git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@21697 ec53bebd-3082-4978-b11e-865c3cabbd6b
788 lines
28 KiB
Plaintext
788 lines
28 KiB
Plaintext
|
||
|
||
|
||
|
||
|
||
|
||
Network Working Group Ken'ichi Kamada
|
||
INTERNET-DRAFT Shoichi Sakane
|
||
Expires: January 10, 2008 Yokogawa Electric Corporation
|
||
July 9, 2007
|
||
|
||
|
||
Client-Friendly Cross-Realm Model for Kerberos 5
|
||
draft-kamada-krb-client-friendly-cross-02.txt
|
||
|
||
|
||
|
||
|
||
Status of this Memo
|
||
|
||
By submitting this Internet-Draft, each author represents that any
|
||
applicable patent or other IPR claims of which he or she is aware
|
||
have been or will be disclosed, and any of which he or she becomes
|
||
aware will be disclosed, in accordance with Section 6 of BCP 79.
|
||
|
||
Internet-Drafts are working documents of the Internet Engineering
|
||
Task Force (IETF), its areas, and its working groups. Note that
|
||
other groups may also distribute working documents as Internet-
|
||
Drafts.
|
||
|
||
Internet-Drafts are draft documents valid for a maximum of six months
|
||
and may be updated, replaced, or obsoleted by other documents at any
|
||
time. It is inappropriate to use Internet-Drafts as reference
|
||
material or to cite them other than as "work in progress."
|
||
|
||
The list of current Internet-Drafts can be accessed at
|
||
http://www.ietf.org/1id-abstracts.html.
|
||
|
||
The list of Internet-Draft Shadow Directories can be accessed at
|
||
http://www.ietf.org/shadow.html.
|
||
|
||
This Internet-Draft expires on January 10, 2008.
|
||
|
||
|
||
Copyright Notice
|
||
|
||
Copyright (C) The IETF Trust (2007).
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Kamada and Sakane [Page 1]
|
||
|
||
Internet-Draft Client-Friendly Cross-Realm July 2007
|
||
|
||
|
||
Abstract
|
||
|
||
This document proposes a cross-realm traversal model, which is
|
||
suitable for resource-limited clients, for Kerberos Version 5. This
|
||
model provides a way to move the cost of consecutive Ticket-Granting
|
||
Service (TGS) exchanges from clients to Key Distribution Centers
|
||
(KDCs) and a way to reduce the traversal cost by generating a direct
|
||
inter-realm relationship between two realms. The document describes
|
||
behavior of clients and KDCs, but does not specify any wire format,
|
||
which need to be specified separately.
|
||
|
||
|
||
Table of Contents
|
||
|
||
1. Introduction ................................................. 3
|
||
2. Problems on Client Performance ............................... 3
|
||
2.1. Long Authentication Path ................................ 4
|
||
2.2. Client-Centric Ticketing ................................ 4
|
||
3. Proposal of Client-Friendly Cross-Realm Model ................ 4
|
||
3.1. Temporary Inter-Realm Relationship Generation Mode ...... 5
|
||
3.2. Attorney Ticketing Mode ................................. 6
|
||
3.3. Combination of the Two Modes ............................ 7
|
||
4. Advantage of The Proposed Model for Deployment ............... 8
|
||
4.1. Compatibility with Traditional Kerberos Deployment ...... 8
|
||
4.2. Orthogonality of the Two Modes .......................... 8
|
||
5. Front-End Protocol for Attorney Ticketing Mode ............... 9
|
||
6. Related Protocols Currently Proposed ......................... 10
|
||
6.1. PKCROSS ................................................. 10
|
||
6.2. XTGS .................................................... 10
|
||
7. Interoperability Considerations .............................. 10
|
||
8. Security Considerations ...................................... 11
|
||
8.1. Denial of Service (DoS) ................................. 11
|
||
8.2. Ticketing Policy ........................................ 11
|
||
9. IANA Considerations .......................................... 12
|
||
10. Acknowledgments .............................................. 12
|
||
11. References ................................................... 12
|
||
11.1. Normative References ................................... 12
|
||
11.2. Informative References ................................. 12
|
||
Authors' Addresses ............................................... 13
|
||
Full Copyright Statement ......................................... 13
|
||
Intellectual Property Statement .................................. 13
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Kamada and Sakane [Page 2]
|
||
|
||
Internet-Draft Client-Friendly Cross-Realm July 2007
|
||
|
||
|
||
1. Introduction
|
||
|
||
Kerberos Version 5 [RFC4120] has a concept of cross-realm
|
||
authentication so that principals in different realms can
|
||
authenticate each other. However in the current cross-realm model,
|
||
each client has to traverse the authentication path, and the burden
|
||
of the traversal is not negligible for clients with limited
|
||
resources, e.g., computational speed or power supply [CRPS].
