietf@mit.edu> Fri, 14 September 2012 18:08 UTC

Return-Path: <ietf-krb-wg-bounces@lists.anl.gov>
X-Original-To: ietfarch-krb-wg-archive@ietfa.amsl.com
Delivered-To: ietfarch-krb-wg-archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C0CAE21F84DF for <ietfarch-krb-wg-archive@ietfa.amsl.com>; Fri, 14 Sep 2012 11:08:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.489
X-Spam-Level:
X-Spam-Status: No, score=-103.489 tagged_above=-999 required=5 tests=[AWL=3.110, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Tt1o0wAwIUo3 for <ietfarch-krb-wg-archive@ietfa.amsl.com>; Fri, 14 Sep 2012 11:08:27 -0700 (PDT)
Received: from mailhost.anl.gov (mailhost.anl.gov [130.202.113.50]) by ietfa.amsl.com (Postfix) with ESMTP id F3A7421F84D5 for <krb-wg-archive@lists.ietf.org>; Fri, 14 Sep 2012 11:08:26 -0700 (PDT)
Received: from mailhost.anl.gov (mailhost.anl.gov [130.202.113.50]) by localhost.anl.gov (Postfix) with ESMTP id 80785D70; Fri, 14 Sep 2012 13:08:26 -0500 (CDT)
Received: from lists.anl.gov (katydid.it.anl.gov [146.137.96.32]) by mailhost.anl.gov (Postfix) with ESMTP id D6882D5B; Fri, 14 Sep 2012 13:08:24 -0500 (CDT)
Received: from katydid.it.anl.gov (localhost [127.0.0.1]) by lists.anl.gov (Postfix) with ESMTP id 9E1A054C006; Fri, 14 Sep 2012 13:08:24 -0500 (CDT)
X-Original-To: ietf-krb-wg@lists.anl.gov
Delivered-To: ietf-krb-wg@lists.anl.gov
Received: from mailrelay.anl.gov (mailrelay.anl.gov [130.202.101.22]) by lists.anl.gov (Postfix) with ESMTP id A1AEA8104B for <ietf-krb-wg@lists.anl.gov>; Fri, 14 Sep 2012 13:08:23 -0500 (CDT)
Received: from localhost (localhost [127.0.0.1]) by localhost.it.anl.gov (Postfix) with ESMTP id 8B7307CC123; Fri, 14 Sep 2012 13:08:23 -0500 (CDT)
Received: from mailrelay.anl.gov ([127.0.0.1]) by localhost (mailrelay.anl.gov [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 28081-05; Fri, 14 Sep 2012 13:08:23 -0500 (CDT)
Received: from mailgateway.anl.gov (mailgateway.anl.gov [130.202.101.28]) by mailrelay.anl.gov (Postfix) with ESMTP id 6910A7CC08A for <ietf-krb-wg@lists.anl.gov>; Fri, 14 Sep 2012 13:08:23 -0500 (CDT)
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AhYHAGpxU1AXFeNd/2dsb2JhbABFgkS5PoEHgiEBBQ8BKj8QCyElDwEEGDETiA2ndQGKb4kHixUkhkQDpgKDAg
X-IronPort-AV: E=Sophos;i="4.80,423,1344229200"; d="scan'208";a="1817045"
Received: from ec2-23-21-227-93.compute-1.amazonaws.com ([23.21.227.93]) by mailgateway.anl.gov with ESMTP/TLS/ADH-AES256-SHA; 14 Sep 2012 13:08:23 -0500
Received: from carter-zimmerman.suchdamage.org (c-98-217-126-210.hsd1.ma.comcast.net [98.217.126.210]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (Client CN "laptop", Issuer "laptop" (not verified)) by mail.suchdamage.org (Postfix) with ESMTPS id E67A8202C1; Fri, 14 Sep 2012 14:08:13 -0400 (EDT)
Received: by carter-zimmerman.suchdamage.org (Postfix, from userid 8042) id 4C7934149; Fri, 14 Sep 2012 14:08:03 -0400 (EDT)
From: Sam Hartman <hartmans-ietf@mit.edu>
To: Nico Williams <nico@cryptonector.com>
References: <50512CF2.6090801@cs.tcd.ie> <tslobl84m2q.fsf@mit.edu> <CAK3OfOjJu0_nMN3tqXY_V34daC3iPraW_5oR9bkV5=fB_AN4xg@mail.gmail.com>
Date: Fri, 14 Sep 2012 14:08:03 -0400
In-Reply-To: <CAK3OfOjJu0_nMN3tqXY_V34daC3iPraW_5oR9bkV5=fB_AN4xg@mail.gmail.com> (Nico Williams's message of "Fri, 14 Sep 2012 11:43:58 -0500")
Message-ID: <tslpq5o1nr0.fsf@mit.edu>
User-Agent: Gnus/5.110009 (No Gnus v0.9) Emacs/22.3 (gnu/linux)
MIME-Version: 1.0
X-Virus-Scanned: Debian amavisd-new at frigga.it.anl.gov
Cc: "krb-wg mailing list (ietf-krb-wg@lists.anl.gov)" <ietf-krb-wg@lists.anl.gov>, Sam Hartman <hartmans-ietf@mit.edu>
Subject: Re: [Ietf-krb-wg] AD review of draft-ietf-krb-wg-kerberos-referrals-14
X-BeenThere: ietf-krb-wg@lists.anl.gov
X-Mailman-Version: 2.1.14
Precedence: list
List-Id: "This is a list for the IETF Kerberos Working Group. {WORLDPUB, EXTERNAL}" <ietf-krb-wg.lists.anl.gov>
List-Unsubscribe: <https://lists.anl.gov/mailman/options/ietf-krb-wg>, <mailto:ietf-krb-wg-request@lists.anl.gov?subject=unsubscribe>
List-Archive: <https://lists.anl.gov/pipermail/ietf-krb-wg>
List-Post: <mailto:ietf-krb-wg@lists.anl.gov>
List-Help: <mailto:ietf-krb-wg-request@lists.anl.gov?subject=help>
List-Subscribe: <https://lists.anl.gov/mailman/listinfo/ietf-krb-wg>, <mailto:ietf-krb-wg-request@lists.anl.gov?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: ietf-krb-wg-bounces@lists.anl.gov
Sender: ietf-krb-wg-bounces@lists.anl.gov

