Questioning Kerberos Assumptions Sam Hartman IETF 63 Questioning - - PowerPoint PPT Presentation

questioning kerberos assumptions
SMART_READER_LITE
LIVE PREVIEW

Questioning Kerberos Assumptions Sam Hartman IETF 63 Questioning - - PowerPoint PPT Presentation

Questioning Kerberos Assumptions Sam Hartman IETF 63 Questioning Kerberos Assumptions Principal Names are not remapped in cross-realm The destination KDC is not involved in cross-realm Privacy of principal names 1 Why Remap


slide-1
SLIDE 1

Questioning Kerberos Assumptions

Sam Hartman IETF 63

slide-2
SLIDE 2

Questioning Kerberos Assumptions

  • Principal Names are not remapped in cross-realm
  • The destination KDC is not involved in cross-realm
  • Privacy of principal names

1

slide-3
SLIDE 3

Why Remap Identifiers

  • Liberty Alliance and other SAML consumers want to map identity.
  • Mapping to reflect target account names may be useful.

2

slide-4
SLIDE 4

Why Involve Destination KDC

  • Symmetry of protocol
  • Group membership and authorization data
  • Single point of control for stoplists

3

slide-5
SLIDE 5

Why Privacy

  • Significant need in cellular and wireless communities for identifier pri-

vacy so that passive observers cannot know who is logging in.

  • See the alien BOF

.

4

slide-6
SLIDE 6

Adding Identifier Mapping

  • Need for client control
  • Handling cases where different identities are needed
  • Multi-hop Cross-realm

5

slide-7
SLIDE 7

SAML: What is SAML

  • SAML is an OASIS XML-based language for describing identity.
  • SAML provides assertions about aspects of identity.
  • These assertions can be included in other mechanisms.

6

slide-8
SLIDE 8

SAML: SAML and Kerberos

  • SAML Assertions in authorization data
  • SAML Assertions replace principal name as important part of authen-

tication as Microsoft PAC replaces the principal name

  • SAML useful in preauthentication?

7

slide-9
SLIDE 9

SAML: How SAML integration Might Work

  • Client sends request including details of assertions service needs to

KDC.

  • KDC issues ticket with identity added/removed as appropriate.
  • Client presents ticket to service.

8

slide-10
SLIDE 10

SAML: Hard Problems

  • How does a client know what assertions a server wants?
  • How does a KDC decide what assertions are permitted?
  • How do you manage all the possible tickets?

9

slide-11
SLIDE 11

Mapping for Accounts

  • Many platforms have a concept of mapping a foreign principal to an

account within an infrastructure.

  • Authorization data like the Microsoft PAC already supports this con-

cept.

  • Should core Kerberos?

10

slide-12
SLIDE 12

Account Mapping: Questions

  • Should the original authentication identity be preserved?
  • To what extent is the client involved in remapping?
  • How does this interact with GSS?

11

slide-13
SLIDE 13

Involving the Destination KDC

12

slide-14
SLIDE 14

Destination KDC: Symmetry

  • Authorization data, ticket extensions and other protocol elements are

added to TGTS.

  • These elements are often realm specific.
  • Handling on a per-service case for cross-realm problematic.

13

slide-15
SLIDE 15

Privacy

14

slide-16
SLIDE 16

Privacy: Types of Privacy

  • Hiding identity from network eavesdroppers
  • Hiding parts of identity from services and realms

15

slide-17
SLIDE 17

Privacy: Possible Solutions

  • Encrypt more of the KDC exchange
  • Anonymous principals

16

slide-18
SLIDE 18

Privacy: Questions

  • Do we need privacy to the KDC?
  • How do we handle legacy applications?
  • How does this impact GSS?

17

slide-19
SLIDE 19

Concluding Questions

  • Are our current assumptions correct?
  • If we change these assumptions can these changes be extensions or

is the core protocol impacted?

18