|
||
|
||
In the current cross-realm operation, a client obtains a service
|
||
ticket for a remote principal in the following steps:
|
||
|
||
1) N TGSes to get cross-realm TGTs in order to traverse the
|
||
intermediate realms, where N is the number of transit, and
|
||
|
||
2) One TGS to get the final service ticket.
|
||
|
||
That is, the client needs to perform N + 1 transactions to obtain a
|
||
ticket for the remote service.
|
||
|
||
This document proposes a new cross-realm model, which consists of
|
||
"temporary inter-realm relationship generation mode" and "attorney
|
||
ticketing mode". The former is intended to reduce transit cost
|
||
itself, and the latter is to move the cost from clients to KDCs. The
|
||
document describes behavior of clients and KDCs, but does not specify
|
||
any wire format, which need to be specified separately.
|
||
|
||
Terms defined in section 1.7 of RFC 4120 are used throughout this
|
||
document.
|
||
|
||
|
||
2. Problems on Client Performance
|
||
|
||
In the current model of cross-realm operation, a client has to
|
||
transit all realms on the path to the destination realm. When the
|
||
source realm and the destination realm have a direct inter-realm
|
||
relationship, a client is able to obtain a service ticket with two
|
||
TGS transactions (one for a cross-realm TGT and another for the
|
||
service ticket). When the realms have a multi-hop relationship, a
|
||
client must transit the intermediate realms before it obtains the
|
||
service ticket. That is, the client's task increases in proportion
|
||
to the distance of the relationship.
|
||
|
||
Two issues can be observed here behind the client load, which are
|
||
described in the following subsections.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Kamada and Sakane [Page 3]
|
||
|
||
Internet-Draft Client-Friendly Cross-Realm July 2007
|
||
|
||
|
||
2.1. Long Authentication Path
|
||
|
||
When a client wants to get a service ticket for a remote realm, it
|
||
must transit to the remote realm by traversing the intermediate
|
||
realms on the authentication path to the remote realm. The result of
|
||
traversal is cached as a cross-realm TGT, but it is nothing more than
|
||
a per-client optimization. Thus all clients accessing a remote realm
|
||
must pay the cost separately, even if their resources are limited.
|
||
For a long authentication path, the cost of the whole system becomes
|
||
large.
|
||
|
||
2.2. Client-Centric Ticketing
|
||
|
||
In Kerberos, any service tickets or cross-realm TGTs are issued via
|
||
TGS, where a client present a ticket for the TGS and obtains a next
|
||
ticket. Currently, all TGS transactions are initiated by the client
|
||
and it needs to get all necessary cross-realm TGTs iteratively before
|
||
the final service ticket. This process is a burden to a resource-
|
||
limited client.
|
||
|
||
|
||
3. Proposal of Client-Friendly Cross-Realm Model
|
||
|
||
In this section, two modes of operation are introduced, "Temporary
|
||
Inter-Realm Relationship Generation Mode" and "Attorney Ticketing
|
||
Mode", to solve the issues described in the previous section. These
|
||
two modes are designed to be independent, that is, can be used
|
||
separately or in combination.
|
||
|
||
Temporary Inter-Realm Relationship Generation Mode solves the issue
|
||
of the long authentication path. In this mode, if the source realm
|
||
and the destination realm do not have a direct inter-realm
|
||
relationship, the source KDC traverses the authentication path by
|
||
itself, contacts with the remote KDC, and generates a direct inter-
|
||
realm relationship between them. After that, the source KDC can
|
||
issue direct inter-realm TGTs for the destination realm. The purpose
|
||
of this mode is to reduce the traversal cost itself by caching the
|
||
result of traversal.