>>>>> "Nico" == Nico Williams <nico@cryptonector.com> writes:

    Nico> On Fri, Sep 14, 2012 at 11:15 AM, Sam Hartman <hartmans-ietf@mit.edu> wrote:
    Stephen> - p10, last para, maybe s/should/ought/ if you don't want
    Stephen> that as a 2119 should? Even without that being a SHOULD, it
    Stephen> seems odd to recommend that the client know about realms,
    Stephen> to the extent that it can differentiate between them, in a
    Stephen> spec whose purpose is to get rid of per-realm configuration
    Stephen> from clients. Is there in fact a missing 2119-level SHOULD
    Stephen> here that also says how to do this with no client config?
    Stephen> Or, are you really assuming that clients won't make any
    Stephen> checks, in which case wouldn't it be better to confess the
    Stephen> truth?
    >> 
    >> What a lot of clients end up doing is confirming that the
    >> referred-to realm is in something like an AD forest.  It would be
    >> valuable to mention that as an option for the local policy.  It's
    >> actually not a bad choice in a lot of environments, although
    >> obviously if the trust within a forest varies widely (something
    >> that Kerberos supports but AD doesn't support as much) then you
    >> might need to be more clever.

    Nico> Actually, AD does support varying levels of trust within
    Nico> forests.  An AD client could search the AD configuration
    Nico> partition to decide whether some realm is trusted or not, but
    Nico> this is hard work.

Sorry, clients accept the referral if they can get their own host ticket
and verify it.
That's easy for a client to do and approximates what I said above
assuming their exists a trust from the user's realm to the host's realm.

My comment about AD not having as flexible a trust model as everything
supported by Kerberos involves more comments about GCs etc than that AD
doesn't do a good job for real-world situations of supporting multiple
trust levels.
    >> The intent of that paragraph if is that if you're going outside
    >> of an AD-style trust model you may need to prompt.

    Nico> Then it seems like we need an RFC2119 SHOULD.

We're debating whether the SHOULD can be implemented.

As stated, you should check policy.  I personally think you eventually
get to a point where you have to check by asking the user, but I
certainly don't want to SHOULD that specific way of checking.  If you
find something environment-specific that works better, that's great.
_______________________________________________
ietf-krb-wg mailing list
ietf-krb-wg@lists.anl.gov
https://lists.anl.gov/mailman/listinfo/ietf-krb-wg