newer drafts

git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@8048 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
Assar Westerlund
2000-03-18 02:04:53 +00:00
parent 89ac710427
commit 9a3cefb99d
3 changed files with 3980 additions and 3789 deletions

View File

@@ -1,12 +1,12 @@
INTERNET-DRAFT Brian Tung INTERNET-DRAFT Brian Tung
draft-ietf-cat-kerberos-pk-init-10.txt Clifford Neuman draft-ietf-cat-kerberos-pk-init-11.txt Clifford Neuman
Updates: RFC 1510 ISI Updates: RFC 1510 USC/ISI
expires April 30, 2000 Matthew Hur expires September 15, 2000 Matthew Hur
CyberSafe Corporation CyberSafe Corporation
Ari Medvinsky Ari Medvinsky
Excite Keen.com, Inc.
Sasha Medvinsky Sasha Medvinsky
General Instrument Motorola
John Wray John Wray
Iris Associates, Inc. Iris Associates, Inc.
Jonathan Trostle Jonathan Trostle
@@ -41,7 +41,7 @@ expires April 30, 2000 Matthew Hur
munnari.oz.au (Pacific Rim). munnari.oz.au (Pacific Rim).
The distribution of this memo is unlimited. It is filed as The distribution of this memo is unlimited. It is filed as
draft-ietf-cat-kerberos-pk-init-10.txt, and expires April 30, draft-ietf-cat-kerberos-pk-init-11.txt, and expires September 15,
2000. Please send comments to the authors. 2000. Please send comments to the authors.
1. Abstract 1. Abstract
@@ -181,7 +181,7 @@ expires April 30, 2000 Matthew Hur
In many cases, PKINIT requires the encoding of the X.500 name of a In many cases, PKINIT requires the encoding of the X.500 name of a
certificate authority as a Realm. When such a name appears as certificate authority as a Realm. When such a name appears as
a ream it will be represented using the "other" form of the realm a realm it will be represented using the "other" form of the realm
name as specified in the naming constraints section of RFC1510. name as specified in the naming constraints section of RFC1510.
For a realm derived from an X.500 name, NAMETYPE will have the value For a realm derived from an X.500 name, NAMETYPE will have the value
X500-RFC2253. The full realm name will appear as follows: X500-RFC2253. The full realm name will appear as follows:
@@ -235,12 +235,62 @@ expires April 30, 2000 Matthew Hur
name-string[1] SEQUENCE OF GeneralString name-string[1] SEQUENCE OF GeneralString
} }
For the purposes of encoding an X.500 name within this structure, For the purposes of encoding an X.500 name as a Kerberos name for
the name-string shall be encoded as a single GeneralString. use in Kerberos structures, the name-string shall be encoded as a
single GeneralString. The name-type should be KRB_NT_X500_PRINCIPAL,
as noted above. All Kerberos names must conform to validity
requirements as given in RFC 1510. Note that name mapping may be
required or optional, based on policy.
Note that name mapping may be required or optional based on We also define the following similar ASN.1 structure:
policy. All names must conform to validity requirements as given
in RFC 1510. CertPrincipalName ::= SEQUENCE {
name-type[0] INTEGER,
name-string[1] SEQUENCE OF UTF8String
}
When a Kerberos PrincipalName is to be placed within an X.509 data
structure, the CertPrincipalName structure is to be used, with the
name-string encoded as a single UTF8String. The name-type should be
as identified in the original PrincipalName structure. The mapping
between the GeneralString and UTF8String formats can be found in
[19].
The following rules relate to the the matching of PrincipalNames (or
corresponding CertPrincipalNames) with regard to the PKI name
constraints for CAs as laid out in RFC 2459 [15]. In order to be
regarded as a match (for permitted and excluded name trees), the
following must be satisfied.
1. If the constraint is given as a user plus realm name, or
as a user plus instance plus realm name (as specified in
RFC 1510), the realm name must be valid (see 2.a-d below)
and the match must be exact, byte for byte.
