[SPKM] Re: Comments on draft-zhu-pku2u-01.txt

Olga Kornievskaia <aglo@citi.umich.edu> Fri, 16 March 2007 20:55 UTC

Return-path: <spkm-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1HSJSa-0001Qz-Q7; Fri, 16 Mar 2007 16:55:36 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1HSJSZ-0001Qb-Fs for spkm@ietf.org; Fri, 16 Mar 2007 16:55:35 -0400
Received: from citi.umich.edu ([141.211.133.111]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1HSJPk-0004pi-Vj for spkm@ietf.org; Fri, 16 Mar 2007 16:52:42 -0400
Received: from [141.211.133.26] (yoga.citi.umich.edu [141.211.133.26]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "aglo", Issuer "CITI Production KCA" (verified OK)) by citi.umich.edu (Postfix) with ESMTP id 7B38439278; Fri, 16 Mar 2007 16:52:40 -0400 (EDT)
Message-ID: <45FB0398.3080406@citi.umich.edu>
Date: Fri, 16 Mar 2007 16:52:40 -0400
From: Olga Kornievskaia <aglo@citi.umich.edu>
User-Agent: Thunderbird 1.5.0.10 (X11/20070301)
MIME-Version: 1.0
To: "Liqiang(Larry) Zhu" <lzhu@windows.microsoft.com>
References: <CAAAEFE273EAD341A4B02AAA9CA6F73304D44CE4@WIN-MSG-20.wingroup.windeploy.ntdev.microsoft.com>
In-Reply-To: <CAAAEFE273EAD341A4B02AAA9CA6F73304D44CE4@WIN-MSG-20.wingroup.windeploy.ntdev.microsoft.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Spam-Score: 0.0 (/)
X-Scan-Signature: f49c97ce49302a02285a2d36a99eef8c
Cc: Michael.Eisler@netapp.com, andros@citi.umich.edu, kitten@lists.ietf.org, spkm@ietf.org
Subject: [SPKM] Re: Comments on draft-zhu-pku2u-01.txt
X-BeenThere: spkm@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Low Infrastructure Public Key GSS mechanism <spkm.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/spkm>, <mailto:spkm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/spkm>
List-Post: <mailto:spkm@ietf.org>
List-Help: <mailto:spkm-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/spkm>, <mailto:spkm-request@ietf.org?subject=subscribe>
Errors-To: spkm-bounces@ietf.org

Section 3

   If initially the initiator has a service ticket to the acceptor, the
   initiator, acting as the client in the parlance of [RFC4120],
   performs the client-server authentication exchange according to
   [RFC4121] and Section 3.2 of [RFC4120], with the acceptor acting as
   the server.

Why state this? In the motivation section, it has been stated that: 
"there is no trusted third party in such environments." While it is 
stated that "consequently the Kerberos protocol as defined in [RFC4120] 
and [RFC4556] is inadequate to provide security services ", this 
document's writing heavily depends on it and PKU2U is basically rfc4556 
where the server is not a KDC.

   If all goes well, processing the KRB_AS_REQ message will result in
   the creation of a ticket for the initiator to present to the acceptor
   and the response is a KRB_AS_REP message generated according to
   Section 3.1.3 of [RFC4120].

Isn't there a missing reference to the Section 3.2.3 of RFC4556. Unlike 
KDC and principal, acceptor and initiator don't share any secrets. 
PKINIT's PA_PK_AS_REP is needed here for the initiator to make use of 
the ticket created by the acceptor.

   In all cases, GSS_Accept_security_context() returns
   GSS_S_CONTINUE_NEEDED status [RFC2743] and the output token is a
   KRB_AS_REP message if a ticket was created or a KRB_ERROR message if
   there was an error while processing the request or the local policy
   prevented a ticket from being issued.

If the acceptor returns GSS_S_CONTINUE_NEEDED in the case of an error, 
what happens when the initiator after processing the error token decides 
to stop, will the server just hang there in the continue needed state?

Is having a MUST for PKINIT's EKUs too restrictive?

Since this is a GSS API mechanism what about QoP handling and channel 
bindings?

