
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@14343 ec53bebd-3082-4978-b11e-865c3cabbd6b
1121 lines
38 KiB
Plaintext
1121 lines
38 KiB
Plaintext
|
||
|
||
Network Working Group S. Josefsson
|
||
Internet-Draft February 2, 2003
|
||
Expires: August 3, 2003
|
||
|
||
|
||
A Kerberos 5 SASL Mechanism
|
||
draft-josefsson-sasl-kerberos5-01
|
||
|
||
Status of this Memo
|
||
|
||
This document is an Internet-Draft and is in full conformance with
|
||
all provisions of Section 10 of RFC2026.
|
||
|
||
Internet-Drafts are working documents of the Internet Engineering
|
||
Task Force (IETF), its areas, and its working groups. Note that
|
||
other groups may also distribute working documents as
|
||
Internet-Drafts.
|
||
|
||
Internet-Drafts are draft documents valid for a maximum of six months
|
||
and may be updated, replaced, or obsoleted by other documents at any
|
||
time. It is inappropriate to use Internet-Drafts as reference
|
||
material or to cite them other than as "work in progress."
|
||
|
||
The list of current Internet-Drafts can be accessed at http://
|
||
www.ietf.org/ietf/1id-abstracts.txt.
|
||
|
||
The list of Internet-Draft Shadow Directories can be accessed at
|
||
http://www.ietf.org/shadow.html.
|
||
|
||
This Internet-Draft will expire on August 3, 2003.
|
||
|
||
Copyright Notice
|
||
|
||
Copyright (C) The Internet Society (2003). All Rights Reserved.
|
||
|
||
Abstract
|
||
|
||
This document specifies a Simple Authentication and Security Layer
|
||
(SASL) [3] mechanism for Kerberos 5 Client/Server Authentication [1],
|
||
with optional initial Authentication Service (AS) and/or
|
||
Ticket-Granting-Service (TGS) exchanges.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Josefsson Expires August 3, 2003 [Page 1]
|
||
|
||
Internet-Draft A Kerberos 5 SASL Mechanism February 2003
|
||
|
||
|
||
Table of Contents
|
||
|
||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
|
||
2. Document Changes . . . . . . . . . . . . . . . . . . . . . . . 3
|
||
3. Kerberos Version 5 Mechanism . . . . . . . . . . . . . . . . . 3
|
||
4. Theory Of Operation . . . . . . . . . . . . . . . . . . . . . 6
|
||
4.1 Infrastructure Mode . . . . . . . . . . . . . . . . . . . . . 6
|
||
4.2 Proxied Infrastructure Mode . . . . . . . . . . . . . . . . . 6
|
||
4.3 Non-Infrastructure Mode . . . . . . . . . . . . . . . . . . . 7
|
||
5. Example . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
|
||
6. Security Considerations . . . . . . . . . . . . . . . . . . . 16
|
||
Normative References . . . . . . . . . . . . . . . . . . . . . 17
|
||
Informative References . . . . . . . . . . . . . . . . . . . . 17
|
||
Author's Address . . . . . . . . . . . . . . . . . . . . . . . 18
|
||
Intellectual Property and Copyright Statements . . . . . . . . 19
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Josefsson Expires August 3, 2003 [Page 2]
|
||
|
||
Internet-Draft A Kerberos 5 SASL Mechanism February 2003
|
||
|
||
|
||
1. Introduction
|
||
|
||
Kerberos 5 provides client and optional server authentication,
|
||
usually employing symmetric encryption and a trusted (symmetric) key
|
||
distribution center. Specifying Kerberos 5 authentication for each
|
||
network protocol where there is a need to use Kerberos 5 is a tedious
|
||
task. However, as many protocols already specify support for the
|
||
SASL framework, by specifying a Kerberos 5 SASL mechanism, support
|
||
for Kerberos 5 in many protocols is accomplished. Even for protocols
|
||
that do not support SASL, specifying SASL support (and thereby
|
||
implicitly Kerberos 5) is often advantageous over specifying Kerberos
|
||
5 support directly. The advantages include better flexibility if or
|
||
when new Kerberos versions are released, and perhaps more commonly,
|
||
when circumstances demand that other authentication methods
|
||
(supported by SASL) should be used.
|
||
|
||
It should be mentioned that Kerberos 5 authentication via SASL is
|
||
already possible, by using the Generic Security Service Application
|
||
Program Interface [6] framework. However, GSSAPI adds some amount of
|
||
overhead, both in terms of code complexity, code size and additional
|
||
network round trips. More importantly, GSSAPI do not support the
|
||
authentication steps (AS and TGS). These are some of the motivation
|
||
behind this "slimmer" Kerberos 5 SASL mechanism.
|
||
|
||
2. Document Changes
|
||
|
||
Modification since -00:
|
||
|
||
* The way data is encoded in the
|
||
AP-REQ.Authenticator.authorization-data field is corrected and
|
||
elaborated.
|
||
|
||
* The incorrect sentence about including application data in the
|
||
AP-REP is removed.
|
||
|
||
* The "Theory of operation" section now includes three modes;
|
||
Infrastructure, Proxied Infrastructure, and Non-Infrastructure
|
||
modes.
|
||
|
||
* The example section now contains a complete dump from an
|
||
implementation.
|
||
|
||
|
||
3. Kerberos Version 5 Mechanism
|
||
|
||
The mechanism name associated with Kerberos version 5 is
|
||
"KERBEROS_V5". The exchange consists of one initial server packet
|
||
(containing some parameters and a challenge, described below), and
|
||
|
||
|
||
|
||
Josefsson Expires August 3, 2003 [Page 3]
|
||
|
||
Internet-Draft A Kerberos 5 SASL Mechanism February 2003
|
||
|
||
|
||
then an unfixed number of messages containing Kerberos 5 packets,
|
||
with the last exchange being an AP-REQ, and optional AP-REP, for the
|
||
desired SASL service on a format described below.
|
||
|
||
The normal packet exchange, after the required initial server packet,
|
||
are one optional AS-REQ and AS-REP exchange, one optional TGS-REQ and
|
||
TGS-REP exchange and then the AP-REQ packet and optional AP-REP
|
||
reply. The only steps that are required by this SASL mechanism is
|
||
the initial server packet and the final AP-REQ and optional AP-REP
|
||
exchange. The AP-REP is sent when and only when mutual
|
||
authentication is required. The AP-REQ is for the SASL service that
|
||
is requested. The AP-REQ must contain authenticated application data
|
||
on a format described below. The AS and TGS exchanges is usually
|
||
used by clients to acquire the proper tickets required for the AP
|
||
phase. It is not expected that any other Kerberos 5 packets will be
|
||
exchanged, but this mechanism do not disallow such packets in order
|
||
to make it possible to use this SASL mechanism with future Kerberos
|
||
extensions.
|
||
|
||
As discussed above, the client is allowed to send any valid Kerberos
|
||
5 message and the server should handle any message, subject to local
|
||
policy restrictions. If the server do not understand the meaning of
|
||
a packet or do not wish to respond to it (e.g., it cannot proxy a
|
||
TGS-REQ), it SHOULD respond with a empty response and await further
|
||
packets. Reasons for aborting the authentication phase instead of
|
||
sending an empty response includes if the number of received packets
|
||
exceeds a pre-defined limit. AS-REQ and TGS-REQ packets destined for
|
||
non-local Kerberos Key Distribution Centers (KDCs) is proxied to the
|
||
correct server by the SASL server. No provisions are made in the
|
||
protocol to allow the client to specify the addresses of the KDCs,
|
||
instead the SASL server is required to discover this information
|
||
(usually by static configuration or by using DNS). It is legitimate
|
||
for the SASL server to abort the authentication phase with an error
|
||
saying that the indicated realm was not found or is restricted by
|
||
policy (i.e., a policy that only permits local KDC requests is
|
||
permitted).
|
||
|
||
Since it is expected that clients may not yet have IP addresses when
|
||
they invoke this SASL mechanism (invoking this mechanism may be one
|
||
step in acquiring an IP address), clients commonly leave the address
|
||
fields in the AS-REQ empty.
|
||
|
||
The initial server packet should contain one octet containing a bit
|
||
mask of supported security layers, four octets indicating the maximum
|
||
cipher-text buffer size the server is able to receive (or 0 if no
|
||
security layers are supported) in network byte order, and then 16
|
||
octets containing random data (see [4] on how random data might be
|
||
generated).
|
||
|
||
|
||
|
||
Josefsson Expires August 3, 2003 [Page 4]
|
||
|
||
Internet-Draft A Kerberos 5 SASL Mechanism February 2003
|
||
|
||
|
||
The last exchange must be an AP-REQ for the desired SASL service,
|
||
optionally followed by an AP-REP. The SASL service is translated
|
||
into a Kerberos principal and realm as follows: The first element of
|
||
the principal is the service name specified in the protocol that uses
|
||
SASL. The second element is the address of the SASL server, usually
|
||
expressed as a hostname. The SASL realm should be the Kerberos realm
|
||
of the server. The checksum value in the "cksum" field in the
|
||
Authenticator in the AP-REQ is computed on a string where the first
|
||
octet indicate the desired security layer requested by the client (a
|
||
bitmask with one bit set, which must also be set in the security
|
||
layer bitmask offered by the server), the next four octets indicate
|
||
the maximum cipher-text buffer size the client is able to receive in
|
||
network byte order (or 0 if a security layer is not indicated by the
|
||
first octet), followed by the entire initial server packet, in turn
|
||
followed by the desired authorization identity (which can be empty to
|
||
indicate that the authorization identity should be the same as the
|
||
authentication identity in the Kerberos ticket stored in the AP-REQ).
|
||
This same string is also to be included in the authorization-data
|
||
field of the Authenticator, with an ad-type of -1.
|
||
|
||
Upon decrypting and verifying the ticket and authenticator (i.e.,
|
||
standard AP-REQ processing), the server extracts the
|
||
authorization-data value from the Authenticator and checks that the
|
||
checksum in the authenticator is correct. It then proceeds to check
|
||
that the server security layer bit mask, server maximum cipher-text
|
||
buffer size, and the random data equals the data provided in the
|
||
initial server challenge. The server verify that the client selected
|
||
a security layer that was offered, and that the client maximum buffer
|
||
is 0 if no security layer was chosen. The server must also verify
|
||
that the principal identified in the Kerberos ticket is authorized to
|
||
connect to the service as the authorization identity specified by the
|
||
client (or, if absent, the username denoted by the ticket principal).
|
||
Unless the client requested mutual authentication, the authentication
|
||
process is complete.
|
||
|
||
If the client requested mutual authentication, the server constructs
|
||
an AP-REP according to Kerberos 5.
|
||
|
||
The security layers and their corresponding bit-masks are as follows:
|
||
|
||
Bit 0 No security layer
|
||
Bit 1 Integrity (KRB-SAFE) protection
|
||
Bit 2 Privacy (KRB-PRIV) protection
|
||
Bit 3 Mutual authentication is required (AP option MUTUAL-
|
||
REQUIRED must also be present).
|
||
|
||
Other bit-masks may be defined in the future; bits which are not
|
||
understood must be negotiated off.
|
||
|
||
|
||
|
||
Josefsson Expires August 3, 2003 [Page 5]
|
||
|
||
Internet-Draft A Kerberos 5 SASL Mechanism February 2003
|
||
|
||
|
||
4. Theory Of Operation
|
||
|
||
This section describes, for illustration only, three common scenarios
|
||
where this mechanism can be used.
|
||
|
||
4.1 Infrastructure Mode
|
||
|
||
Normally a SASL server is an application server such as a mail
|
||
system. The server is configured to belong to at least one Kerberos
|
||
5 realm, and the server shares a symmetric key with the Kerberos 5
|
||
Key Distribution Center in that realm. The server cannot perform the
|
||
initial Kerberos AS and TGS operation itself, but a KDC is needed for
|
||
that operation. Once the user acquired credentials the server is
|
||
able to carry out the AP-REQ/AP-REP phase using its symmetric key.
|
||
The steps are as follows:
|
||
|
||
0) Server sends initial token.
|
||
|
||
* Client acquires a ticket for the server using an out-of-band request
|
||
to the KDC. Client generates the AP-REQ using the ticket for the
|
||
server.
