questioning kerberos assumptions
play

Questioning Kerberos Assumptions Sam Hartman IETF 63 Questioning - PowerPoint PPT Presentation

Questioning Kerberos Assumptions Sam Hartman IETF 63 Questioning Kerberos Assumptions Principal Names are not remapped in cross-realm The destination KDC is not involved in cross-realm Privacy of principal names 1 Why Remap


  1. Questioning Kerberos Assumptions Sam Hartman IETF 63

  2. Questioning Kerberos Assumptions • Principal Names are not remapped in cross-realm • The destination KDC is not involved in cross-realm • Privacy of principal names 1

  3. Why Remap Identifiers • Liberty Alliance and other SAML consumers want to map identity. • Mapping to reflect target account names may be useful. 2

  4. Why Involve Destination KDC • Symmetry of protocol • Group membership and authorization data • Single point of control for stoplists 3

  5. Why Privacy • Significant need in cellular and wireless communities for identifier pri- vacy so that passive observers cannot know who is logging in. • See the alien BOF . 4

  6. Adding Identifier Mapping • Need for client control • Handling cases where different identities are needed • Multi-hop Cross-realm 5

  7. SAML: What is SAML • SAML is an OASIS XML-based language for describing identity. • SAML provides assertions about aspects of identity. • These assertions can be included in other mechanisms. 6

  8. SAML: SAML and Kerberos • SAML Assertions in authorization data • SAML Assertions replace principal name as important part of authen- tication as Microsoft PAC replaces the principal name • SAML useful in preauthentication? 7

  9. SAML: How SAML integration Might Work • Client sends request including details of assertions service needs to KDC. • KDC issues ticket with identity added/removed as appropriate. • Client presents ticket to service. 8

  10. SAML: Hard Problems • How does a client know what assertions a server wants? • How does a KDC decide what assertions are permitted? • How do you manage all the possible tickets? 9

  11. Mapping for Accounts • Many platforms have a concept of mapping a foreign principal to an account within an infrastructure. • Authorization data like the Microsoft PAC already supports this con- cept. • Should core Kerberos? 10

  12. Account Mapping: Questions • Should the original authentication identity be preserved? • To what extent is the client involved in remapping? • How does this interact with GSS? 11

  13. Involving the Destination KDC 12

  14. Destination KDC: Symmetry • Authorization data, ticket extensions and other protocol elements are added to TGTS. • These elements are often realm specific. • Handling on a per-service case for cross-realm problematic. 13

  15. Privacy 14

  16. Privacy: Types of Privacy • Hiding identity from network eavesdroppers • Hiding parts of identity from services and realms 15

  17. Privacy: Possible Solutions • Encrypt more of the KDC exchange • Anonymous principals 16

  18. Privacy: Questions • Do we need privacy to the KDC? • How do we handle legacy applications? • How does this impact GSS? 17

  19. Concluding Questions • Are our current assumptions correct? • If we change these assumptions can these changes be extensions or is the core protocol impacted? 18

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend