Skip to main content

An Information Model for Kerberos Version 5
draft-ietf-krb-wg-kdc-model-16

Revision differences

Document history

Date Rev. By Action
2013-03-15
16 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2013-03-01
16 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2013-01-23
16 Amy Vezza State changed to RFC Ed Queue from Approved-announcement sent
2013-01-22
16 (System) IANA Action state changed to No IC
2013-01-22
16 Amy Vezza State changed to Approved-announcement sent from IESG Evaluation::AD Followup
2013-01-22
16 Amy Vezza IESG has approved the document
2013-01-22
16 Amy Vezza Closed "Approve" ballot
2013-01-22
16 Amy Vezza Ballot approval text was generated
2013-01-17
16 Stephen Farrell Ballot writeup was changed
2013-01-17
16 Stephen Farrell Ballot writeup was changed
2013-01-14
16 Stephen Farrell Ballot writeup was changed
2013-01-14
16 Pete Resnick
[Ballot comment]
Based on the removal of the standard 2119 template and the new text in section, I'm willing to clear the DISCUSS. Given how …
[Ballot comment]
Based on the removal of the standard 2119 template and the new text in section, I'm willing to clear the DISCUSS. Given how unusual it is nowadays to have MUST/SHOULD/etc. without 2119, Stephen might decide whether this is worth mentioning to the rest of the IETF, but that's his call. Just a few things that might still be worth some updates:

1. MUST and MAY are used in the introduction before they are defined in section 2. You might just want to avoid them there.

4.2.2: That's a seriously funky construction of English.

4.3: Aside from the adorable use of "MUST NOT REQUIRE" (which should probably be defined in section 2), I agree with Robert that the meaning sentence is a bit obscure.
2013-01-14
16 Pete Resnick [Ballot Position Update] Position for Pete Resnick has been changed to No Objection from Discuss
2013-01-14
16 Stephen Farrell Ballot writeup was changed
2013-01-14
16 Leif Johansson New version available: draft-ietf-krb-wg-kdc-model-16.txt
2013-01-14
15 Stephen Farrell Ballot writeup was changed
2013-01-14
15 (System) Sub state has been changed to AD Followup from Revised ID Needed
2013-01-14
15 Leif Johansson New version available: draft-ietf-krb-wg-kdc-model-15.txt
2012-09-20
14 Tero Kivinen Request for Early review by SECDIR Completed: Ready. Reviewer: Alexey Melnikov.
2012-08-30
14 Cindy Morgan State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation
2012-08-29
14 Wesley Eddy [Ballot Position Update] New position, No Objection, has been recorded for Wesley Eddy
2012-08-29
14 Pete Resnick
[Ballot discuss]
Unlike my colleagues, I would really like to have a DISCUSSion about this bizzarre use of 2119. I understand at this point the …
[Ballot discuss]
Unlike my colleagues, I would really like to have a DISCUSSion about this bizzarre use of 2119. I understand at this point the WG is discussing it internally, so I will not be at all put off if you do not respond to this point until that WG discussion completes. I'll list here the more egregious examples of misuse just so you see what I'm concerned about. Like Robert, I think you are better off using prose than trying to shoehorn alternate meanings into 2119. If you insist on using 2119, I think you are going to need an explanation of how these uses constitute places where they are "required for interoperation or to limit behavior which has potential for causing harm".

1: You jump right into using MAY and MUST before they are even defined in section 2, and I'm not convinced they are either used correctly or are necessary in the Introduction:

  Implementations of this document MAY decide to change the names used
  (e.g. principalName).

How is this describing an interoperation option? Are you trying to warn other implementations that some implementations MAY change names? It doesn't sound like it. 
 
  If so an implementation MUST provide a name to
  name mapping to this document.  In particular schema languages may
  have different conventions for caseing, eg camelCase vs use of '_'
  and '-' to separate 'words' in a name.  Implementations MUST call out
  such conventions explicitly.

So these MUSTs are indicating some sort of documentation requirement in 2119 terms? That seems bizzarre. Prose makes much more sense here.

  Implementations of this document MUST be able to support default
  values for attributes as well as the ability to specify syntax for
  attribute values.