|
||
|
||
Attorney Ticketing Mode solves the issue of the client-centric
|
||
ticketing. Consecutive TGS transactions to get cross-realm TGTs
|
||
and/or a final service ticket are initiated by a client in the
|
||
traditional Kerberos, whereas a KDC undertake that process in this
|
||
mode. The purpose of this mode is to shift the cost of TGSes from a
|
||
client to a KDC. This does not reduce the cost itself.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Kamada and Sakane [Page 4]
|
||
|
||
Internet-Draft Client-Friendly Cross-Realm July 2007
|
||
|
||
|
||
3.1. Temporary Inter-Realm Relationship Generation Mode
|
||
|
||
Temporary inter-realm relationship generation mode enables a KDC to
|
||
issue an inter-realm TGT directly to a remote KDC with which the KDC
|
||
doesn't preshare an inter-realm key. To issue an inter-realm TGT
|
||
directly, a temporary inter-realm key needs to be provided somehow.
|
||
To achieve that, the local KDC obtains a special ticket for the
|
||
remote KDC and uses its session key as an inter-realm key. This
|
||
methodology was introduced by PKCROSS [PKCROSS]. In this document,
|
||
that special ticket is called as an "inter-KDC ticket", and an inter-
|
||
realm TGT generated from an inter-KDC ticket is called as a "direct
|
||
inter-realm TGT".
|
||
|
||
How does the local KDC reach the remote KDC is out of scope of this
|
||
model, but we can easily come up with 1) traversing a long
|
||
authentication path if available or 2) using PKINIT. In the context
|
||
of this model, PKCROSS is interpreted as a combination of this mode
|
||
and PKINIT.
|
||
|
||
This document does not standardize a specific protocol, but an inter-
|
||
KDC ticket will have the following form:
|
||
|
||
- its sname has a special form (PKCROSS proposes
|
||
"pkcross/realm@REALM", but it would be better to use a more
|
||
general name than "pkcross"),
|
||
|
||
and a direct inter-realm TGT will have the following form:
|
||
|
||
- its TicketExtensions field [KRBEXT] contains the inter-KDC ticket,
|
||
and
|
||
|
||
- it is protected by the session key (or the sub-session key) of the
|
||
inter-KDC ticket.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Kamada and Sakane [Page 5]
|
||
|
||
Internet-Draft Client-Friendly Cross-Realm July 2007
|
||
|
||
|
||
client C KDC-L KDC-I KDC-R
|
||
-------- ----- ----- -----
|
||
|
||
1. --------TGS-REQ-------->
|
||
2. [Reach to KDC-R in any way.]
|
||
[Below is an example of PKCROSS.]
|
||
------------PKINIT------------>
|
||
<----------XTKT(L,R)-----------
|
||
3. <--TKT(C,R)w/XTKT(L,R)--
|
||
4. ----------------------TGS-REQ------------------------>
|
||
5. <---------------------TKT(C,S)------------------------
|
||
|
||
[Note: TKT(x,y) means a ticket whose cname is x and sname is y. ]
|
||
[ XTKT is an inter-KDC ticket. See PKCROSS. ]
|
||
[ The client C and KDC-L belong to the local realm L. ]
|
||
[ The KDC-I is a KDC of an intermediate realm I. ]
|
||
[ The KDC-R is a KDC of the remote realm R. ]
|
||
|
||
1. The client C sends a normal TGS-REQ to KDC-L, requesting
|
||
a cross-realm TGT to KDC-R.
|
||
2. KDC-L reaches KDC-R in any way and obtains a XTKT.
|
||
There is no standardized way to achieve this step yet.
|
||
PKCROSS is one candidate. We could also standardize a way
|
||
in which KDC-L normally transits to KDC-R and obtains an XTKT.
|
||
3. KDC-L generates a cross-realm TGT that is from C to KDC-R
|
||
and returns to it to C.
