Internet DRAFT - draft-yu-kitten-kerberos-kdc-does-aliases
draft-yu-kitten-kerberos-kdc-does-aliases
Internet Engineering Task Force T. Yu
Internet-Draft MIT Kerberos Consortium
Updates: 4120 (if approved) Feb 2013
Intended status: Standards Track
Expires: August 5, 2013
Kerberos Ticket flag indicating KDC support for resolving hostname
aliases
draft-yu-kitten-kerberos-kdc-does-aliases-00
Abstract
This document specifies a Kerberos Ticket flag that indicates that
the Key Distribution Center (KDC) can resolve hostname aliases in
service principal names. This document updates RFC 4120.
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on August 5, 2013.
Copyright Notice
Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Yu Expires August 5, 2013 [Page 1]
Internet-Draft KDC-resolves-aliases flag Feb 2013
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Requirements Language . . . . . . . . . . . . . . . . . . . . . 3
3. Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . 3
4. KDC Behavior . . . . . . . . . . . . . . . . . . . . . . . . . 3
5. Client Behavior . . . . . . . . . . . . . . . . . . . . . . . . 3
6. Assigned numbers . . . . . . . . . . . . . . . . . . . . . . . 4
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 4
8. Security Considerations . . . . . . . . . . . . . . . . . . . . 4
9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 4
10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 4
10.1. Normative References . . . . . . . . . . . . . . . . . . . 4
10.2. Informative References . . . . . . . . . . . . . . . . . . 5
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 5
Yu Expires August 5, 2013 [Page 2]
Internet-Draft KDC-resolves-aliases flag Feb 2013
1. Introduction
This document specifies a new Kerberos Ticket flag that indicates
that the Key Distribution Center (KDC) is capable of resolving
hostname aliases. A Kerberos client can interpret the presence of
this Ticket flag as a recommendation to avoid using potentially
insecure DNS lookups to canonicalize hostnames when constructing
Kerberos principal names.
2. Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
3. Motivation
When attempting to authenticate to a Kerberos application service,
existing Kerberos client implementations typically perform hostname
canonicalization when constructing the Kerberos service principal.
In practice, these clients canonicalize using insecure DNS, contrary
to the recommendations in RFC 4120 [RFC4120]. Implementations are
not consistent about whether they use forward resolution (looking up
an address record for the user-provided hostname and returning the
accompanying canonical hostname) or reverse resolution (taking the IP
address from a forward resolution and returning the reverse pointer
(PTR) record) to canonicalize hostname components of Kerberos service
principal names.
4. KDC Behavior
If a KDC has knowledge of all hostname aliases for host-based service
principal names in its realm, it SHOULD set the kdc-resolves-aliases
(number TBD) flag in the Ticket and EncKDCRepPart for all tickets it
issues.
5. Client Behavior
If a client receives an EncKDCRepPart that has the flag kdc-resolves-
aliases set, it SHOULD NOT attempt to canonicalize hostnames in
service principal names for the realm whose KDC set that flag.
Instead, the client SHOULD use the unchanged user-provided hostname
when constructing the service principal name. The following
behaviors in RFC 4120 [RFC4120] are still permitted: clients MAY
Yu Expires August 5, 2013 [Page 3]
Internet-Draft KDC-resolves-aliases flag Feb 2013
append a statically configured domain name to unqualified hostname,
and clients SHOULD fold the hostname to lowercase.
6. Assigned numbers
TBD
7. IANA Considerations
TBD.
8. Security Considerations
The new ticket flag described in this document allows Kerberos realm
administrators to communicate a recommendation to clients that they
not attempt any hostname canonicalization when constructing service
principal names. This avoids the use of insecure DNS to resolve
hostnames, which can allow principal name substitution attacks in
some environments.
9. Acknowledgements
Thanks to Sam Hartman, Love Hornquist Astrand, and many others who
suggested this idea and contributed to its evolution.
10. References
10.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC4120] Neuman, C., Yu, T., Hartman, S., and K. Raeburn, "The
Kerberos Network Authentication Service (V5)", RFC 4120,
July 2005.
[X.680] ISO, "Information technology -- Abstract Syntax Notation
One (ASN.1): Specification of basic notation -- ITU-T
Recommendation X.680 (ISO/IEC International Standard 8824-
1:2008)", 2008.
[X.690] ISO, "Information technology -- ASN.1 encoding rules:
Specification of Basic Encoding Rules (BER), Canonical
Yu Expires August 5, 2013 [Page 4]
Internet-Draft KDC-resolves-aliases flag Feb 2013
Encoding Rules (CER) and Distinguished Encoding Rules
(DER) -- ITU-T Recommendation X.690 (ISO/IEC International
Standard 8825-1:2008)", 1997.
10.2. Informative References
[RFC1510] Kohl, J. and B. Neuman, "The Kerberos Network
Authentication Service (V5)", RFC 1510, September 1993.
Author's Address
Tom Yu
MIT Kerberos Consortium
77 Massachusetts Ave
Cambridge, Massachusetts
USA
Email: tlyu@mit.edu
Yu Expires August 5, 2013 [Page 5]