|
||
|
||
1) Client sends AP-REQ to the server.
|
||
|
||
* Server parses AP-REQ, and if required the AP-REP is generated.
|
||
|
||
2) [Optional] Server sends AP-REP to the client.
|
||
|
||
* [Optional] Client parses AP-REP.
|
||
|
||
As can be seen, round-trip wise this is optimal, possibly bar the
|
||
initial token, although in IMAP it does not cause an additional
|
||
round-trip, and other protocols may be similar.
|
||
|
||
4.2 Proxied Infrastructure Mode
|
||
|
||
If the client for some reason cannot carry out the communication with
|
||
the KDC itself, or for some other reason the server is in a better
|
||
position than the client to communicate with the KDC, the server can
|
||
proxy that part of the exchange via the server using the SASL
|
||
framework. The server effectively acts as a proxy. Note that the
|
||
packets that are sent are identical to those in the first example,
|
||
they are only routed differently. The steps are as follows:
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Josefsson Expires August 3, 2003 [Page 6]
|
||
|
||
Internet-Draft A Kerberos 5 SASL Mechanism February 2003
|
||
|
||
|
||
0) Server sends initial token.
|
||
|
||
* Client constructs AS-REQ using username and realm supplied by user,
|
||
in order to acquire a ticket granting ticket.
|
||
|
||
1) Client sends AS-REQ to server.
|
||
|
||
* Server finds address of KDC and forwards the AS-REQ to and waits for
|
||
the AS-REP response from the KDC.
|
||
|
||
2) Server sends AS-REP to client.
|
||
|
||
* Client parses AS-REP and constructs a TGS-REQ using the ticket
|
||
granting ticket encryption key, in order to acquire a ticket for the
|
||
server.
|
||
|
||
3) Client sends TGS-REQ to server.
|
||
|
||
* Server finds address of KDC and forwards the TGS-REQ to and waits
|
||
for the TGS-REP response from the KDC.
|
||
|
||
4) Server sends TGS-REP to client.
|
||
|
||
* Client parses TGS-REP and generates the AP-REQ using the session
|
||
encryption key.
|
||
|
||
5) Client sends AP-REQ to server.
|
||
|
||
* Server parses AP-REQ and if required the AP-REP is generated.
|
||
|
||
6) [Optional] Server sends AP-REP.
|
||
|
||
* [Optional] Client parses AP-REP.
|
||
|
||
If efficiency as a concern, and the client have no other use of a
|
||
ticket granting ticket for the realm, step 3 and 4 can be skipped by
|
||
asking for a ticket for the server directly in the AS-REQ.
|
||
|
||
Note that the client in subsequent connections may try to re-use the
|
||
ticket negotiated if it is still valid.
|
||
|
||
4.3 Non-Infrastructure Mode
|
||
|
||
Kerberos 5 is usually a distributed security system, but we wish to
|
||
point out that this Kerberos 5 SASL mechanism may be used in a
|
||
standalone SASL server to provide the security advantages that the
|
||
Kerberos 5 Authentication Service (AS) provides over other methods.
|
||
|
||
|
||
|
||
|
||
Josefsson Expires August 3, 2003 [Page 7]
|
||
|
||
Internet-Draft A Kerberos 5 SASL Mechanism February 2003
|
||
|
||
|
||
Specifically, the SASL server may use a legacy password database such
|
||
as a CRAM-MD5 clear text password file to generate Kerberos 5
|
||
principals "on the fly". Authentication may thus proceed as follows:
|
||
|
||
0) Server sends initial token.
|
||
|
||
* Client constructs AS-REQ using username supplied by user, in order
|
||
to acquire a ticket for the server directly. The realm can be
|
||
predetermined by administrators, or simply the hostname of the
|
||
server.
|
||
|
||
1) Client sends AS-REQ to server.
|
||
|
||
* Server parses AS-REQ and generates AS-REP based on password in
|
||
database. The AS-REQ embeds a ticket for the server.
|
||
|
||
2) Server sends AS-REP to client.
|
||
|
||
* Client parses AS-REP and extracts the ticket and generates an AP-REQ
|
||
using the session encryption key.
|
||
|
||
3) Client sends AP-REQ to server.
|
||
|
||
* Server parses AP-REQ and if required, generates the AP-REP.
|
||
|
||
4) [Optional] Server sends AP-REP to client.
|
||
|
||
* [Optional] Client parses AP-REP.
|
||
|
||
This may be extended further, i.e. by using the password and
|
||
Kerberos 5 pre-authentication in step 1.
|
||
|
||
Note that the client in subsequent connections may try to re-use the
|
||
ticket negotiated if it is still valid.