|
||
4. The same with the traditional cross-realm TGS.
|
||
5. The same with the traditional cross-realm TGS.
|
||
|
||
Figure 1: Message Flow of Temporary Inter-Realm Relationship
|
||
Generation
|
||
|
||
3.2. Attorney Ticketing Mode
|
||
|
||
Traditionally, a Kerberos client repeats TGS transactions until it
|
||
gets the final ticket. For example, it has a TGT for its own realm
|
||
and wants to get a ticket for a service in 3-hop neighbor realm, then
|
||
it will:
|
||
|
||
1) Present the TGT and get a cross-realm TGT for the next realm,
|
||
|
||
2) Present the 1st cross-realm TGT and get a cross-realm TGT for the
|
||
2nd next realm,
|
||
|
||
3) Present the 2nd cross-realm TGT and get a cross-realm TGT for the
|
||
final realm, and
|
||
|
||
|
||
|
||
|
||
|
||
Kamada and Sakane [Page 6]
|
||
|
||
Internet-Draft Client-Friendly Cross-Realm July 2007
|
||
|
||
|
||
4) Present the final cross-realm TGT and get a service ticket.
|
||
|
||
Attorney ticketing mode enables the client to delegate the KDC to
|
||
perform all transactions listed above on behalf of the client. An
|
||
example message flow is shown in Figure 2. The client entrust the
|
||
KDC with its TGT (step 1). The KDC "impersonates" the client and
|
||
performs all necessary TGS transactions (steps 2 to 4), and returns
|
||
the final ticket to the client (step 5).
|
||
|
||
client C KDC-L KDC-I KDC-R
|
||
-------- ----- ----- -----
|
||
|
||
1. --------TGS-REQ-------->
|
||
2. TKT(C,I)
|
||
3. ----TGS-REQ---->
|
||
<---TKT(C,R)----
|
||
4. ------------TGS-REQ----------->
|
||
<-----------TKT(C,S)-----------
|
||
5. <-------TKT(C,S)--------
|
||
|
||
1. The client C sends a special TGS-REQ, which indicates attorney
|
||
ticketing mode requesting a service ticket for a server S
|
||
instead of a cross-realm TGT, to KDC-L.
|
||
2. KDC-L internally generates a cross-realm TGT that is from C
|
||
to KDC-I, but does not return it to C.
|
||
3. KDC-L uses the generated cross-realm TGT by itself, and sends
|
||
a TGS-REQ to KDC-I, which requests a cross-realm TGT from C
|
||
to KDC-R.
|
||
4. KDC-L use the obtained cross-realm TGT by itself, and sends
|
||
a TGS-REQ to KDC-R, which requests a service ticket from C
|
||
to S.
|
||
5. KDC-L returns the final service ticket to C.
|
||
|
||
Figure 2: Message Flow of Attorney Ticketing Mode
|
||
|
||
3.3. Combination of the Two Modes
|
||
|
||
Figure 3 shows a typical message flow when the temporary inter-realm
|
||
relationship generation mode and the attorney ticketing mode are used
|
||
in combination. The figure shows the case of the initial contact, so
|
||
a transaction to obtain an inter-KDC ticket is shown (step 2), but it
|
||
is infrequently used because the XTKT is cached. Usually, only two
|
||
round-trips do all the work.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Kamada and Sakane [Page 7]
|
||
|
||
Internet-Draft Client-Friendly Cross-Realm July 2007
|
||
|
||
|
||
client C KDC-L KDC-I KDC-R
|
||
-------- ----- ----- -----
|
||
|
||
1. --------TGS-REQ-------->
|
||
2. [Temporary inter-realm relationship
|
||
generation mode runs here.]
|
||
------------PKINIT------------>
|
||
<----------XTKT(L,R)-----------
|
||
3. [Attorney ticketing mode runs here.]
|
||
TKT(C,R)w/XTKT(L,R)
|
||
4. ------------TGS-REQ----------->
|
||
<-----------TKT(C,S)-----------
|
||
5. <-------TKT(C,S)--------
|
||
|
||
Figure 3: Message Flow When Temporary Inter-Realm Relationship
|
||
Generation Mode and Attorney Ticketing Mode
|
||
Are Combined
|
||
|
||
|
||
4. Advantage of The Proposed Model for Deployment
|
||
|
||
4.1. Compatibility with Traditional Kerberos Deployment
|
||
|
||
Temporary inter-realm relationship generation involves only KDCs.
|
||
From the viewpoint of a client (and a server), it seems that there is
|
||
a direct inter-realm relationship between two realms. This means
|
||
that temporary inter-realm relationship generation mode needs to be
|
||
deployed only in KDCs. This property is advantageous, because it
|
||
does not affect large installed base of clients. One impeding factor
|
||
in practice is that some existing implementations cannot handle
|
||
ticket extensions transparently. This is further discussed in
|
||
Interoperability Considerations section.
