RE: [TLS] the use cases for GSS-based TLS and the plea for integrating Kerberos with TLS: draft-santesson-tls-gssapi
Larry Zhu <lzhu@windows.microsoft.com> Wed, 18 July 2007 16:42 UTC
Return-path: <tls-bounces@lists.ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1IBCbH-0003v9-BM; Wed, 18 Jul 2007 12:42:07 -0400
Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IBCbF-0003lK-Pu for tls@ietf.org; Wed, 18 Jul 2007 12:42:05 -0400
Received: from smtp.microsoft.com ([131.107.115.215]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1IBCbD-0007V2-Sf for tls@ietf.org; Wed, 18 Jul 2007 12:42:05 -0400
Received: from tk5-exhub-c103.redmond.corp.microsoft.com (157.54.70.186) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.0.700.0; Wed, 18 Jul 2007 09:42:03 -0700
Received: from win-imc-02.wingroup.windeploy.ntdev.microsoft.com (157.54.69.169) by tk5-exhub-c103.redmond.corp.microsoft.com (157.54.70.186) with Microsoft SMTP Server id 8.0.726.0; Wed, 18 Jul 2007 09:42:02 -0700
Received: from WIN-MSG-20.wingroup.windeploy.ntdev.microsoft.com ([157.54.62.25]) by win-imc-02.wingroup.windeploy.ntdev.microsoft.com with Microsoft SMTPSVC(6.0.3790.3959); Wed, 18 Jul 2007 09:42:02 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-Class: urn:content-classes:message
MIME-Version: 1.0
Subject: RE: [TLS] the use cases for GSS-based TLS and the plea for integrating Kerberos with TLS: draft-santesson-tls-gssapi
Date: Wed, 18 Jul 2007 09:41:49 -0700
Message-ID: <CAAAEFE273EAD341A4B02AAA9CA6F73306B357BB@WIN-MSG-20.wingroup.windeploy.ntdev.microsoft.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [TLS] the use cases for GSS-based TLS and the plea for integrating Kerberos with TLS: draft-santesson-tls-gssapi
Thread-Index: AcfJV1cgvZEhnOLfQgeKwyn+58k1JgAAixun
References: <CAAAEFE273EAD341A4B02AAA9CA6F73306BB955A@WIN-MSG-20.wingroup.windeploy.ntdev.microsoft.com> <361B6F7E-C99C-469B-9234-A0C4F4D2CD55@it.su.se>
From: Larry Zhu <lzhu@windows.microsoft.com>
To: Love Hörnquist Åstrand <lha@it.su.se>
X-OriginalArrivalTime: 18 Jul 2007 16:42:02.0446 (UTC) FILETIME=[913FB6E0:01C7C95A]
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 83e9494d829b08cc3f644ef6ac1b9bd4
Cc: tls@ietf.org
X-BeenThere: tls@lists.ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.lists.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@lists.ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/tls>
List-Post: <mailto:tls@lists.ietf.org>
List-Help: <mailto:tls-request@lists.ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@lists.ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0726811478=="
Errors-To: tls-bounces@lists.ietf.org
Love Hörnquist Åstrand wrote: > - I would prefer having both the ability to run gssapi in clear and > inside a DH protected tls connection. In fact you have this ability in draft -02/-03. the protocol defined in this draft is generic and extensible, such that you can build the DH protection logic into the GSS-mechanism to encrypt GSS-API data for the real mechanism such as digest. even better, you do not need to do that for every real GSS-API mechanism, instead, you can define a stackable protection GSS-mechanism like SPNEGO, and use that to protect for the real GSS-API mechanisms. do you agree? --larry ________________________________ From: Love Hörnquist Åstrand [mailto:lha@it.su.se] Sent: Wed 7/18/2007 9:18 AM To: Larry Zhu Cc: tls@ietf.org Subject: Re: [TLS] the use cases for GSS-based TLS and the plea for integrating Kerberos with TLS: draft-santesson-tls-gssapi Comment on the draft draft-santesson-tls-gssapi-03.txt - An important goal to meet is enabling use of authentication infrastructure of the GSS mech for server and client authenticiation. When using gss server authentication, thers shold be no need to have a certificate on the server. - Feedback of key-data from the GSS-MECH back into the tls statemachine. GSS-API is more then a glorified OTP/password system, it provides key material that should be used, this solves problems like replay attacks w/o the need for a replay cache, etc. - I would prefer having both the ability to run gssapi in clear and inside a DH protected tls connection. But it should run inside TLS and not the application layer. I.e., not http negotiate yet again. Saying that all gss mechs are cryptographicly weak is wrong, saying they are strong are also wrong. Should provide both, or just define cryptographicly weak gss-mechs as out of scope for this solution. Defining a solution that only uses the weak mech's functionally seems, well, weird and quite unfriendly. - If its required to have DN for authorisation, well have the gss-mech define that then. I really don't like how everytime naming get up, its assumed that TLS naming today accully works, how many apps actually does correct authorisation with tls certificate based naming