|
||
|
||
5. Example
|
||
|
||
The following is one Kerberos version 5 login scenario for the IMAP4
|
||
protocol, in the non-infrastructure mode. Note that the line breaks
|
||
are for editorial clarity.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Josefsson Expires August 3, 2003 [Page 8]
|
||
|
||
Internet-Draft A Kerberos 5 SASL Mechanism February 2003
|
||
|
||
|
||
S: * OK IMAP4rev1 server
|
||
C: . AUTHENTICATE KERBEROS_V5
|
||
S: + CQAAAADp6+ONC2vcprRbmH2J95Gh
|
||
C: an4wfKEDAgEFogMCAQqkcDBuoAcDBQAAAAAAoRAwDqADAgEAoQcwBRsDamFzog
|
||
sbCWxvY2FsaG9zdKMcMBqgAwIBAKETMBEbBGltYXAbCWxvY2FsaG9zdKURGA8y
|
||
MDAzMDIwMjE2NDE0M1qnBgIEVAbYn6gLMAkCARECARACAQM=
|
||
S: + a4IBzDCCAcigAwIBBaEDAgELowsbCWxvY2FsaG9zdKQQMA6gAwIBAKEHMAUb
|
||
A2phc6WB5GGB4TCB3qADAgEFoQsbCWxvY2FsaG9zdKIcMBqgAwIBAaETMBEbBG
|
||
ltYXAbCWxvY2FsaG9zdKOBqzCBqKADAgESooGgBIGdeBv2/NG1EgTMMMcHaVY3
|
||
f2w6y+bA56cVP8Toh+A3XFvTw8JFqAJVFGDm3MBrrSFOYcN8/8WY8T1cm0jq68
|
||
TcsiMh8y9KbWyeLJZedCVLLIfP1JgsSbBkZ7NLBFYCEEKvoGz2lMAuyJSh4+zT
|
||
L/NbcoIJq2ynCS965JKWWXl4rcBZPKBn5YUoU71dRK4/+HFrBoHejr6UHwVKd/
|
||
y0TaaBtTCBsqADAgERooGqBIGnYP7dngXFL2/hUWEs5PxGwlmvpWzGHWyh2QJ7
|
||
52eFj1tUpU3qT1NGgfVq2BVVWGDSVTO1vgDrkKCSDQwzkrqfwoZh4t6tt5tAPn
|
||
MCx2VDGyOu4Uv4PUsw4+uEevqkQRczpCsZT+y7pX7CxWHtytT3vLXNA6sANGnu
|
||
O7v7gTO+MGxzNvhVgMlujT2dkVgvCviVgJNuVef1VLVJWYM/zc4tuPaPaWToZJ
|
||
c=
|
||
C: boIBvjCCAbqgAwIBBaEDAgEOogcDBQAEAAAAo4HkYYHhMIHeoAMCAQWhCxsJbG
|
||
9jYWxob3N0ohwwGqADAgEBoRMwERsEaW1hcBsJbG9jYWxob3N0o4GrMIGooAMC
|
||
ARKigaAEgZ14G/b80bUSBMwwxwdpVjd/bDrL5sDnpxU/xOiH4DdcW9PDwkWoAl
|
||
UUYObcwGutIU5hw3z/xZjxPVybSOrrxNyyIyHzL0ptbJ4sll50JUssh8/UmCxJ
|
||
sGRns0sEVgIQQq+gbPaUwC7IlKHj7NMv81tyggmrbKcJL3rkkpZZeXitwFk8oG
|
||
flhShTvV1Erj/4cWsGgd6OvpQfBUp3/LRNpIG9MIG6oAMCARGhAwIBAaKBrQSB
|
||
qjE+doGGFMaz8g+nKl45qG5BPxzql0jXI5YMS+JqDeNBJIKasB0v9wMzXP9t8L
|
||
62PLsanqpow5bxAUtl/Dc8hqvc0cB+cC1P8RTgb0upMqzxTristf7goWRhQgTJ
|
||
OOwKJp/ZftZOkSdTHBQZL8StYuYe/6RkKkgnkUMK10VSec/YamG+5s37GvoRPG
|
||
Hu126PTyjXs3EziFqf6HT9Da/NJnDClFL8+nnlVFVt
|
||
S: + b2IwYKADAgEFoQMCAQ+iVDBSoAMCARGhAwIBAKJGBESTDM1z2PF5cUYOBmOW
|
||
IouXfHWtQzYzj1JFsJMV/CHMTmBrJavImHjR24f9WyCNOvmJMAWeHHOV9Jtpj6
|
||
rFt/ytas4U0g==
|
||
C:
|
||
S: . OK AUTHENTICATE KERBEROS_V5 authentication successful
|
||
|
||
The service requested is "imap/localhost" in the realm "localhost".
|
||
The password used was "foo", yielding an aes256-cts-hmac-sha1-96
|
||
encryption key of
|
||
0x6aefbaf05423cbc0fb44a41cc221783d7f52b764cca41fe2a05ad6d3bc7a67ea.
|
||
|
||
The first packet specify that mutual authentication and no integrity
|
||
or privacy layer (hence a zero maximum buffer size) and some random
|
||
data.
|
||
|
||
The second packet contains the AS-REQ, expanded as follows:
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Josefsson Expires August 3, 2003 [Page 9]
|
||
|
||
Internet-Draft A Kerberos 5 SASL Mechanism February 2003
|
||
|
||
|
||
name:KDC-REQ type:SEQUENCE
|
||
name:pvno type:INTEGER value:0x05
|
||
name:msg-type type:INTEGER value:0x0a
|
||
name:req-body type:SEQUENCE
|
||
name:kdc-options type:BIT_STR value(32):00000000
|
||
name:cname type:SEQUENCE
|
||
name:name-type type:INTEGER value:0x00
|
||
name:name-string type:SEQ_OF
|
||
name:NULL type:GENERALSTRING
|
||
name:?1 type:GENERALSTRING value:6a6173
|
||
name:realm type:GENERALSTRING value:6c6f63616c686f7374
|
||
name:sname type:SEQUENCE
|
||
name:name-type type:INTEGER value:0x00
|
||
name:name-string type:SEQ_OF
|
||
name:NULL type:GENERALSTRING
|
||
name:?1 type:GENERALSTRING value:696d6170
|
||
name:?2 type:GENERALSTRING value:6c6f63616c686f7374
|
||
name:till type:TIME value:20030202164143Z
|
||
name:nonce type:INTEGER value:0x5406d89f
|
||
name:etype type:SEQ_OF
|
||
name:NULL type:INTEGER
|
||
name:?1 type:INTEGER value:0x11
|
||
name:?2 type:INTEGER value:0x10
|
||
name:?3 type:INTEGER value:0x03
|
||
-----BEGIN SHISHI KDC-REQ-----
|
||
an4wfKEDAgEFogMCAQqkcDBuoAcDBQAAAAAAoRAwDqADAgEAoQcwBRsDamFzogsb
|
||
CWxvY2FsaG9zdKMcMBqgAwIBAKETMBEbBGltYXAbCWxvY2FsaG9zdKURGA8yMDAz
|
||
MDIwMjE2NDE0M1qnBgIEVAbYn6gLMAkCARECARACAQM=
|
||
-----END SHISHI KDC-REQ-----
|
||
|
||
The third packet contains the AS-REP, expanded as follows:
|
||
|
||
name:KDC-REP type:SEQUENCE
|
||
name:pvno type:INTEGER value:0x05
|
||
name:msg-type type:INTEGER value:0x0b
|
||
name:crealm type:GENERALSTRING value:6c6f63616c686f7374
|
||
name:cname type:SEQUENCE
|
||
name:name-type type:INTEGER value:0x00
|
||
name:name-string type:SEQ_OF
|
||
name:NULL type:GENERALSTRING
|
||
name:?1 type:GENERALSTRING value:6a6173
|
||
name:ticket type:SEQUENCE
|
||
name:tkt-vno type:INTEGER value:0x05
|
||
name:realm type:GENERALSTRING value:6c6f63616c686f7374
|
||
name:sname type:SEQUENCE
|
||
name:name-type type:INTEGER value:0x01
|
||
name:name-string type:SEQ_OF
|
||
name:NULL type:GENERALSTRING
|
||
|
||
|
||
|
||
Josefsson Expires August 3, 2003 [Page 10]
|
||
|
||
Internet-Draft A Kerberos 5 SASL Mechanism February 2003
|
||
|
||
|
||
name:?1 type:GENERALSTRING value:696d6170
|
||
name:?2 type:GENERALSTRING value:6c6f63616c686f7374
|
||
name:enc-part type:SEQUENCE
|
||
name:etype type:INTEGER value:0x12
|
||
name:cipher type:OCT_STR value:781bf6fcd1b51204cc30c7076956377
|
||
f6c3acbe6c0e7a7153fc4e887e0375c5bd3c3c245a802551460e6dcc06bad214
|
||
e61c37cffc598f13d5c9b48eaebc4dcb22321f32f4a6d6c9e2c965e74254b2c8
|
||
7cfd4982c49b06467b34b0456021042afa06cf694c02ec894a1e3ecd32ff35b7
|
||
28209ab6ca7092f7ae49296597978adc0593ca067e5852853bd5d44ae3ff8716
|
||
b0681de8ebe941f054a77fcb44d
|
||
name:enc-part type:SEQUENCE
|
||
name:etype type:INTEGER value:0x11
|
||
name:cipher type:OCT_STR value:60fedd9e05c52f6fe151612ce4fc46c25
|
||
9afa56cc61d6ca1d9027be767858f5b54a54dea4f534681f56ad815555860d2553
|
||
3b5be00eb90a0920d0c3392ba9fc28661e2deadb79b403e7302c765431b23aee14
|
||
bf83d4b30e3eb847afaa4411733a42b194fecbba57ec2c561edcad4f7bcb5cd03a
|
||
b003469ee3bbbfb8133be306c7336f85580c96e8d3d9d91582f0af89580936e55e
|
||
7f554b54959833fcdce2db8f68f6964e86497
|
||
-----BEGIN SHISHI KDC-REP-----
|
||
a4IBzDCCAcigAwIBBaEDAgELowsbCWxvY2FsaG9zdKQQMA6gAwIBAKEHMAUbA2ph
|
||
c6WB5GGB4TCB3qADAgEFoQsbCWxvY2FsaG9zdKIcMBqgAwIBAaETMBEbBGltYXAb
|
||
CWxvY2FsaG9zdKOBqzCBqKADAgESooGgBIGdeBv2/NG1EgTMMMcHaVY3f2w6y+bA
|
||
56cVP8Toh+A3XFvTw8JFqAJVFGDm3MBrrSFOYcN8/8WY8T1cm0jq68TcsiMh8y9K
|
||
bWyeLJZedCVLLIfP1JgsSbBkZ7NLBFYCEEKvoGz2lMAuyJSh4+zTL/NbcoIJq2yn
|
||
CS965JKWWXl4rcBZPKBn5YUoU71dRK4/+HFrBoHejr6UHwVKd/y0TaaBtTCBsqAD
|
||
AgERooGqBIGnYP7dngXFL2/hUWEs5PxGwlmvpWzGHWyh2QJ752eFj1tUpU3qT1NG
|
||
gfVq2BVVWGDSVTO1vgDrkKCSDQwzkrqfwoZh4t6tt5tAPnMCx2VDGyOu4Uv4PUsw
|
||
4+uEevqkQRczpCsZT+y7pX7CxWHtytT3vLXNA6sANGnuO7v7gTO+MGxzNvhVgMlu
|
||
jT2dkVgvCviVgJNuVef1VLVJWYM/zc4tuPaPaWToZJc=
|
||
-----END SHISHI KDC-REP-----
|
||
|
||
After extracting the AS-REP, the EncASRepPart and Ticket are as
|
||
follows:
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Josefsson Expires August 3, 2003 [Page 11]
|
||
|
||
Internet-Draft A Kerberos 5 SASL Mechanism February 2003
|
||
|
||
|
||
name:EncKDCRepPart type:SEQUENCE
|
||
name:key type:SEQUENCE
|
||
name:keytype type:INTEGER value:0x11
|
||
name:keyvalue type:OCT_STR value:517fe065071c845c425b5b18c4236618
|
||
name:last-req type:SEQ_OF
|
||
name:NULL type:SEQUENCE
|
||
name:lr-type type:INTEGER
|
||
name:lr-value type:TIME
|
||
name:nonce type:INTEGER value:0x5406d89f
|
||
name:flags type:BIT_STR value(3):20
|
||
name:authtime type:TIME value:20030202162503Z
|
||
name:endtime type:TIME value:20030202164143Z
|
||
name:srealm type:GENERALSTRING value:6c6f63616c686f7374
|
||
name:sname type:SEQUENCE
|
||
name:name-type type:INTEGER value:0x01
|
||
name:name-string type:SEQ_OF
|
||
name:NULL type:GENERALSTRING
|
||
name:?1 type:GENERALSTRING value:696d6170
|
||
name:?2 type:GENERALSTRING value:6c6f63616c686f7374
|
||
-----BEGIN SHISHI EncKDCRepPart-----
|
||
MIGAoBswGaADAgERoRIEEFF/4GUHHIRcQltbGMQjZhihAjAAogYCBFQG2J+kBAMC
|
||
BSClERgPMjAwMzAyMDIxNjI1MDNapxEYDzIwMDMwMjAyMTY0MTQzWqkLGwlsb2Nh
|
||
bGhvc3SqHDAaoAMCAQGhEzARGwRpbWFwGwlsb2NhbGhvc3Q=
|
||
-----END SHISHI EncKDCRepPart-----
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Josefsson Expires August 3, 2003 [Page 12]
|
||
|
||
Internet-Draft A Kerberos 5 SASL Mechanism February 2003
|
||
|
||
|
||
name:Ticket type:SEQUENCE
|
||
name:tkt-vno type:INTEGER value:0x05
|
||