|
||
|
||
Attorney ticketing mode involves only a client and its local KDC.
|
||
From the viewpoint of the remote KDC, TGS-REQs from a KDC as an
|
||
attorney cannot be distinguished from those from a "genuine" client
|
||
(except caddr; see Interoperability Considerations section).
|
||
Resulting service ticket is identical to the traditional one, so the
|
||
remote server has nothing to do with this mode. In short, attorney
|
||
ticketing mode can be deployed in local realm, independently of the
|
||
remote deployment. The merit of this property is large, because
|
||
remote realms are often in different administration.
|
||
|
||
4.2. Orthogonality of the Two Modes
|
||
|
||
Temporary inter-realm relationship generation mode and attorney
|
||
ticketing mode are independent concepts. Both can be implemented
|
||
separately or can be used in combination. When they are combined,
|
||
|
||
|
||
|
||
Kamada and Sakane [Page 8]
|
||
|
||
Internet-Draft Client-Friendly Cross-Realm July 2007
|
||
|
||
|
||
the load of clients are shifted to KDCs and additional load of KDCs
|
||
are minimized, thus efficient cross-realm environment is achieved.
|
||
|
||
|
||
5. Front-End Protocol for Attorney Ticketing Mode
|
||
|
||
This document does not specify wire-level protocol, which will be
|
||
done in another document. This section provides some candidates for
|
||
the protocol, which is used to request attorney ticketing mode from a
|
||
KDC (Figure 4). This protocol can be used for other than attorney
|
||
ticketing mode, as long as the KDC's behavior for clients is
|
||
identical to the mode.
|
||
|
||
+------+ +-------+
|
||
|client|------------>| KDC |-------------> cross-realm cloud
|
||
+------+ +-------+ Cross-realm
|
||
Front-end protocol traversal by KDC
|
||
to request a final (Attorney Ticketing Mode)
|
||
ticket in one shot
|
||
or
|
||
|
||
-------------> remote KDC (directly)
|
||
XTGSP
|
||
|
||
or
|
||
|
||
------------->
|
||
Whatever the KDC chooses
|
||
|
||
Figure 4: Front-End Protocol for Attorney Ticketing Mode
|
||
|
||
Candidate 1: Implicit Signaling
|
||
|
||
A client simply requests a final ticket to the local KDC. If the
|
||
KDC supports this implicit protocol, it will process the request.
|
||
If not, KDC_ERR_S_PRINCIPAL_UNKNOWN will be returned. A possible
|
||
drawback is that if a requested final ticket is for a TGS, the KDC
|
||
does not know whether the client expects normal mode or attorney
|
||
mode. In addition, implicit signaling can conflict with future
|
||
extensions.
|
||
|
||
Candidate 2: Explicit Signaling
|
||
|
||
A flag in KDCOptions or pre-authentication can be used to request
|
||
attorney mode.
|
||
[[what happens if not supported?]]
|
||
|
||
|
||
|
||
|
||
|
||
Kamada and Sakane [Page 9]
|
||
|
||
Internet-Draft Client-Friendly Cross-Realm July 2007
|
||
|
||
|
||
6. Related Protocols Currently Proposed
|
||
|
||
6.1. PKCROSS
|
||
|
||
PKCROSS will be usable as a protocol for temporary inter-realm
|
||
relationship generation mode.
|
||
|
||
6.2. XTGS
|
||
|
||
The purpose of XTGS protocol is similar to that of this model, but
|
||
the behavior is somewhat different [XTGS]. If XTGS is viewed from
|
||
the perspective of this model, it blends the two modes indivisibly to
|
||
reduce the number of messages between KDCs as far as possible at the
|
||
price of the abstraction of cross-realm TGTs and inter-KDC tickets.
|
||
|
||
Once a front-end (i.e., between a client and a KDC) protocol to
|
||
request attorney ticketing mode is standardized, XTGS can be used as
|
||
an opaque back-end.
|
||
|
||
|
||
7. Interoperability Considerations
|
||
|
||
User-to-user mode
|
||
The protocol for the attorney mode should be able to indicate
|
||
user-to-user authentication.
