[secdir] [new-work] WG Review: Common Authentication Technology Next Generation (kitten)

IESG Secretary <iesg-secretary@ietf.org> Tue, 12 February 2013 21:52 UTC

Return-Path: <new-work-bounces@ietf.org>
X-Original-To: secdir@ietf.org
Delivered-To: secdir@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost []) by ietfa.amsl.com (Postfix) with ESMTP id 5EEA021F8B81; Tue, 12 Feb 2013 13:52:02 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1; t=1360705923; bh=G6qLpssegWeHAXW2BShhqWsYH6+qDVfQq5Fs11HF0Uc=; h=MIME-Version:From:To:Message-ID:Date:Subject:List-Id: List-Unsubscribe:List-Archive:List-Post:List-Help:List-Subscribe: Content-Type:Content-Transfer-Encoding:Sender; b=MSQHTIb91W8bn4Wre4vkqqjzC5K0m+gVbm9oQa/Jv/D+zymZ6P9QOEvOpiZ48FQLR GtbvF3TN7Dt+XY+hKFuDps8yV8KM7UCSYmNMt2Xc9GXOZbRDMMjC7EWggdtTzMHlwu YBphwULe6R1lPtcYpgZ++CakqPfMZdff2pEWa5mI=
X-Original-To: new-work@ietfa.amsl.com
Delivered-To: new-work@ietfa.amsl.com
Received: from localhost (localhost []) by ietfa.amsl.com (Postfix) with ESMTP id AB3CD21F8B85; Tue, 12 Feb 2013 13:51:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.532
X-Spam-Status: No, score=-102.532 tagged_above=-999 required=5 tests=[AWL=0.067, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([]) by localhost (ietfa.amsl.com []) (amavisd-new, port 10024) with ESMTP id ExCY1QEAd-nX; Tue, 12 Feb 2013 13:51:55 -0800 (PST)
Received: from ietfa.amsl.com (localhost []) by ietfa.amsl.com (Postfix) with ESMTP id C6BA321F8B73; Tue, 12 Feb 2013 13:51:53 -0800 (PST)
MIME-Version: 1.0
From: IESG Secretary <iesg-secretary@ietf.org>
To: new-work@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 4.37
Message-ID: <20130212215153.14058.73204.idtracker@ietfa.amsl.com>
Date: Tue, 12 Feb 2013 13:51:53 -0800
X-BeenThere: new-work@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: new-work-bounces@ietf.org
Errors-To: new-work-bounces@ietf.org
X-Mailman-Approved-At: Tue, 12 Feb 2013 14:12:39 -0800
Subject: [secdir] [new-work] WG Review: Common Authentication Technology Next Generation (kitten)
X-BeenThere: secdir@ietf.org
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 21:52:08 -0000

The Common Authentication Technology Next Generation (kitten) working
group in the Security Area of the IETF is undergoing rechartering. The
IESG has not made any determination yet. The following draft charter was
submitted, and is provided for informational purposes only. Please send
your comments to the IESG mailing list (iesg at ietf.org) by 2013-02-19.

Common Authentication Technology Next Generation (kitten)
Current Status: Active Working Group

  Shawn Emery <shawn.emery@oracle.com>
  Josh Howlett <josh.howlett@ja.net>
  Sam Hartman <hartmans-ietf@mit.edu>

  Simon Josefsson <simon@josefsson.org>

Assigned Area Director:
  Stephen Farrell <stephen.farrell@cs.tcd.ie>

Mailing list
  Address: kitten@ietf.org
  To Subscribe: https://www.ietf.org/mailman/listinfo/kitten
  Archive: http://www.ietf.org/mail-archive/web/kitten/

Charter of Working Group:

Description of Working Group:

The purpose of the Common Authentication Technology Next Generation
(Kitten) working group (WG) is to develop extensions/improvements to the
GSS-API and to the Kerberos authentication system, shepherd specific
GSS-API security mechanisms, and provide guidance for any new
SASL-related submissions.

This charter combines the work of the Kerberos WG and the kitten WG
(under the aegis of the kitten WG).  In places, it identifies which WG 
was previously home for that work.

The working group will develop extensions and/or updates to the GSS-API,
working on specific items regarding credential management, replay cache
avoidance, error reporting, and supporting stateless and/or distributed

The working group will also maintain and improve upon the Kerberos
protocol, working on items regarding internationalization, new initial
authentication types, authorization framework/data, replay cache
avoidance, cryptography advances, interop with 3rd party authentication,
and identity management.

