Extensibility in the Kerberos Protocol Sam Hartman Mekinok, Inc. - - PowerPoint PPT Presentation

extensibility in the kerberos protocol
SMART_READER_LITE
LIVE PREVIEW

Extensibility in the Kerberos Protocol Sam Hartman Mekinok, Inc. - - PowerPoint PPT Presentation

Extensibility in the Kerberos Protocol Sam Hartman Mekinok, Inc. IETF 52 Table of Contents Slide Title Slide# I. Why Extensibility? 4 Arguments for Extensibility 5 Protocol Requirements from Vendors 6 IETF Concerns About Vendor


slide-1
SLIDE 1

Extensibility in the Kerberos Protocol

Sam Hartman Mekinok, Inc. IETF 52

slide-2
SLIDE 2

Slide Title Slide#

  • I. Why Extensibility?

4 Arguments for Extensibility 5 Protocol Requirements from Vendors 6 IETF Concerns About Vendor Extensibility 7 Evolution of the Protocol within the IETF 8 Mechanisms to Support Protocol Evolution 9

  • II. Kerberos Extensibility Track Record

10 Extensibility Proposals Presented at IETF 11 Where these Extensions Stand Today 12 Common Problems with Extensions 13 Why Avoid Negotiation 14

  • III. A General Solution

15 Why can we do better with a general solution? 16 Goals of Our General Solution 17 ASN.1 Extensibility Allows IETf Protocol Evolution 18 Meeting Vendor Needs with Typed Holes 19 Protecting Cleartext with Signed Type 20 The Golden Rule 21 Determining Capabilities of a Recipient 22

Table of Contents

slide-3
SLIDE 3

Table of Contents

slide-4
SLIDE 4
  • I. Why Extensibility?
slide-5
SLIDE 5
  • Vendors need extensibility to get technologies to market.
  • The IETF needs extensibility to change the protocol while

maintaining backward-compatibility.

Arguments for Extensibility

Sam Hartman - Extensibility in the Kerberos Protocol Slide 5

slide-6
SLIDE 6
  • Vendors choose standards based on what is available when

they start a project.

  • Market forces may make a new technology critical at any

time.

  • Waiting for standard changes is not an option.

Protocol Requirements from Vendors

Sam Hartman - Extensibility in the Kerberos Protocol Slide 6

slide-7
SLIDE 7

We want vendors to be able to use our standards, but in such a way that interoperability between vendors is maintained.

IETF Concerns About Vendor Extensibility

Sam Hartman - Extensibility in the Kerberos Protocol Slide 7

slide-8
SLIDE 8

Developing a new, incompatible protocol to make changes has high cost. Thus, the IETF needs to be able to extend the protocol in future.

Evolution of the Protocol within the IETF

Sam Hartman - Extensibility in the Kerberos Protocol Slide 8

slide-9
SLIDE 9
  • Mechanism for making phased upgrades to core protocol

messages

  • Extensibility model that minimizes likelihood of changes

today precluding other important changes in the future

Mechanisms to Support Protocol Evolution

Sam Hartman - Extensibility in the Kerberos Protocol Slide 9

slide-10
SLIDE 10
  • II. Kerberos Extensibility

Track Record

slide-11
SLIDE 11
  • Kerberos error checksums (IETF 38)
  • Ticket extensions (IETF 39)
  • Authorization Data clarifications (IETF 39)
  • Make some fields optional
  • Checksum of AS-REP
  • Crypto system selection

Extensibility Proposals Presented at IETF

Sam Hartman - Extensibility in the Kerberos Protocol Slide 11

slide-12
SLIDE 12

With the exception of crypto system selection, none of these extensions work in an interoperable manner. Many have been removed from the draft pending a better solution; others would present significant problems if implemented.

Where these Extensions Stand Today

Sam Hartman - Extensibility in the Kerberos Protocol Slide 12

slide-13
SLIDE 13
  • Many proposed extensions assume fields can be added to

ASN.1 sequences. Unfortunately, doing so breaks backward compatibility.

  • Significant effort was spent trying to avoid adding

capability negotiation to Kerberos. As such, clients cannot tell whether extensions they want to use are supported.

  • Extensions were considered one-at-a-time;

we didn't take advantage of common elements.

Common Problems with Extensions

Sam Hartman - Extensibility in the Kerberos Protocol Slide 13

slide-14
SLIDE 14
  • Negotiation adds complexity.
  • Negotiation often adds round trips
  • Negotiation is harder in Kerberos than other protocols

because Kerberos involves three parties. The KDC must know the capabilities of the service.

Why Avoid Negotiation

Sam Hartman - Extensibility in the Kerberos Protocol Slide 14

slide-15
SLIDE 15
  • III. A General Solution
slide-16
SLIDE 16
  • Storing one bit of state on the KDC to facilitate general

negotiation is reasonable, even if storing a bit for each

  • ption is not.
  • We can spend more time reviewing the ASN.1 for a

general solution than for any specific option.

  • We can abstract out common elements of proposed
  • extensions. For example, we can solve all instances of

authenticated cleartext rather than specific cases.

Why can we do better with a general solution?

Sam Hartman - Extensibility in the Kerberos Protocol Slide 16

slide-17
SLIDE 17
  • Provide the IETF with a mechanism for future protocol

evolution.

  • Provide vendors with hooks to extend the protocol in

interoperable ways.

  • Provide a means to authenticate cleartext carried in

Kerberos messages.

Goals of Our General Solution

Sam Hartman - Extensibility in the Kerberos Protocol Slide 17

slide-18
SLIDE 18

We add ASN.1 extension markers to most Kerberos messages.

  • New fields can be added to the end of messages
  • Not useful for vendor extensions because we must

coordinate tag assignment; only the IETF can take advantage of the ASN.1 extensibility markers.

ASN.1 Extensibility Allows IETf Protocol

Sam Hartman - Extensibility in the Kerberos Protocol Slide 18

slide-19
SLIDE 19
  • Typed holes (sub-messages that contain an octet-string

along with an integer that defines how to interpret the

  • ctet-string) were added to messages that did not already

have them.

  • Vendors and the IETF can use these holes to add new

extensions.

Meeting Vendor Needs with Typed Holes

Sam Hartman - Extensibility in the Kerberos Protocol Slide 19

slide-20
SLIDE 20
  • Messages containing cleartext fields have been wrapped in

types containing keyed checksums.

  • Guidelines clearly specify when checksums should be sent

and what key is used.

  • A checksum is added to the AS-REP in order to

authenticate the AS-REQ.

Protecting Cleartext with Signed Type

Sam Hartman - Extensibility in the Kerberos Protocol Slide 20

slide-21
SLIDE 21

Be liberal in what you accept and conservative in what you

  • send. New Messages should only be sent when they will be

understood by the recipient. Recipients should ignore extensions they do not understand, preserving them if the message is reencoded.

The Golden Rule

Sam Hartman - Extensibility in the Kerberos Protocol Slide 21

slide-22
SLIDE 22
  • If you have received a new-format message then you can

send new-format messages.

  • The ticket type tells the client about server capabilities.
  • For bootstrapping, a new AS-REQ can be included in an
  • ld AS-REQ.

Determining Capabilities of a Recipient

Sam Hartman - Extensibility in the Kerberos Protocol Slide 22