2. If the constraint is given only as a realm name, matching
depends on the type of the realm:
a. If the realm contains a colon (':') before any equal
sign ('='), it is treated as a realm of type Other,
and must match exactly, byte for byte.
b. Otherwise, if the realm contains an equal sign, it
is treated as an X.500 name. In order to match, every
component in the constraint MUST be in the principal
name, and have the same value. For example, 'C=US'
matches 'C=US/O=ISI' but not 'C=UK'.
c. Otherwise, if the realm name conforms to rules regarding
the format of DNS names, it is considered a realm name of
type Domain. The constraint may be given as a realm
name 'FOO.BAR', which matches any PrincipalName within
the realm 'FOO.BAR' but not those in subrealms such as
'CAR.FOO.BAR'. A constraint of the form '.FOO.BAR'
matches PrincipalNames in subrealms of the form
'CAR.FOO.BAR' but not the realm 'FOO.BAR' itself.
d. Otherwise, the realm name is invalid and does not match
under any conditions.
3.1.1. Encryption and Key Formats 3.1.1. Encryption and Key Formats
@@ -330,16 +380,18 @@ expires April 30, 2000 Matthew Hur
PA-PK-AS-REQ ::= SEQUENCE { PA-PK-AS-REQ ::= SEQUENCE {
-- PA TYPE 14 -- PA TYPE 14
signedAuthPack [0] SignedData signedAuthPack [0] SignedData
-- defined in CMS [11] -- Defined in CMS [11];
-- AuthPack (below) defines the data -- AuthPack (below) defines the
-- that is signed -- data that is signed.
trustedCertifiers [1] SEQUENCE OF TrustedCas OPTIONAL, trustedCertifiers [1] SEQUENCE OF TrustedCas OPTIONAL,
-- CAs that the client trusts -- This is a list of CAs that the
-- client trusts and that certify
-- KDCs.
kdcCert [2] IssuerAndSerialNumber OPTIONAL kdcCert [2] IssuerAndSerialNumber OPTIONAL
-- as defined in CMS [11] -- As defined in CMS [11];
-- specifies a particular KDC -- specifies a particular KDC
-- certificate if the client -- certificate if the client
-- already has it; -- already has it.
encryptionCert [3] IssuerAndSerialNumber OPTIONAL encryptionCert [3] IssuerAndSerialNumber OPTIONAL
-- For example, this may be the -- For example, this may be the
-- client's Diffie-Hellman -- client's Diffie-Hellman
@@ -361,29 +413,38 @@ expires April 30, 2000 Matthew Hur
} }
Usage of SignedData: Usage of SignedData:
The SignedData data type is specified in the Cryptographic The SignedData data type is specified in the Cryptographic
Message Syntax, a product of the S/MIME working group of the IETF. Message Syntax, a product of the S/MIME working group of the
- The encapContentInfo field must contain the PKAuthenticator IETF. The following describes how to fill in the fields of
this data:
1. The encapContentInfo field must contain the PKAuthenticator
and, optionally, the client's Diffie Hellman public value. and, optionally, the client's Diffie Hellman public value.
- The eContentType field shall contain the OID value for
id-data: iso(1) member-body(2) us(840) rsadsi(113549) a. The eContentType field shall contain the OID value for
pkcs(1) pkcs7(7) data(1) pkdata: iso (1) org (3) dod (6) internet (1) security (5)
- The eContent field is data of the type AuthPack (below). kerberosv5 (2) pkinit (3) pkdata (1)
- The signerInfos field contains the signature of AuthPack.
- The Certificates field, when non-empty, contains the client's b. The eContent field is data of the type AuthPack (below).
certificate chain. If present, the KDC uses the public key from
the client's certificate to verify the signature in the request. 2. The signerInfos field contains the signature of AuthPack.
