Extensibility in the Kerberos Protocol
Sam Hartman Mekinok, Inc. IETF 52
Extensibility in the Kerberos Protocol Sam Hartman Mekinok, Inc. - - PowerPoint PPT Presentation
Extensibility in the Kerberos Protocol Sam Hartman Mekinok, Inc. IETF 52 Table of Contents Slide Title Slide# I. Why Extensibility? 4 Arguments for Extensibility 5 Protocol Requirements from Vendors 6 IETF Concerns About Vendor
Sam Hartman Mekinok, Inc. IETF 52
Slide Title Slide#
4 Arguments for Extensibility 5 Protocol Requirements from Vendors 6 IETF Concerns About Vendor Extensibility 7 Evolution of the Protocol within the IETF 8 Mechanisms to Support Protocol Evolution 9
10 Extensibility Proposals Presented at IETF 11 Where these Extensions Stand Today 12 Common Problems with Extensions 13 Why Avoid Negotiation 14
15 Why can we do better with a general solution? 16 Goals of Our General Solution 17 ASN.1 Extensibility Allows IETf Protocol Evolution 18 Meeting Vendor Needs with Typed Holes 19 Protecting Cleartext with Signed Type 20 The Golden Rule 21 Determining Capabilities of a Recipient 22
Table of Contents
Table of Contents
maintaining backward-compatibility.
Arguments for Extensibility
Sam Hartman - Extensibility in the Kerberos Protocol Slide 5
they start a project.
time.
Protocol Requirements from Vendors
Sam Hartman - Extensibility in the Kerberos Protocol Slide 6
We want vendors to be able to use our standards, but in such a way that interoperability between vendors is maintained.
IETF Concerns About Vendor Extensibility
Sam Hartman - Extensibility in the Kerberos Protocol Slide 7
Developing a new, incompatible protocol to make changes has high cost. Thus, the IETF needs to be able to extend the protocol in future.
Evolution of the Protocol within the IETF
Sam Hartman - Extensibility in the Kerberos Protocol Slide 8
messages
today precluding other important changes in the future
Mechanisms to Support Protocol Evolution
Sam Hartman - Extensibility in the Kerberos Protocol Slide 9
Extensibility Proposals Presented at IETF
Sam Hartman - Extensibility in the Kerberos Protocol Slide 11
With the exception of crypto system selection, none of these extensions work in an interoperable manner. Many have been removed from the draft pending a better solution; others would present significant problems if implemented.
Where these Extensions Stand Today
Sam Hartman - Extensibility in the Kerberos Protocol Slide 12
ASN.1 sequences. Unfortunately, doing so breaks backward compatibility.
capability negotiation to Kerberos. As such, clients cannot tell whether extensions they want to use are supported.
we didn't take advantage of common elements.
Common Problems with Extensions
Sam Hartman - Extensibility in the Kerberos Protocol Slide 13
because Kerberos involves three parties. The KDC must know the capabilities of the service.
Why Avoid Negotiation
Sam Hartman - Extensibility in the Kerberos Protocol Slide 14
negotiation is reasonable, even if storing a bit for each
general solution than for any specific option.
authenticated cleartext rather than specific cases.
Why can we do better with a general solution?
Sam Hartman - Extensibility in the Kerberos Protocol Slide 16
evolution.
interoperable ways.
Kerberos messages.
Goals of Our General Solution
Sam Hartman - Extensibility in the Kerberos Protocol Slide 17
We add ASN.1 extension markers to most Kerberos messages.
coordinate tag assignment; only the IETF can take advantage of the ASN.1 extensibility markers.
ASN.1 Extensibility Allows IETf Protocol
Sam Hartman - Extensibility in the Kerberos Protocol Slide 18
along with an integer that defines how to interpret the
have them.
extensions.
Meeting Vendor Needs with Typed Holes
Sam Hartman - Extensibility in the Kerberos Protocol Slide 19
types containing keyed checksums.
and what key is used.
authenticate the AS-REQ.
Protecting Cleartext with Signed Type
Sam Hartman - Extensibility in the Kerberos Protocol Slide 20
Be liberal in what you accept and conservative in what you
understood by the recipient. Recipients should ignore extensions they do not understand, preserving them if the message is reencoded.
The Golden Rule
Sam Hartman - Extensibility in the Kerberos Protocol Slide 21
send new-format messages.
Determining Capabilities of a Recipient
Sam Hartman - Extensibility in the Kerberos Protocol Slide 22