name:realm type:GENERALSTRING value:6c6f63616c686f7374
|
||
name:sname type:SEQUENCE
|
||
name:name-type type:INTEGER value:0x01
|
||
name:name-string type:SEQ_OF
|
||
name:NULL type:GENERALSTRING
|
||
name:?1 type:GENERALSTRING value:696d6170
|
||
name:?2 type:GENERALSTRING value:6c6f63616c686f7374
|
||
name:enc-part type:SEQUENCE
|
||
name:etype type:INTEGER value:0x12
|
||
name:cipher type:OCT_STR value:781bf6fcd1b51204cc30c7076956377f6
|
||
c3acbe6c0e7a7153fc4e887e0375c5bd3c3c245a802551460e6dcc06bad214e61c
|
||
37cffc598f13d5c9b48eaebc4dcb22321f32f4a6d6c9e2c965e74254b2c87cfd49
|
||
82c49b06467b34b0456021042afa06cf694c02ec894a1e3ecd32ff35b728209ab6
|
||
ca7092f7ae49296597978adc0593ca067e5852853bd5d44ae3ff8716b0681de8eb
|
||
e941f054a77fcb44d
|
||
-----BEGIN SHISHI Ticket-----
|
||
YYHhMIHeoAMCAQWhCxsJbG9jYWxob3N0ohwwGqADAgEBoRMwERsEaW1hcBsJbG9j
|
||
YWxob3N0o4GrMIGooAMCARKigaAEgZ14G/b80bUSBMwwxwdpVjd/bDrL5sDnpxU/
|
||
xOiH4DdcW9PDwkWoAlUUYObcwGutIU5hw3z/xZjxPVybSOrrxNyyIyHzL0ptbJ4s
|
||
ll50JUssh8/UmCxJsGRns0sEVgIQQq+gbPaUwC7IlKHj7NMv81tyggmrbKcJL3rk
|
||
kpZZeXitwFk8oGflhShTvV1Erj/4cWsGgd6OvpQfBUp3/LRN
|
||
-----END SHISHI Ticket-----
|
||
|
||
The third packet contains the AP-REQ, expanded as follows:
|
||
|
||
name:AP-REQ type:SEQUENCE
|
||
name:pvno type:INTEGER value:0x05
|
||
name:msg-type type:INTEGER value:0x0e
|
||
name:ap-options type:BIT_STR value(32):04000000
|
||
name:ticket type:SEQUENCE
|
||
name:tkt-vno type:INTEGER value:0x05
|
||
name:realm type:GENERALSTRING value:6c6f63616c686f7374
|
||
name:sname type:SEQUENCE
|
||
name:name-type type:INTEGER value:0x01
|
||
name:name-string type:SEQ_OF
|
||
name:NULL type:GENERALSTRING
|
||
name:?1 type:GENERALSTRING value:696d6170
|
||
name:?2 type:GENERALSTRING value:6c6f63616c686f7374
|
||
name:enc-part type:SEQUENCE
|
||
name:etype type:INTEGER value:0x12
|
||
name:cipher type:OCT_STR value:781bf6fcd1b51204cc30c7076956377
|
||
f6c3acbe6c0e7a7153fc4e887e0375c5bd3c3c245a802551460e6dcc06bad214
|
||
e61c37cffc598f13d5c9b48eaebc4dcb22321f32f4a6d6c9e2c965e74254b2c8
|
||
7cfd4982c49b06467b34b0456021042afa06cf694c02ec894a1e3ecd32ff35b7
|
||
28209ab6ca7092f7ae49296597978adc0593ca067e5852853bd5d44ae3ff8716
|
||
b0681de8ebe941f054a77fcb44d
|
||
|
||
|
||
|
||
Josefsson Expires August 3, 2003 [Page 13]
|
||
|
||
Internet-Draft A Kerberos 5 SASL Mechanism February 2003
|
||
|
||
|
||
name:authenticator type:SEQUENCE
|
||
name:etype type:INTEGER value:0x11
|
||
name:kvno type:INTEGER value:0x01
|
||
name:cipher type:OCT_STR value:313e76818614c6b3f20fa72a5e39a86e4
|
||
13f1cea9748d723960c4be26a0de34124829ab01d2ff703335cff6df0beb63cbb1
|
||
a9eaa68c396f1014b65fc373c86abdcd1c07e702d4ff114e06f4ba932acf14eb8a
|
||
cb5fee0a164614204c938ec0a269fd97ed64e9127531c14192fc4ad62e61effa46
|
||
42a482791430ad7455279cfd86a61bee6cdfb1afa113c61eed76e8f4f28d7b3713
|
||
3885a9fe874fd0dafcd2670c29452fcfa79e554556d
|
||
-----BEGIN SHISHI AP-REQ-----
|
||
boIBvjCCAbqgAwIBBaEDAgEOogcDBQAEAAAAo4HkYYHhMIHeoAMCAQWhCxsJbG9j
|
||
YWxob3N0ohwwGqADAgEBoRMwERsEaW1hcBsJbG9jYWxob3N0o4GrMIGooAMCARKi
|
||
gaAEgZ14G/b80bUSBMwwxwdpVjd/bDrL5sDnpxU/xOiH4DdcW9PDwkWoAlUUYObc
|
||
wGutIU5hw3z/xZjxPVybSOrrxNyyIyHzL0ptbJ4sll50JUssh8/UmCxJsGRns0sE
|
||
VgIQQq+gbPaUwC7IlKHj7NMv81tyggmrbKcJL3rkkpZZeXitwFk8oGflhShTvV1E
|
||
rj/4cWsGgd6OvpQfBUp3/LRNpIG9MIG6oAMCARGhAwIBAaKBrQSBqjE+doGGFMaz
|
||
8g+nKl45qG5BPxzql0jXI5YMS+JqDeNBJIKasB0v9wMzXP9t8L62PLsanqpow5bx
|
||
AUtl/Dc8hqvc0cB+cC1P8RTgb0upMqzxTristf7goWRhQgTJOOwKJp/ZftZOkSdT
|
||
HBQZL8StYuYe/6RkKkgnkUMK10VSec/YamG+5s37GvoRPGHu126PTyjXs3EziFqf
|
||
6HT9Da/NJnDClFL8+nnlVFVt
|
||
-----END SHISHI AP-REQ-----
|
||
|
||
After extracting the AP-REP, the Authenticator is as follows:
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Josefsson Expires August 3, 2003 [Page 14]
|
||
|
||
Internet-Draft A Kerberos 5 SASL Mechanism February 2003
|
||
|
||
|
||
name:Authenticator type:SEQUENCE
|
||
name:authenticator-vno type:INTEGER value:0x05
|
||
name:crealm type:GENERALSTRING value:6c6f63616c686f7374
|
||
name:cname type:SEQUENCE
|
||
name:name-type type:INTEGER value:0x01
|
||
name:name-string type:SEQ_OF
|
||
name:NULL type:GENERALSTRING
|
||