Note that the client may pass different certificates that are used
for signing or for encrypting. Thus, the KDC may utilize a 3. The Certificates field, when non-empty, contains the client's
different client certificate for signature verification than the certificate chain. If present, the KDC uses the public key
one it uses to encrypt the reply to the client. For example, the from the client's certificate to verify the signature in the
client may place a Diffie-Hellman certificate in this field in request. Note that the client may pass different certificate
order to convey its static Diffie Hellman certificate to the KDC to chains that are used for signing or for encrypting. Thus,
enable static-ephemeral Diffie-Hellman mode for the reply; in this the KDC may utilize a different client certificate for
case, the client does NOT place its public value in the AuthPack signature verification than the one it uses to encrypt the
(defined below). As another example, the client may place an RSA reply to the client. For example, the client may place a
encryption certificate in this field. However, there must always Diffie-Hellman certificate in this field in order to convey
be (at least) a signature certificate. its static Diffie Hellman certificate to the KDC to enable
static-ephemeral Diffie-Hellman mode for the reply; in this
case, the client does NOT place its public value in the
AuthPack (defined below). As another example, the client may
place an RSA encryption certificate in this field. However,
there must always be (at least) a signature certificate.
AuthPack ::= SEQUENCE { AuthPack ::= SEQUENCE {
pkAuthenticator [0] PKAuthenticator, pkAuthenticator [0] PKAuthenticator,
@@ -503,7 +564,13 @@ expires April 30, 2000 Matthew Hur
Even if all succeeds, the KDC may--for policy reasons--decide not Even if all succeeds, the KDC may--for policy reasons--decide not
to trust the client. In this case, the KDC returns an error message to trust the client. In this case, the KDC returns an error message
of type KDC_ERR_CLIENT_NOT_TRUSTED. of type KDC_ERR_CLIENT_NOT_TRUSTED. One specific case of this is
the presence or absence of an Enhanced Key Usage (EKU) OID within
the certificate extensions. The rules regarding acceptability of
an EKU sequence (or the absence of any sequence) are a matter of
local policy. For the benefit of implementers, we define a PKINIT
EKU OID as the following: iso (1) org (3) dod (6) internet (1)
security (5) kerberosv5 (2) pkinit (3) pkekuoid (2).
If a trust relationship exists, the KDC then verifies the client's If a trust relationship exists, the KDC then verifies the client's
signature on AuthPack. If that fails, the KDC returns an error signature on AuthPack. If that fails, the KDC returns an error
@@ -554,7 +621,7 @@ expires April 30, 2000 Matthew Hur
the subjectAltName version 3 extension , that name may utilize the subjectAltName version 3 extension , that name may utilize
KerberosName as defined below, or, in the case of an S/MIME KerberosName as defined below, or, in the case of an S/MIME
certificate [17], may utilize the email address. If the KDC certificate [17], may utilize the email address. If the KDC
is presented with as S/MIME certificate, then the email address is presented with an S/MIME certificate, then the email address
within subjectAltName will be interpreted as a principal and realm within subjectAltName will be interpreted as a principal and realm
separated by the "@" sign, or as a name that needs to be separated by the "@" sign, or as a name that needs to be
canonicalized. If the resulting name does not correspond to a canonicalized. If the resulting name does not correspond to a
@@ -604,34 +671,47 @@ expires April 30, 2000 Matthew Hur
} }
Usage of SignedData: Usage of SignedData:
If the Diffie-Hellman option is used, dhSignedData in PA-PK-AS-REP
provides authenticated Diffie-Hellman parameters of the KDC. The When the Diffie-Hellman option is used, dhSignedData in
reply key used to encrypt part of the KDC reply message is derived PA-PK-AS-REP provides authenticated Diffie-Hellman parameters
from the Diffie-Hellman exchange: of the KDC. The reply key used to encrypt part of the KDC reply
- Both the KDC and the client calculate a secret value (g^ab mod p), message is derived from the Diffie-Hellman exchange:
where a is the client's private exponent and b is the KDC's
private exponent. 1. Both the KDC and the client calculate a secret value
- Both the KDC and the client take the first N bits of this secret (g^ab mod p), where a is the client's private exponent and
value and convert it into a reply key. N depends on the reply key b is the KDC's private exponent.
type.