|
||
|
||
The addresses field in TGS-REQ
|
||
This field is copied into the caddr field in EncTicketPart, so if
|
||
this field is used in a TGS-REQ, the resulting ticket can be used
|
||
only from the specified addresses. When the local KDC receives a
|
||
TGS-REQ requesting attorney mode, it should copy the addresses
|
||
field only into the final TGS-REQ in the attorney process. It
|
||
must not copy the field into TGS-REQs to intermediate KDCs,
|
||
because resulting tickets are to be used by the local KDC instead
|
||
of the client.
|
||
|
||
Opacity of ticket extensions
|
||
The ticket extensions defined in rfc1510ter [KRBEXT] extends the
|
||
Ticket ASN.1 type, which is visible to clients. This is not a
|
||
problem if a client implementation treats a Ticket as an opaque
|
||
data, and there are such implementations, but unfortunately the
|
||
major free implementations do not. On the other hand, there is a
|
||
proposal of etype-based ticket extensions [TKTEXTALT]. It
|
||
encapsulates cleartext bits in the enc-part component of a Ticket.
|
||
It should not have any problems of opacity.
|
||
|
||
[[negotiation of various parameters]]
|
||
|
||
|
||
|
||
|
||
Kamada and Sakane [Page 10]
|
||
|
||
Internet-Draft Client-Friendly Cross-Realm July 2007
|
||
|
||
|
||
[[If there are multiple authentication paths and a client has enough
|
||
knowledge, it could choose which path to take. With attorney
|
||
ticketing mode, it cannot because it is up to the KDC to select the
|
||
path. Is this a problem? With temporary inter-realm relationship
|
||
generation mode, it can as before.]]
|
||
|
||
[[co-existence with the plain Kerberos; attorney ticketing mode
|
||
client vs. non-attorney KDC; inter-realm generating local KDC vs.
|
||
non-generating remote KDC]]
|
||
|
||
[[anything to do with referral?]]
|
||
|
||
[[when a KDC in attorney mode receives a KRB-ERROR?]]
|
||
|
||
|
||
8. Security Considerations
|
||
|
||
8.1. Denial of Service (DoS)
|
||
|
||
A KDC that implements attorney ticketing mode needs to initiate
|
||
multiple TGS-REQ upon a request from a client. This means that the
|
||
KDC will have some states in it and may suffer from DoS attacks.
|
||
|
||
Fortunately, attorney ticketing mode can be requested in TGS-REQ,
|
||
which is only available to authenticated clients, thus, any untrusted
|
||
party cannot exploit this statefulness.
|
||
|
||
8.2. Ticketing Policy
|
||
|
||
Attorney ticketing mode changes nothing about the messages sent to
|
||
the intermediate and remote KDCs. Those KDCs will not notice the
|
||
difference and their ticketing process have nothing to be changed.
|
||
|
||
Temporary inter-realm relationship generation mode dynamically
|
||
generates new authentication paths. This means that KDCs that are
|
||
involved in the transit of a client are different from those that
|
||
would be involved if this mode were not used.
|
||
|
||
- Parameters of cross-realm TGTs (lifetime and flags) for a new
|
||
relationship need to be dynamically transferred (a la PKCROSS).
|
||
|
||
- How to handle the transited fields in inter-KDC tickets, direct
|
||
inter-realm tickets, and service tickets?
|
||
|
||
- Where the remote KDC adds AuthorizationData and the end-server
|
||
checks it: there is no problem because it is a local matter of the
|
||
remote realm.
|
||
|
||
|
||
|
||
|
||
Kamada and Sakane [Page 11]
|
||
|
||
Internet-Draft Client-Friendly Cross-Realm July 2007
|
||
|
||
|
||
- Where an intermediate KDC adds AuthorizationData: traditionally it
|
||
is added in a cross-realm TGT and propagated to the service
|
||
ticket; now it will be propagated to the inter-KDC ticket. Should
|
||
AuthorizationData in an inter-KDC ticket be copied into a cross-
|
||
realm TGT or not? Even if it is copied, AuthorizationData on
|
||
inter-KDC ticket cannot represent per-client information, so if it
|
||
is necessary, temporary inter-realm relationship generation mode
|
||
must not be used.
