Re: [TLS] the use cases for GSS-based TLS and the plea for

Martin Rex <Martin.Rex@sap.com> Wed, 18 July 2007 18:46 UTC

Return-path: <tls-bounces@lists.ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1IBEXV-0005Zi-By; Wed, 18 Jul 2007 14:46:21 -0400
Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IBEXR-0005XJ-3t for tls@ietf.org; Wed, 18 Jul 2007 14:46:17 -0400
Received: from smtpde02.sap-ag.de ([155.56.68.170]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1IBEXQ-0002qz-Fx for tls@ietf.org; Wed, 18 Jul 2007 14:46:17 -0400
Received: from sap-ag.de (smtpde02) by smtpde02.sap-ag.de (out) with ESMTP id UAA14183; Wed, 18 Jul 2007 20:46:11 +0200 (MESZ)
From: Martin Rex <Martin.Rex@sap.com>
Message-Id: <200707181846.l6IIkBCp020321@fs4113.wdf.sap.corp>
Subject: Re: [TLS] the use cases for GSS-based TLS and the plea for
To: lzhu@windows.microsoft.com
Date: Wed, 18 Jul 2007 20:46:11 +0200
In-Reply-To: <CAAAEFE273EAD341A4B02AAA9CA6F73306B357BB@WIN-MSG-20.wingroup.windeploy.ntdev.microsoft.com> from "Larry Zhu" at Jul 18, 7 09:41:49 am
MIME-Version: 1.0
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 8bit
X-SAP: out
X-SAP: out
X-SAP: out
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 769a46790fb42fbb0b0cc700c82f7081
Cc: tls@ietf.org
X-BeenThere: tls@lists.ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: martin.rex@sap.com
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.lists.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@lists.ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/tls>
List-Post: <mailto:tls@lists.ietf.org>
List-Help: <mailto:tls-request@lists.ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@lists.ietf.org?subject=subscribe>
Errors-To: tls-bounces@lists.ietf.org

Larry Zhu wrote:
> 
> even better, you do not need to do that for every real GSS-API
> mechanism, instead, you can define a stackable protection
> GSS-mechanism like SPNEGO, and use that to protect for the
> real GSS-API mechanisms.

Ouch.

With a simple mechanism (OID) negotiation logic within a
Hello extension, we could get rid of SPNEGO entirely for gssapi-tls.

This would have many advantages:
 - when the common mechanism OID selection is built into
   a TLS extension, then TLS can simply perform the regular
   SSL handshake when no common mechanism is available.

 - it completely avoids the entire SPNEGO codebase.
   a large part of the installed base of GSS-API mechanism doesn't
   have SPNEGO, and as I've said, we would have compelling use
   cases if the scheme would work with the existing installed
   base (of gssapi mechanisms) and without SPNEGO and minimalistic
   changes to SSL/TLS.

   Changes to the Web-Browsers and Web-Servers are necessary,
   of course, but with such a low-impact change as I have been
   describing throughout my last postings, the necessary small
   changes for Browsers like Firefox and TLS implementations would
   come within a few weeks.  And I would give this a much better
   chance to get implemented into our backends and SSL 

 - and additional multi-mechanism glue layer would be entirely
   unnecessary in this scenario.  A server or browser could
   simply load and use the negotiated GSS-API mechanism directly.


Btw. thinking about the security context establishment of GSS-API:
there is no size limit on the context-level tokens within GSS-API.
Although a single SSL Record of 16K would be sufficient for the
majority of environments (gss-api mechanisms) that I have seen,
extensive use of X.509v3 extensions (attributes,constraints,policies,
URLs,disclaimers,digital-junkyard-of-your-favorite-CA) as well
as PACs or similar bloat in Kerberos certificates might exceed 16K.
so a simple framing protocol for the gssapi context level
tokens might be needed.


-Martin

_______________________________________________
TLS mailing list
TLS@lists.ietf.org
https://www1.ietf.org/mailman/listinfo/tls