- If the reply key is DES, N=64 bits, where some of the bits are 2. Both the KDC and the client take the first N bits of this
replaced with parity bits, according to FIPS PUB 74. secret value and convert it into a reply key. N depends on
- If the reply key is (3-key) 3-DES, N=192 bits, where some of the the reply key type.
bits are replaced with parity bits, according to FIPS PUB 74.
- The encapContentInfo field must contain the KdcDHKeyInfo as 3. If the reply key is DES, N=64 bits, where some of the bits
are replaced with parity bits, according to FIPS PUB 74.
4. If the reply key is (3-key) 3-DES, N=192 bits, where some
of the bits are replaced with parity bits, according to
FIPS PUB 74.
5. The encapContentInfo field must contain the KdcDHKeyInfo as
defined below. defined below.
- The eContentType field shall contain the OID value for
id-data: iso(1) member-body(2) us(840) rsadsi(113549) a. The eContentType field shall contain the OID value for
pkcs(1) pkcs7(7) data(1) pkdata: iso (1) org (3) dod (6) internet (1) security (5)
- The certificates field must contain the certificates necessary kerberosv5 (2) pkinit (3) pkdata (1)
for the client to establish trust in the KDC's certificate
based on the list of trusted certifiers sent by the client in b. The eContent field is data of the type KdcDHKeyInfo
the PA-PK-AS-REQ. This field may be empty if the client did (below).
not send to the KDC a list of trusted certifiers (the
trustedCertifiers field was empty, meaning that the client 6. The certificates field must contain the certificates
already possesses the KDC's certificate). necessary for the client to establish trust in the KDC's
- The signerInfos field is a SET that must contain at least one certificate based on the list of trusted certifiers sent by
member, since it contains the actual signature. the client in the PA-PK-AS-REQ. This field may be empty if
the client did not send to the KDC a list of trusted
certifiers (the trustedCertifiers field was empty, meaning
that the client already possesses the KDC's certificate).
7. The signerInfos field is a SET that must contain at least
one member, since it contains the actual signature.
KdcDHKeyInfo ::= SEQUENCE { KdcDHKeyInfo ::= SEQUENCE {
-- used only when utilizing Diffie-Hellman -- used only when utilizing Diffie-Hellman
@@ -644,42 +724,60 @@ expires April 30, 2000 Matthew Hur
} }
Usage of EnvelopedData: Usage of EnvelopedData:
The EnvelopedData data type is specified in the Cryptographic The EnvelopedData data type is specified in the Cryptographic
Message Syntax, a product of the S/MIME working group of the IETF. Message Syntax, a product of the S/MIME working group of the
It contains an temporary key encrypted with the PKINIT IETF. It contains a temporary key encrypted with the PKINIT
client's public key. It also contains a signed and encrypted client's public key. It also contains a signed and encrypted
reply key. reply key.
- The originatorInfo field is not required, since that information
may be presented in the signedData structure that is encrypted 1. The originatorInfo field is not required, since that
within the encryptedContentInfo field. information may be presented in the signedData structure
- The optional unprotectedAttrs field is not required for PKINIT. that is encrypted within the encryptedContentInfo field.
- The recipientInfos field is a SET which must contain exactly one
member of the KeyTransRecipientInfo type for encryption 2. The optional unprotectedAttrs field is not required for
PKINIT.
3. The recipientInfos field is a SET which must contain exactly
one member of the KeyTransRecipientInfo type for encryption
with an RSA public key. with an RSA public key.
