|
|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T c
Length: 10725 (0x29e5)
Types: TextFile
Names: »cat-minutes-91jul.txt«
└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen
└─⟦this⟧ »./papers/IETF-drafts/cat-minutes-91jul.txt«
CURRENT_MEETING_REPORT_
Reported by John Linn/DEC
CAT Minutes
The Common Authentication Technology Working Group met for two sessions
in Atlanta, and held discussions building on the three Internet Drafts
issued on behalf of the group in advance of the meeting. John Linn led
a discussion on CAT and GSS-API concepts, and Jeff Schiller and Charlie
Kaufman gave presentations on implementations of CAT atop (respectively)
Kerberos V5 and SPX mechanisms; slides from these presentations will be
submitted along with these minutes for inclusion in the IETF
Proceedings. Representatives from some protocol Working Groups were
available to comment on issues related to integration and use of CAT
within their protocols.
CAT concepts were generally well received. Some areas of potential
refinement and discussion were raised, and discussions are expected to
continue on the CAT mailing list. One key area of technical discussion
was the interrelationship among CAT, underlying mechanisms, and
alternative naming architectures; a related area was alternative types
of authenticated principals (users, hosts, processes) and means for
their distinction. It was noted that the fact of implementation of a
particular mechanism in support of CAT should not be taken as IETF
endorsement of the strength of that mechanism. It was also noted that
multiple mechanisms may in principle be incorporated beneath a single
GSS-layer implementation, though no such implementations have yet been
developed.
Identification of Shared Mechanism
One major discussion topic was the question of how to identify a CAT
mechanism which is shared with a peer CAT system. Options include
combinations of negotiation, directory entries, configuration data, and
user/caller input; it was agreed that CAT should seek to make suitable
determinations internally where possible so as to ease burdens on its
callers and to avoid replicating common security-oriented features
separately within a variety of caller protocols. This implies, for
example, that CAT callers' requests for the ``default'' mechanism type
could result in exchange of tokens in order to resolve a common
mechanism; the feasibility of such a scheme warrants investigation.
Whenever negotiation is used to establish a mechanism, it should be
carried out against an acceptable set defined by configuration data
and/or caller input, to prevent blind acceptance of authentication
schemes weaker than those intended by a CAT peer.
Naming Issues
As the Internet evolves to a multi-protocol environment, it also evolves
to an environment where multiple naming architectures must coexist.
Prominent examples include DNS names for hosts, mailbox identifiers for
users, and X.500 Distinguished Names. This variation causes problems in
1
\f
many areas of technology (and is engendering discussion in several parts
of the IETF and the TSIG, as well as other groups), and security is
among those bitten.
Since authentication mechanisms typically authenticate principals in
conjunction with name forms native to those mechanisms, mismatches are
likely to emerge when CAT callers oriented to operation in particular
naming environments are served by CAT mechanisms employing different
native forms. It was agreed that CAT would benefit from broader
IETF-defined approaches to handle such mismatches; in the interim,
mechanism designers will have to anticipate, observe, and provide
case-by-case resolutions to specific problems. In the interests of
portability between alternative mechanisms both capable of
authenticating a common name format, it was observed to be preferable
for identification of the mechanism used to authenticate a name to be
carried in a separate parameter rather than being encoded within the
name itself.
Mechanism Discussions
(See also presentation slides.)
Jeff Schiller led a discussion on Kerberos GSS-API implementation. MIT
believes that it is appropriate for all services which run as root on a
given host to use a common set of verifier credentials in /etc/srvtab;
the Athena DISCUSS service has a different identity with credentials in
a different file. Distinction between client and server principals is
made based on examination of names.
Jeff also observed that MIT intends to relinquish control of the
Kerberos V5 specification (distributed to Internet-Drafts before the
meeting) to the CAT Working Group for evolution and standards-track
progression, and cited Ted Tso and Cliff Neuman as additional relevant
contacts. A Kerberos V4 specification will also be submitted as an
informational RFC.
Charlie Kaufman led a discussion on SPX GSS-API implementation,
emphasizing implementors' agreements made in order to enable application
portability (though not the broader issue of interoperability) between
Kerberos and SPX. Internal names were accepted to be opaque (preserving
flexibility for mechanism implementors), although use of a standardized
format at this level could offer value if callers were positioned to use
the same format across other interfaces besides the GSS-API. The target
applications chosen to validate the portability concept were Telnet and
rlogin; since DNS-style textual names are native to these applications,
conflicts with SPX's use and certification of X.500 DNs needed to be
resolved.