|
||
|
||
|
||
9. IANA Considerations
|
||
|
||
This document has no actions for IANA.
|
||
|
||
|
||
10. Acknowledgments
|
||
|
||
The authors would like to acknowledge Saber Zrelli, Masahiro
|
||
Ishiyama, Atsushi Inoue, Kazunori Miyazawa, and Nobuo Okabe for
|
||
contributions to this document.
|
||
|
||
|
||
11. References
|
||
|
||
11.1. Normative References
|
||
|
||
[KRBEXT] Yu, T., "The Kerberos Network Authentication Service
|
||
(Version 5)", draft-ietf-krb-wg-rfc1510ter-04, Work in
|
||
Progress, March 2007.
|
||
|
||
[RFC4120] Neuman, C., Yu, T., Hartman, S., and K. Raeburn, "The
|
||
Kerberos Network Authentication Service (V5)", RFC
|
||
4120, July 2005.
|
||
|
||
11.2. Informative References
|
||
|
||
[CRPS] Sakane, S., Zrelli, S., M. Ishiyama, "Problem statement
|
||
on the cross-realm operation of Kerberos in a specific
|
||
system", draft-sakane-krb-cross-problem-statement-02,
|
||
Work in Progress, April 2007.
|
||
|
||
[PKCROSS] Hur, M. et al., "Public Key Cryptography for Cross-
|
||
Realm Authentication in Kerberos", draft-ietf-cat-
|
||
kerberos-pk-cross-08 (expired), Work in Progress,
|
||
November 2001.
|
||
|
||
[TKTEXTALT] Message-ID: <tslfy54akcb.fsf@mit.edu>.
|
||
|
||
|
||
|
||
|
||
Kamada and Sakane [Page 12]
|
||
|
||
Internet-Draft Client-Friendly Cross-Realm July 2007
|
||
|
||
|
||
[XTGS] Zrelli, S. et al., "XTGSP, the Inter-TGS protocol for
|
||
cross-realm operations in Kerberos", draft-zrelli-krb-
|
||
xtgsp-01, Work in Progress, March 2007.
|
||
|
||
Authors' Addresses
|
||
|
||
Ken'ichi Kamada
|
||
Shoichi Sakane
|
||
Yokogawa Electric Corporation
|
||
2-9-32 Nakacho, Musashino-shi,
|
||
Tokyo 180-8750 Japan
|
||
E-mail: Ken-ichi.Kamada@jp.yokogawa.com,
|
||
Shouichi.Sakane@jp.yokogawa.com
|
||
|
||
|
||
Full Copyright Statement
|
||
|
||
Copyright (C) The IETF Trust (2007).
|
||
|
||
This document is subject to the rights, licenses and restrictions
|
||
contained in BCP 78, and except as set forth therein, the authors
|
||
retain all their rights.
|
||
|
||
This document and the information contained herein are provided on an
|
||
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
|
||
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
|
||
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
|
||
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
|
||
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
|
||
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
||
|
||
Intellectual Property Statement
|
||
|
||
The IETF takes no position regarding the validity or scope of any
|
||
Intellectual Property Rights or other rights that might be claimed to
|
||
pertain to the implementation or use of the technology described in
|
||
this document or the extent to which any license under such rights
|
||
might or might not be available; nor does it represent that it has
|
||
made any independent effort to identify any such rights. Information
|
||
on the procedures with respect to rights in RFC documents can be
|
||
found in BCP 78 and BCP 79.
|
||
|
||
Copies of IPR disclosures made to the IETF Secretariat and any
|
||
assurances of licenses to be made available, or the result of an
|
||
attempt made to obtain a general license or permission for the use of
|
||
such proprietary rights by implementers or users of this
|
||
specification can be obtained from the IETF on-line IPR repository at
|
||
http://www.ietf.org/ipr.
|
||
|
||
|
||
|
||
Kamada and Sakane [Page 13]
|
||
|
||
Internet-Draft Client-Friendly Cross-Realm July 2007
|
||
|
||
|
||
The IETF invites any interested party to bring to its attention any
|
||
copyrights, patents or patent applications, or other proprietary
|
||
rights that may cover technology that may be required to implement
|
||
this standard. Please address the information to the IETF at ietf-
|
||
ipr@ietf.org.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Kamada and Sakane [Page 14]
|
||
|