- The encryptedKey field (in KeyTransRecipientInfo) contains
the temporary key which is encrypted with the PKINIT client's a. The encryptedKey field (in KeyTransRecipientInfo)
public key. contains the temporary key which is encrypted with the
- The encryptedContentInfo field contains the signed and encrypted PKINIT client's public key.
reply key.
- The contentType field shall contain the OID value for 4. The encryptedContentInfo field contains the signed and
id-signedData: iso(1) member-body(2) us(840) rsadsi(113549) encrypted reply key.
pkcs(1) pkcs7(7) signedData(2)
- The encryptedContent field is encrypted data of the CMS type a. The contentType field shall contain the OID value for
signedData as specified below. id-signedData: iso (1) member-body (2) us (840)
- The encapContentInfo field must contains the ReplyKeyPack. rsadsi (113549) pkcs (1) pkcs7 (7) signedData (2)
- The eContentType field shall contain the OID value for
id-data: iso(1) member-body(2) us(840) rsadsi(113549) b. The encryptedContent field is encrypted data of the CMS
pkcs(1) pkcs7(7) data(1) type signedData as specified below.
- The eContent field is data of the type ReplyKeyPack (below).
- The certificates field must contain the certificates necessary i. The encapContentInfo field must contains the
for the client to establish trust in the KDC's certificate ReplyKeyPack.
based on the list of trusted certifiers sent by the client in
the PA-PK-AS-REQ. This field may be empty if the client did * The eContentType field shall contain the OID value
not send to the KDC a list of trusted certifiers (the for pkdata: iso (1) org (3) dod (6) internet (1)
trustedCertifiers field was empty, meaning that the client security (5) kerberosv5 (2) pkinit (3) pkdata (1)
already possesses the KDC's certificate).
- The signerInfos field is a SET that must contain at least one * The eContent field is data of the type ReplyKeyPack
member, since it contains the actual signature. (below).
ii. The certificates field must contain the certificates
necessary for the client to establish trust in the
KDC's certificate based on the list of trusted
certifiers sent by the client in the PA-PK-AS-REQ.
This field may be empty if the client did not send
to the KDC a list of trusted certifiers (the
trustedCertifiers field was empty, meaning that the
client already possesses the KDC's certificate).
iii. The signerInfos field is a SET that must contain at
least one member, since it contains the actual
signature.
ReplyKeyPack ::= SEQUENCE { ReplyKeyPack ::= SEQUENCE {
-- not used for Diffie-Hellman -- not used for Diffie-Hellman
@@ -715,26 +813,27 @@ expires April 30, 2000 Matthew Hur
GeneralNames ::= SEQUENCE SIZE(1..MAX) OF GeneralName GeneralNames ::= SEQUENCE SIZE(1..MAX) OF GeneralName
GeneralName ::= CHOICE { GeneralName ::= CHOICE {
otherName [0] INSTANCE OF OTHER-NAME, otherName [0] OtherName,
... ...
} }
OTHER-NAME ::= TYPE-IDENTIFIER OtherName ::= SEQUENCE {
type-id OBJECT IDENTIFIER,
value [0] EXPLICIT ANY DEFINED BY type-id
}
In this definition, otherName is a name of any form defined as an For the purpose of specifying a Kerberos principal name, the value
instance of the OTHER-NAME information object class. For the purpose in OtherName shall be a KerberosName as defined in RFC 1510, but with
of specifying a Kerberos principal name, INSTANCE OF OTHER-NAME will the PrincipalName replaced by CertPrincipalName as mentioned in
be chosen and replaced by the type KerberosName: Section 3.1:
KerberosName ::= SEQUENCE { KerberosName ::= SEQUENCE {
realm [0] Realm, realm [0] Realm,
-- as defined in RFC 1510 principalName [1] CertPrincipalName -- defined above
principalName [1] PrincipalName,
-- as defined in RFC 1510
} }
This specific syntax is identified within subjectAltName by setting This specific syntax is identified within subjectAltName by setting
the OID id-ce-subjectAltName to krb5PrincipalName, where (from the the type-id in OtherName to krb5PrincipalName, where (from the
Kerberos specification) we have Kerberos specification) we have
krb5 OBJECT IDENTIFIER ::= { iso (1) krb5 OBJECT IDENTIFIER ::= { iso (1)
@@ -765,11 +864,11 @@ expires April 30, 2000 Matthew Hur
to be implemented in order to comply with the proposed standard. to be implemented in order to comply with the proposed standard.