name:?1 type:GENERALSTRING value:6a6173
|
||
name:cksum type:SEQUENCE
|
||
name:cksumtype type:INTEGER value:0x0a
|
||
name:checksum type:OCT_STR value:15843a44f4f5f71746cc32e8
|
||
name:cusec type:INTEGER value:0x07480d
|
||
name:ctime type:TIME value:20030202162507Z
|
||
name:authorization-data type:SEQ_OF
|
||
name:NULL type:SEQUENCE
|
||
name:ad-type type:INTEGER
|
||
name:ad-data type:OCT_STR
|
||
name:?1 type:SEQUENCE
|
||
name:ad-type type:INTEGER value:0xff
|
||
name:ad-data type:OCT_STR value:09000000000900000000e9ebe38d0b
|
||
6bdca6b45b987d89f791a1
|
||
-----BEGIN SHISHI Authenticator-----
|
||
YoGDMIGAoAMCAQWhCxsJbG9jYWxob3N0ohAwDqADAgEBoQcwBRsDamFzoxcwFaAD
|
||
AgEKoQ4EDBWEOkT09fcXRswy6KQFAgMHSA2lERgPMjAwMzAyMDIxNjI1MDdaqCcw
|
||
JTAjoAMCAf+hHAQaCQAAAAAJAAAAAOnr440La9ymtFuYfYn3kaE=
|
||
-----END SHISHI Authenticator-----
|
||
|
||
The fourth packet contains the AP-REP, expanded as follows:
|
||
|
||
name:AP-REP type:SEQUENCE
|
||
name:pvno type:INTEGER value:0x05
|
||
name:msg-type type:INTEGER value:0x0f
|
||
name:enc-part type:SEQUENCE
|
||
name:etype type:INTEGER value:0x11
|
||
name:kvno type:INTEGER value:0x00
|
||
name:cipher type:OCT_STR value:930ccd73d8f17971460e066396228b977
|
||
c75ad4336338f5245b09315fc21cc4e606b25abc89878d1db87fd5b208d3af9893
|
||
0059e1c7395f49b698faac5b7fcad6ace14d2
|
||
-----BEGIN SHISHI AP-REP-----
|
||
b2IwYKADAgEFoQMCAQ+iVDBSoAMCARGhAwIBAKJGBESTDM1z2PF5cUYOBmOWIouX
|
||
fHWtQzYzj1JFsJMV/CHMTmBrJavImHjR24f9WyCNOvmJMAWeHHOV9Jtpj6rFt/yt
|
||
as4U0g==
|
||
-----END SHISHI AP-REP-----
|
||
|
||
After extracting the AP-REP, the EncAPRepPart is as follows:
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Josefsson Expires August 3, 2003 [Page 15]
|
||
|
||
Internet-Draft A Kerberos 5 SASL Mechanism February 2003
|
||
|
||
|
||
name:EncAPRepPart type:SEQUENCE
|
||
name:ctime type:TIME value:20030202162507Z
|
||
name:cusec type:INTEGER value:0x07480d
|
||
-----BEGIN SHISHI EncAPRepPart-----
|
||
exwwGqARGA8yMDAzMDIwMjE2MjUwN1qhBQIDB0gN
|
||
-----END SHISHI EncAPRepPart-----
|
||
|
||
|
||
6. Security Considerations
|
||
|
||
The authentication phase is believed to be no less secure than the
|
||
Client/Server Authentication exchange described in the Kerberos 5
|
||
protocol.
|
||
|
||
If no security layer is negotiated, the connection is subject to
|
||
active man-in-the-middle attackers that hijack the connection after
|
||
authentication has been completed.
|
||
|
||
When security layers are used, it is believed that the communication
|
||
channel negotiated by this specification is no less secure than the
|
||
KRB_SAFE and KRB_PRIV primitives. In other words, it is believed
|
||
that if an attack that breaches integrity or privacy of this
|
||
mechanism, the same attack also applies to the Kerberos 5
|
||
specification, and vice versa.
|
||
|
||
Server implementations should be aware that the proxy function can be
|
||
abused, and MAY implement precaution against this if it is considered
|
||
a threat. Useful precautions include limiting the size and number of
|
||
packets forwarded, and to abort the SASL exchange when the limit is
|
||
reached.
|
||
|
||
Server implementations should make sure the method to look up KDC for
|
||
the client indicated realm does not cause security problems. In
|
||
particular, trusting unprotected DNS lookups to find the KDC of a
|
||
realm may be considered as dangerous by a server.
|
||
|
||
The forward-compatibility behavior of returning empty responses to
|
||
unsupported commands may be abused as a covert channel.
|
||
|
||
The reason for the client to send, in the Authenticator checksum
|
||
field, not only the server random number but the entire initial
|
||
server packet with the security layer bitmask and maximum cipher-text
|
||
buffer size accepted by server, is to prevent an attacker from
|
||
downgrading the security layer and preference for mutual
|
||
authentication ultimately selected. The random number ties the
|
||
client and server to the same network session, prevent
|
||
man-in-the-middle attacks assuming a Kerberos 5 security layer is
|
||
chosen and that the Kerberos 5 security layer is secure.