Token ids are defined for KRB_AS_REQ and KRB_AS_REP but not for KRB_ERROR?

This draft does not support non-Kerberos environments. By that I mean, a 
Kerberos domain must exist and users of PKU2U must have Kerberos 
principal names.

Name type NT-X500-PRINCIPAL which is rfc2253 string representation of 
the distinguished name does not produce a canonical name.

What happens when the initiator rejects the AS-REP tokens sent by the 
acceptor (ie., fails to verify acceptor's certificate)?  Does it 
generate an error token?

Perhaps last paragraph of Section 6 can have a more detailed explanation 
that doesn't require the user to go search for a different draft to find 
our that AP_REQ should carry TYPED_DATA of type TD_IAKERB_FINISHED.  I'm 
sure i'm missing something but why is there a need to tie AS_REQ/REP to 
AP_REQ/REP no such ties exist in original Kerberos message flow?

Naming needs work. Comments made about naming in SPKM3 apply here.

Liqiang(Larry) Zhu wrote:
> Here is the updated PKU2U. Please review it and see if it has addressed
> all concerns.
>
> Thanks,
>
> --Larry
>
> -----Original Message-----
> From: Internet-Drafts@ietf.org [mailto:Internet-Drafts@ietf.org] 
> Sent: Tuesday, February 27, 2007 3:50 PM
> To: i-d-announce@ietf.org
> Subject: I-D ACTION:draft-zhu-pku2u-01.txt 
>
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
>
>
> 	Title		: Public Key Cryptography Based User-to-User
> Authentication - (PKU2U)
> 	Author(s)	: L. Zhu, et al.
> 	Filename	: draft-zhu-pku2u-01.txt
> 	Pages		: 10
> 	Date		: 2007-2-27
> 	
> This document defines the public key cryptography based user-to-user
>    authentication protocol - PKU2U. This mechanism provides security
>    services in peer to peer networking environments without requiring a
>    trusted third party.  Furthermore, the binding of PKU2U for the
>    Generic Security Service Application Program Interface (GSS-API) per
>    RFC2743 is defined based on RFC4121.
>
> A URL for this Internet-Draft is:
> http://www.ietf.org/internet-drafts/draft-zhu-pku2u-01.txt
>
> To remove yourself from the I-D Announcement list, send a message to 
> i-d-announce-request@ietf.org with the word unsubscribe in the body of 
> the message. 
> You can also visit https://www1.ietf.org/mailman/listinfo/I-D-announce 
> to change your subscription settings.
>
> Internet-Drafts are also available by anonymous FTP. Login with the 
> username "anonymous" and a password of your e-mail address. After 
> logging in, type "cd internet-drafts" and then 
> "get draft-zhu-pku2u-01.txt".
>
> A list of Internet-Drafts directories can be found in
> http://www.ietf.org/shadow.html 
> or ftp://ftp.ietf.org/ietf/1shadow-sites.txt
>
> Internet-Drafts can also be obtained by e-mail.
>
> Send a message to:
> 	mailserv@ietf.org.
> In the body type:
> 	"FILE /internet-drafts/draft-zhu-pku2u-01.txt".
> 	
> NOTE:	The mail server at ietf.org can return the document in
> 	MIME-encoded form by using the "mpack" utility.  To use this
> 	feature, insert the command "ENCODING mime" before the "FILE"
> 	command.  To decode the response(s), you will need "munpack" or
> 	a MIME-compliant mail reader.  Different MIME-compliant mail
> readers
> 	exhibit different behavior, especially when dealing with
> 	"multipart" MIME messages (i.e. documents which have been split
> 	up into multiple messages), so check your local documentation on
> 	how to manipulate these messages.
>
> Below is the data which will enable a MIME compliant mail reader
> implementation to automatically retrieve the ASCII version of the
> Internet-Draft.
>   
> ------------------------------------------------------------------------
>
> _______________________________________________
> I-D-Announce mailing list
> I-D-Announce@ietf.org
> https://www1.ietf.org/mailman/listinfo/i-d-announce
>   

_______________________________________________
SPKM mailing list
SPKM@ietf.org
https://www1.ietf.org/mailman/listinfo/spkm