Below is a list of the required algorithms: Below is a list of the required algorithms:
- Diffie-Hellman public/private key pairs * Diffie-Hellman public/private key pairs
- utilizing Diffie-Hellman ephemeral-ephemeral mode * utilizing Diffie-Hellman ephemeral-ephemeral mode
- SHA1 digest and DSA for signatures * SHA1 digest and DSA for signatures
- 3-key triple DES keys derived from the Diffie-Hellman Exchange * 3-key triple DES keys derived from the Diffie-Hellman Exchange
- 3-key triple DES Temporary and Reply keys * 3-key triple DES Temporary and Reply keys
4. Logistics and Policy 4. Logistics and Policy
@@ -793,11 +892,12 @@ expires April 30, 2000 Matthew Hur
First of all, PKINIT introduces a new trust model, where KDCs do not First of all, PKINIT introduces a new trust model, where KDCs do not
(necessarily) certify the identity of those for whom they issue (necessarily) certify the identity of those for whom they issue
tickets. PKINIT does allow KDCs to act as their own CAs, in order tickets. PKINIT does allow KDCs to act as their own CAs, in the
to simplify key management, but one of the additional benefits is to limited capacity of self-signing their certificates, but one of the
align Kerberos authentication with a global public key additional benefits is to align Kerberos authentication with a global
infrastructure. Anyone using PKINIT in this way must be aware of public key infrastructure. Anyone using PKINIT in this way must be
how the certification infrastructure they are linking to works. aware of how the certification infrastructure they are linking to
works.
Secondly, PKINIT also introduces the possibility of interactions Secondly, PKINIT also introduces the possibility of interactions
between different cryptosystems, which may be of widely varying between different cryptosystems, which may be of widely varying
@@ -837,16 +937,14 @@ expires April 30, 2000 Matthew Hur
[3] B. Tung, T. Ryutov, C. Neuman, G. Tsudik, B. Sommerfeld, [3] B. Tung, T. Ryutov, C. Neuman, G. Tsudik, B. Sommerfeld,
A. Medvinsky, M. Hur. Public Key Cryptography for Cross-Realm A. Medvinsky, M. Hur. Public Key Cryptography for Cross-Realm
Authentication in Kerberos. Authentication in Kerberos. draft-ietf-cat-kerberos-pk-cross-04.txt
draft-ietf-cat-kerberos-pk-cross-04.txt
[4] A. Medvinsky, J. Cargille, M. Hur. Anonymous Credentials in [4] A. Medvinsky, J. Cargille, M. Hur. Anonymous Credentials in
Kerberos. Kerberos. draft-ietf-cat-kerberos-anoncred-00.txt
draft-ietf-cat-kerberos-anoncred-00.txt
[5] A. Medvinsky, M. Hur, B. Clifford Neuman. Public Key Utilizing [5] Ari Medvinsky, M. Hur, Alexander Medvinsky, B. Clifford Neuman.
Tickets for Application Servers (PKTAPP). Public Key Utilizing Tickets for Application Servers (PKTAPP).
draft-ietf-cat-pktapp-00.txt draft-ietf-cat-pktapp-02.txt
[6] M. Sirbu, J. Chuang. Distributed Authentication in Kerberos [6] M. Sirbu, J. Chuang. Distributed Authentication in Kerberos
Using Public Key Cryptography. Symposium On Network and Distributed Using Public Key Cryptography. Symposium On Network and Distributed
@@ -898,6 +996,10 @@ expires April 30, 2000 Matthew Hur
[18] M. Wahl, T. Howes, S. Kille. Lightweight Directory Access [18] M. Wahl, T. Howes, S. Kille. Lightweight Directory Access
Protocol (v3), December 1997. Request for Comments 2251. Protocol (v3), December 1997. Request for Comments 2251.