This might be a reasonable use of MUST, but why is it in the Introduction? Is this actually a protocol requirement you expect people to read?

4.1:

  The Principal MUST be implemented in full and MUST NOT be OPTIONAL in
  an implementation

Aside from the novel use of "MUST NOT be OPTIONAL", why is this sentence not redundant? If it's not redundant, I don't understand what it means.

4.1.1.2:

  The Principal MUST NOT be used before this date.  The syntax of the
  attribute MUST be Internet Date/Time Format from [RFC3339].  The
  attribute MUST be single-valued.

Not using the Principal before a date is not a protocol requirement; it's a definition of the attribute. The first sentence should be "This attribute contains the date and time before which the Principal can not be used." Also, the last two sentences specify syntax. The MUSTs add nothing.

Similar problems exist in 4.1.1.3, 4.1.1.4, 4.1.1.6, 4.1.1.7, 4.3.1.5, 4.3.1.6.

4.1.2:

  In typical situations the Principal is
  associated with exactly 1 KeySet but implementations MUST NOT assume
  this case, i.e. an implementation of this standard MUST be able to
  handle the general case of multiple KeySet associated with each
  principal.

The second MUST is right, but the first is not. "Assuming" is not something that needs a protocol requirement keyword.

4.2:

  Implementations
  of this standard MUST facilitate, to the extent possible, an
  administrator's ability to place more restrictive access controls on
  KeySets than on other Principal data, and to arrange for more secure
  backup for KeySets.

I can't figure out how that MUST is actionable. How could you tell if I violated it? Given that it's "to the extent possible", this sounds like at best it's "SHOULD allow an administrator to place...".

4.3.3:

  The security of the keys is an absolute requirement for the operation
  of Kerberos 5.  If keys are implemented adequate protection from
  unauthorized modification and disclosure MUST be available and
  REQUIRED by the implementation.

Leaving aside the missing comma after "implemented", I can't quite figure out what is being REQUIRED of whom in the above sentence. I think the attempt to squeeze 2119 in here is making the sentence convoluted.

4.4:

  Implementations SHOULD implement policy but MAY allow them to be
  OPTIONAL.

I'm having trouble making heads or tails out of the above. Do you mean, "Policy SHOULD be implemented, but their use is OPTIONAL."?
2012-08-29
14 Pete Resnick
[Ballot comment]
4.2.2: That's a seriously funky construction of English.

4.3: Aside from the adorable use of "MUST NOT REQUIRE", I agree with Robert that …
[Ballot comment]
4.2.2: That's a seriously funky construction of English.

4.3: Aside from the adorable use of "MUST NOT REQUIRE", I agree with Robert that the meaning sentence is a bit obscure.
2012-08-29
14 Pete Resnick [Ballot Position Update] New position, Discuss, has been recorded for Pete Resnick
2012-08-28
14 Robert Sparks
[Ballot comment]
I don't think adding additional load to the meanings of the 2119 terms helped with the precision
or conciseness of the text in …
[Ballot comment]
I don't think adding additional load to the meanings of the 2119 terms helped with the precision
or conciseness of the text in this document. For future efforts, please consider using prose
where you need it instead. There are two places where I had to either read multiple times, or just
guess at the intended meaning. Please try to find a way to clarify them.

1) In section 4.1, when you say MUST NOT be OPTIONAL, it took awhile to convince myself that this
was only trying to say the schema must have this as a mandatory element. If it meant more than that,
I didn't take that away.

2) In section 4.3, does the first sentence mean "A schema must make keys an optional element"?
Is it ok for the schema to not represent keys at all? Is it OK for the interface to not represent keys
even if the schema does? (I realize that's not what reasonable interfaces would do, but the way the
requirements language here is constructed, the sentence as written could be read to say that's ok.)
2012-08-28
14 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded for Robert Sparks
2012-08-28
14 Adrian Farrel
[Ballot comment]
Thanks for a readable document and for doing the important work of
writing an information model rather than a data model.

I have …
[Ballot comment]
Thanks for a readable document and for doing the important work of
writing an information model rather than a data model.

I have only a number of petty nits...