today, and why should they work with gss-style names ? This proposed solutions fixes 1, 2, 3, and 4. But thats becase I think weak gss mechs should be thrown out the window. Saying SPKM doesn't support gss-psudeo random is just silly, SPKM doesn't support anything, its not implementable and I want better security then des/rc2. Love 17 jul 2007 kl. 05.27 skrev Larry Zhu: > As we know -02 was published and it integrates Kerberos-alike GSS > mechanisms with TLS by importing the GSS key as PSK. It does so to > minimize the impact to the TLS state machine. > > > http://www.ietf.org/internet-drafts/draft-santesson-tls-gssapi-02.txt > > > EKR requested us to nail down the use cases for this protocol and > explain the rational for the integration. > > In response, the ID revision -03 contains the use cases and why we > want > to integrate Kerberos with TLS, particularly in the introduction > section. > > http://www.secure-endpoints.com/tls-gss/draft-santesson-tls- > gssapi-03.tx > t > > The flowing document based on email posted by Larry Zhu describes > additional background information for the protocol design. > > http://www.secure-endpoints.com/tls-gss/fka-tls.txt > > thanks, > > --larry > > > > _______________________________________________ > TLS mailing list > TLS@lists.ietf.org > https://www1.ietf.org/mailman/listinfo/tls
_______________________________________________ TLS mailing list TLS@lists.ietf.org https://www1.ietf.org/mailman/listinfo/tls
- [TLS] the use cases for GSS-based TLS and the ple… Larry Zhu
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- RE: [TLS] the use cases for GSS-based TLS and the… Larry Zhu
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- RE: [TLS] the use cases for GSS-based TLS and the… Larry Zhu
- Re: [TLS] the use cases for GSS-based TLS and the… Love Hörnquist Åstrand
- RE: [TLS] the use cases for GSS-based TLS and the… Larry Zhu
- Re: [TLS] the use cases for GSS-based TLS and the… Love Hörnquist Åstrand
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- RE: [TLS] the use cases for GSS-based TLS and the… Larry Zhu
- Re: [TLS] the use cases for GSS-based TLS and the… Love Hörnquist Åstrand
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- Re: [TLS] the use cases for GSS-based TLS and the… Nicolas Williams
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- Re: [TLS] the use cases for GSS-based TLS and the… Nicolas Williams
- Re: [TLS] the use cases for GSS-based TLS and the… Jeffrey Altman
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- Re: [TLS] the use cases for GSS-based TLS and the… Nicolas Williams
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- Re: [TLS] the use cases for GSS-based TLS and the… Jeffrey Altman
- RE: [TLS] the use cases for GSS-based TLS and the… Kemp, David P.
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- Re: [TLS] the use cases for GSS-based TLS and the… Leif Johansson
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- Re: [TLS] the use cases for GSS-based TLS and the… Nicolas Williams
- Re: [TLS] the use cases for GSS-based TLS and the… Leif Johansson
- Re: [TLS] the use cases for GSS-based TLS and the… Chris Newman
- RE: [TLS] the use cases for GSS-based TLS and the… Larry Zhu
- [TLS] Re: the use cases for GSS-based TLS and the… Simon Josefsson
- RE: [TLS] the use cases for GSS-based TLS and the… Chris Newman
- Re: [TLS] Re: the use cases for GSS-based TLS and… Leif Johansson
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- RE: [TLS] the use cases for GSS-based TLS and the… Larry Zhu
- [TLS] Re: the use cases for GSS-based TLS and the… Martin Rex
- RE: [TLS] the use cases for GSS-based TLS and the… Chris Newman
- Re: [TLS] the use cases for GSS-based TLS and the… Leif Johansson
- RE: [TLS] the use cases for GSS-based TLS and the… Kemp, David P.
- Re: [TLS] the use cases for GSS-based TLS and the… Jeffrey Altman
- Re: [TLS] the use cases for GSS-based TLS and the… Leif Johansson
- Re: [TLS] the use cases for GSS-based TLS and the… Yoav Nir
- Re: [TLS] the use cases for GSS-based TLS and the… Chris Newman
- Re: [TLS] the use cases for GSS-based TLS and the… Chris Newman
- RE: [TLS] the use cases for GSS-based TLS and the… pgut001
- Re: [TLS] the use cases for GSS-based TLS and the… Jeffrey Altman
- Re: [TLS] the use cases for GSS-based TLS and the… pgut001
- Re: [TLS] the use cases for GSS-based TLS and the… Kyle Hamilton
- Re: [TLS] the use cases for GSS-based TLS and the… pgut001
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- Re: [TLS] the use cases for GSS-based TLS and the… pgut001
- Re: [TLS] the use cases for GSS-based TLS and the… pgut001
- Re: [TLS] the use cases for GSS-based TLS and the… Martin Rex
- RE: [TLS] the use cases for GSS-based TLS and the… Kemp, David P.
- RE: [TLS] the use cases for GSS-based TLS and the… Chris Newman