In detail, both existing and new work items include:

Existing Working Group Items
SASL Mechanism for OAuth (draft-ietf-kitten-sasl-oauth)
SASL Mechansim for SAML-EC (draft-ietf-kitten-sasl-saml-ec)
GSS-API IANA Registry (draft-ietf-kitten-gssapi-extensions-iana)
KDC Model (draft-ietf-krb-wg-kdc-model)
PKINIT Hash Agility (draft-ietf-krb-wg-pkinit-alg-agility)
Kerberos IANA Registry (draft-ietf-kitten-kerberos-iana-registries)
Initial and Pass Through Authentication in Kerberos 5
Unencrypted Portion of Ticket Extensions

GSS-API Related
Provide new interfaces for credential management, which include the
       initializing credentials
       iterating credentials
       exporting/importing credentials

Negotiable replay cache avoidance

Define interfaces for better error message reporting.

Specify an option for exporting partially-established security
      contexts and possibly a utility function for exporting security
      contexts in an encrypted form, as well as a corresponding utility
      function to decrypt and import such security context tokens.

Specify one-time password / two-factor authentication needs for SASL
      applications.  This could be achieved through an explicit new
      GSS-API/SASL mechanism (e.g.,
      http://tools.ietf.org/html/draft-josefsson-kitten-crotp-00) or if
      the consensus is that due to usability reasons, it is preferable 
      to do OTP/2FA through an higher level protocol
      (Kerberos/OpenID/SAML/SAML20EC/EAP?) then prepare a 
      document explaining the usability problem and provide pointers 
      for implementers.

Kerberos Related
Prepare and advance one or more standards-track specifications which
      update the Kerberos version 5 protocol to support non-ASCII
      principal and realm names, salt strings, and passwords, and 
      localized error reporting.  Maximizing backward compatibility is 
      strongly desired.

Prepare, review, and advance standards-track and informational
      specifications defining new authorization data types for carrying
      supplemental information about the client to which a Kerberos
      ticket has been issued and/or restrictions on what the ticket can 
      be used for. To enhance this ongoing authorization data work, a 
      container format supporting the use cases of draft-ietf-krb-wg-pad 
      may be standardized.

Prepare a standards-track protocol to solve the use cases addressed
      by draft-hotz-kx509-01 including new support for digital

Today Kerberos requires a replay cache to be used in AP exchanges in
      almost all cases.  Replay caches are quite complex to implement
      correctly, particularly in clustered systems. High-performance
      replay caches are even more difficult to implement.  The WG 
      will pursue extensions to minimize the need for replay caching, 
      optimize replay caching, and/or elide the need for replay caching.

Prepare, review, and advance standards-track and informational
      specifications defining use of new cryptographic algorithms in the
      Kerberos protocol using the RFC3961 framework, on an ongoing basis.
      Cryptographic algorithms intended for standards track status must
      be of good quality, have broad international support, and fill a 
      definite need.

Prepare, review, and advance standards-track and informational
      specifications of new pre-authentication types for the Kerberos
      protocol, on an ongoing basis.

Prepare, review, and advance standards track updates and extensions to
     RFC4121, as needed and on an ongoing basis.

Goals and Milestones

Mar 2013       draft-ietf-kitten-sasl-oauth to IESG
Mar 2013       draft-ietf-krb-wg-pkinit-alg-agility to IESG
Apr 2013       draft-ietf-kitten-sasl-saml-ec to IESG
Apr 2013       draft-ietf-krb-wg-iakerb to IESG
May 2013       draft-ietf-kitten-gssapi-extensions-iana to IESG
May 2013       draft-ietf-krb-wg-cammac to IESG
Jun 2013       draft-ietf-kitten-kerberos-iana-registries to IESG
Jun 2013       draft-ietf-krb-wg-pad to IESG
Jul 2013       Adopt work on one or more items for GSS-API cred
Jul 2013       Adopt work on better error reporting in the GSS-API
Aug 2013       Adopt work on exporting partially-established GSS-API
Aug 2013       draft-ietf-krb-wg-ticket-extensions to IESG
Sep 2013       Adopt work on the GSS-API for replay cache avoidance

  Jul 2011 - Submit SASL OpenID mechanism to the IESG as Proposed
  Jul 2011 - Submit naming-exts to the IESG as Proposed Standard
  Jul 2011 - WGLC on gssapi-extensions-iana
  Aug 2011 - Submit SASL SAML mechanisms to the IESG as Proposed Standard
  Sep 2011 - Submit gssapi-extensions-iana to the IESG as Proposed
new-work mailing list