Protocol Integration Issues
It was observed that error cases resulting from inability to process a
transferred and received token cannot always be reflected to a CAT peer
before that peer believes that the context establishment sequence is
complete; for CAT callers to be assured that their tokens have been
2
\f
successfully processed on receipt, mutual authentication must be
performed. Error-indicating tokens received after context establishment
is complete can still be processed, by being passed to a different
primitive (process_context_token). It was observed that it might be
preferable to incorporate more messages in mechanisms' context
establishment sequences so that COMPLETE status is never returned before
positive acknowledgment by the peer. No conclusive decision was made on
this issue.
The Telnet Working Group plans to issue the Telnet authentication option
as an experimental RFC; it was anticipated that migration to CAT as an
additional Telnet-visible type (which would likely supplant other
Telnet-visible type indicators over time) would be appropriate.
Terminal servers cannot be assumed to maintain configuration data
corresponding to arbitrary ``walk-up'' users, so raise special issues
with regards to integration with user interfaces and CAT infrastructure.
The Network Printing Working Group is seeking to employ CAT. Discussion
indicated that different types of authentication semantics (users,
hosts, daemon processes) would be most appropriate in different
circumstances; unfortunately, prioritized needs for the different
alternatives were not available.
Possible CAT applications arise in the Network News Transport Protocol
(NNTP). Primary requirement areas raised at the CAT meeting include
host-granularity authentication for sessions between NNTP peers and
user-granularity authentication for individuals associated with NNTP
newsreaders. Ted Tso is engaging in additional discussion with the NNTP
group regarding potential CAT usage.
The LIST group may wish to employ CAT-based authentication for those
cases where list maintenance commands are transferred across on-line
connections rather than within messages.
Possible Extension Areas
Various candidate CAT extension areas were discussed, and are likely to
be discussed further on the CAT mailing list.
Means for provision of long-term signature capabilities were considered
only briefly, in part because of unclear requirements for
non-repudiation services outside the messaging paradigm. The following
observations were noted:
1. Since such signatures are intended to be validatable over an
extended period and by other than the single peer associated with a
context, such extensions are not well suited to modeling via the
Quality-of-Protection (QOP) parameters to existing GSS-API
per-message protection primitives,
2. That alternative primitives might utilize common credentials, and
3
\f
3. That long-term signature capabilities would not likely be portable
to other than public-key mechanisms.
Interest was expressed in making the set of intermediary entities which
had been involved in a CAT authentication visible to a caller,
presumably by providing means to extract such a name list from a
context's data structures. It was unclear whether callers would be
likely to make use of such a list in a mechanism-independent manner.
We also discussed the idea of an overlay veneer
(``init_sec_context_stream()'') to provide CAT with a communications
path over which to pass tokens rather than returning the tokens for
caller manipulation and transfer, an extension facility which could
simplify integration of CAT-based authentication into certain caller
protocols. Such an overlay would be analogous to Kerberos's send_auth
interface; follow-up mailing list discussion is anticipated.
David Bolen
David Borman dab@cray.com
Stephen Crocker crocker@tis.com
Peter Deutsch
James Ellis jte@cert.sei.cmu.edu
Arlan Finestead arlanf@ncsa.uiuc.edu
James Galvin galvin@tis.com
Joe Godsil jgodsil@ncsa.uiuc.edu
Russ Hobby rdhobby@ucdavis.edu
Alton Hoover
Ken Jones konkord!ksj@uunet.uu.net
Charles Kaufman kaufman@dsmail.enet.dec.com
Peter Kirstein kirstein@cs.ucl.ac.uk
Dale Land land@lanl.gov
Eliot Lear lear@turbo.bio.net
John Linn linn@zendia.enet.dec.com
Louis Mamakos louie@ni.umd.edu
Ellen McDermott emcd@osf.org
Glenn McGregor ghm@merit.edu
Clifford Neuman bcn@isi.edu
Oscar Newkerk newkerk@decwet.enet.dec.com
Richard Parker rp@mbunix.mitre.org
Geir Pedersen geir.pedersen@use.uio.no
Mel Pleasant pleasant@hardees.rutgers.edu
P. Rajaram rajaram@sun.com
Michael Reilly reilly@nsl.dec.com
Jan Michael Rynning jmr@nada.kth.se
Jeffrey Schiller jis@mit.edu
Robert Shirey shirey@mitre.org
Mark Sleeper mws@sparta.com
Mark Stein marks@eng.sun.com
Brad Strand bstrand@cray.com
Glenn Trewitt trewitt@nsl.dec.com
Theodore Tso
Preston Wilson preston@i88.isc.com
4
\f
5