[19] ITU-T (formerly CCITT) Information Processing Systems - Open
Systems Interconnection - Specification of Abstract Syntax Notation
One (ASN.1) Rec. X.680 ISO/IEC 8824-1
8. Acknowledgements 8. Acknowledgements
Some of the ideas on which this proposal is based arose during Some of the ideas on which this proposal is based arose during
@@ -912,7 +1014,7 @@ expires April 30, 2000 Matthew Hur
9. Expiration Date 9. Expiration Date
This draft expires April 30, 2000. This draft expires September 15, 2000.
10. Authors 10. Authors
@@ -932,14 +1034,14 @@ expires April 30, 2000 Matthew Hur
E-mail: matt.hur@cybersafe.com E-mail: matt.hur@cybersafe.com
Ari Medvinsky Ari Medvinsky
Excite Keen.com, Inc.
555 Broadway 150 Independence Drive
Redwood City, CA 94063 Menlo Park CA 94025
Phone +1 650 569 2119 Phone: +1 650 289 3134
E-mail: amedvins@excitecorp.com E-mail: ari@keen.com
Sasha Medvinsky Sasha Medvinsky
General Instrument Motorola
6450 Sequence Drive 6450 Sequence Drive
San Diego, CA 92121 San Diego, CA 92121
Phone +1 619 404 2825 Phone +1 619 404 2825
@@ -955,4 +1057,3 @@ expires April 30, 2000 Matthew Hur
170 W. Tasman Dr. 170 W. Tasman Dr.
San Jose, CA 95134 San Jose, CA 95134
E-mail: jtrostle@cisco.com E-mail: jtrostle@cisco.com

View File

@@ -1,7 +1,7 @@
INTERNET-DRAFT Mike Swift INTERNET-DRAFT Mike Swift
draft-ietf-cat-kerberos-set-passwd-01.txt Microsoft draft-ietf-cat-kerberos-set-passwd-02.txt Microsoft
February 2000 Jonathan Trostle March 2000 Jonathan Trostle
Cisco Systems Cisco Systems
John Brezak John Brezak
Microsoft Microsoft
@@ -132,9 +132,11 @@ Request Message
} }
NewPasswdOrKeys :: = CHOICE { NewPasswdOrKeys :: = CHOICE {
passwords[0] KeySequence, passwords[0] PasswordSequence,
keyseq[1] PasswordSequence keyseq[1] KeySequences
}
KeySequences :: = SEQUENCE OF KeySequence
KeySequence :: = SEQUENCE { KeySequence :: = SEQUENCE {
key[0] EncryptionKey, key[0] EncryptionKey,
@@ -146,7 +148,7 @@ Request Message
newpasswd[0] OCTET STRING, newpasswd[0] OCTET STRING,
oldpasswd[1] OCTET STRING OPTIONAL oldpasswd[1] OCTET STRING OPTIONAL
-- oldpasswd always present for change password -- oldpasswd always present for change password
-- but not set password -- but not present for set password
} }
The server must verify the AP-REQ message, check whether the client The server must verify the AP-REQ message, check whether the client
@@ -295,7 +297,7 @@ Reply Message
5. Expiration Date 5. Expiration Date
This draft expires in August 2000. This draft expires in September 2000.
6. Authors' Addresses 6. Authors' Addresses
@@ -317,5 +319,7 @@ Reply Message
Bill Gossman Bill Gossman
Cybersafe Corporation Cybersafe Corporation
1605 NW Sammamish Rd.
Issaquah, WA 98027-5378
Email: bill.gossman@cybersafe.com Email: bill.gossman@cybersafe.com