|
||
|
||
|
||
|
||
Josefsson Expires August 3, 2003 [Page 16]
|
||
|
||
Internet-Draft A Kerberos 5 SASL Mechanism February 2003
|
||
|
||
|
||
Generating AS-REP using a legacy password database requires
|
||
calculating the string2key operation. This may be a costly operation
|
||
(in particular for the recent AES ciphers), so servers should either
|
||
pre-calculate and store the key once or take precautions against
|
||
opening itself up to a Denial Of Service attack which exhausts CPU
|
||
power on the server.
|
||
|
||
The security considerations of Kerberos 5 and SASL are inherited.
|
||
Some immediate consequences of this follows (this is an inconclusive
|
||
summary):
|
||
|
||
Note that some of the Kerberos 5 encryption types are considered
|
||
weak, implementations must decide which algorithms are trusted.
|
||
|
||
Note that the encryption types indicated in AS-REQ/TGS-REQ are not
|
||
integrity protected, so an attacker may downgrade the encryption keys
|
||
ultimately used.
|
||
|
||
Note that Kerberos 5 do not authorize users, it only authenticate
|
||
users. Applications using this mechanism must thus perform checks,
|
||
not described in detail in this document, to make sure the
|
||
authenticated user is authorized to the service she is requesting.
|
||
|
||
Note that the SASL framework is subject to "downgrade" attacks where
|
||
an attacker forces a weaker SASL mechanism to be used. The use of,
|
||
e.g., TLS [5] can be used to mitigate this.
|
||
|
||
Note that clients should use the server name exactly as the user
|
||
specified, or at least abstain from canonicalizing the server name
|
||
with insecure mechanisms such as unprotected DNS.
|
||
|
||
Normative References
|
||
|
||
[1] Kohl, J. and B. Neuman, "The Kerberos Network Authentication
|
||
Service (V5)", RFC 1510, September 1993.
|
||
|
||
[2] Bradner, S., "Key words for use in RFCs to Indicate Requirement
|
||
Levels", BCP 14, RFC 2119, March 1997.
|
||
|
||
[3] Myers, J., "Simple Authentication and Security Layer (SASL)",
|
||
RFC 2222, October 1997.
|
||
|
||
Informative References
|
||
|
||
[4] Eastlake, D., Crocker, S. and J. Schiller, "Randomness
|
||
Recommendations for Security", RFC 1750, December 1994.
|
||
|
||
[5] Dierks, T., Allen, C., Treese, W., Karlton, P., Freier, A. and
|
||
|
||
|
||
|
||
Josefsson Expires August 3, 2003 [Page 17]
|
||
|
||
Internet-Draft A Kerberos 5 SASL Mechanism February 2003
|
||
|
||
|
||
P. Kocher, "The TLS Protocol Version 1.0", RFC 2246, January
|
||
1999.
|
||
|
||
[6] Linn, J., "Generic Security Service Application Program
|
||
Interface Version 2, Update 1", RFC 2743, January 2000.
|
||
|
||
|
||
Author's Address
|
||
|
||
Simon Josefsson
|
||
Drottningholmsv. 70
|
||
Stockholm 112 42
|
||
Sweden
|
||
|
||
EMail: simon@josefsson.org
|
||
|
||
Acknowledgments
|
||
|
||
Text and ideas was borrowed from the Kerberos version 4 SASL
|
||
mechanism in RFC 2222. Lawrence Greenfield suggested adding a
|
||
security consideration about server name canonicalization.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Josefsson Expires August 3, 2003 [Page 18]
|
||
|
||
Internet-Draft A Kerberos 5 SASL Mechanism February 2003
|
||
|
||
|
||
Intellectual Property Statement
|
||
|
||
The IETF takes no position regarding the validity or scope of any
|
||
intellectual property or other rights that might be claimed to
|
||
pertain to the implementation or use of the technology described in
|
||
this document or the extent to which any license under such rights
|
||
might or might not be available; neither does it represent that it
|
||
has made any effort to identify any such rights. Information on the
|
||
IETF's procedures with respect to rights in standards-track and
|
||
standards-related documentation can be found in BCP-11. Copies of
|
||
claims of rights made available for publication and any assurances of
|
||
licenses to be made available, or the result of an attempt made to
|
||
obtain a general license or permission for the use of such
|
||
proprietary rights by implementors or users of this specification can
|
||
be obtained from the IETF Secretariat.
|
||
|
||
The IETF invites any interested party to bring to its attention any
|
||
copyrights, patents or patent applications, or other proprietary
|
||
rights which may cover technology that may be required to practice
|
||
this standard. Please address the information to the IETF Executive
|
||
Director.
|
||
|
||
|
||
Full Copyright Statement
|
||
|
||
Copyright (C) The Internet Society (2003). All Rights Reserved.
|
||
|
||
This document and translations of it may be copied and furnished to
|
||
others, and derivative works that comment on or otherwise explain it
|
||
or assist in its implementation may be prepared, copied, published
|
||
and distributed, in whole or in part, without restriction of any
|
||
kind, provided that the above copyright notice and this paragraph are
|
||
included on all such copies and derivative works. However, this
|
||
document itself may not be modified in any way, such as by removing
|
||
the copyright notice or references to the Internet Society or other
|
||
Internet organizations, except as needed for the purpose of
|
||
developing Internet standards in which case the procedures for
|
||
copyrights defined in the Internet Standards process must be
|
||
followed, or as required to translate it into languages other than
|
||
English.
|
||
|
||
The limited permissions granted above are perpetual and will not be
|
||
revoked by the Internet Society or its successors or assignees.
|
||
|
||
This document and the information contained herein is provided on an
|
||
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
|
||
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
|
||
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
|
||
|
||
|
||
|
||
Josefsson Expires August 3, 2003 [Page 19]
|
||
|
||
Internet-Draft A Kerberos 5 SASL Mechanism February 2003
|
||
|
||
|
||
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
|
||
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
||
|
||
|
||
Acknowledgement
|
||
|
||
Funding for the RFC Editor function is currently provided by the
|
||
Internet Society.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Josefsson Expires August 3, 2003 [Page 20]
|
||
|