---

I do agree wit others' comments about uppercase and pseudo-2119
langauge. At least his could be tidied up a bit. For example, "MUST NOT
be OPTIONAL" is a lovely mixture :-)

---

Abstract should say what a KDC is.

---

Please decide "kerberos" or "Kerberos"

---

  The Kerberos version 5 authentication service described in [RFC4120]
  describes how a Key Distribution Center (KDC) provides authentication
  to clients.  The standard does not stipulate how a KDC is managed and

RFC 4120 is not a standard in the IETF sense of the word.
Maybe s/The standard/RFC 4120/

---

I am not convinced that Section 5 adds to this document, and I can
believe that it might confuse the reader and potentially lead to a
restricted view of implementation options.

If it were to be enitely deleted, I would not miss it.
2012-08-28
14 Adrian Farrel [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel
2012-08-28
14 Ralph Droms [Ballot Position Update] New position, No Objection, has been recorded for Ralph Droms
2012-08-28
14 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded for Russ Housley
2012-08-28
14 Stewart Bryant [Ballot Position Update] New position, No Objection, has been recorded for Stewart Bryant
2012-08-27
14 Sean Turner [Ballot comment]
s4.2.1.1: r/incremembed/incremented?

s4.3.1.5/6: Add reference for ISO date format?
2012-08-27
14 Sean Turner [Ballot Position Update] New position, Yes, has been recorded for Sean Turner
2012-08-27
14 Barry Leiba
[Ballot comment]
These are non-blocking, but please consider them seriously, and feel free to
chat with me about them:

I find Section 2 to be …
[Ballot comment]
These are non-blocking, but please consider them seriously, and feel free to
chat with me about them:

I find Section 2 to be rather odd.  I don't like the way you say that the terms are used as defined in 2119, and then go on to say, "Oh, but they're really not, and here's what we mean."  I would *greatly* prefer that you eliminate the 2119 boilerplate and reference, and simply define the terms here, as you mean them.

-- Section 4.1 --

  The Principal MUST be implemented in full and MUST NOT be OPTIONAL in
  an implementation

I think the combination of not-really-2119 terms here is confusing: "MUST NOT be OPTIONAL".  Maybe the right fix here is just to use lower-case "optional".  Or, better, maybe just this: "The Principal MUST be implemented in full, as a required part of every implementation."

-- Section 4.3 --

Similarly, make "MUST NOT REQUIRE" into "MUST NOT require", probably.
2012-08-27
14 Barry Leiba [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba
2012-08-27
14 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded for Ronald Bonica
2012-08-27
14 Brian Haberman [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman
2012-08-15
14 Martin Stiemerling [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling
2012-07-31
14 Leif Johansson New version available: draft-ietf-krb-wg-kdc-model-14.txt
2012-07-30
13 Stephen Farrell Placed on agenda for telechat - 2012-08-30
2012-07-30
13 Stephen Farrell State changed to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup
2012-07-30
13 Stephen Farrell Ballot has been issued
2012-07-30
13 Stephen Farrell [Ballot Position Update] New position, Yes, has been recorded for Stephen Farrell
2012-07-30
13 Stephen Farrell Created "Approve" ballot
2012-07-30
13 Stephen Farrell Ballot writeup was changed
2012-07-29
13 (System) Sub state has been changed to AD Followup from Revised ID Needed
2012-07-29
13 Leif Johansson New version available: draft-ietf-krb-wg-kdc-model-13.txt
2012-06-28
12 Samuel Weiler Request for Early review by SECDIR is assigned to Alexey Melnikov
2012-06-28
12 Samuel Weiler Request for Early review by SECDIR is assigned to Alexey Melnikov
2012-06-12
12 Stephen Farrell State changed to Waiting for AD Go-Ahead::Revised ID Needed from Waiting for AD Go-Ahead
2012-06-12
12 (System) State changed to Waiting for AD Go-Ahead from In Last Call
2012-06-05
12 Pearl Liang
IANA has reviewed draft-ietf-krb-wg-kdc-model-12 and has the following comments:

IANA has a question about the IANA Actions requested in this document.

IANA understands that, upon …
IANA has reviewed draft-ietf-krb-wg-kdc-model-12 and has the following comments:

IANA has a question about the IANA Actions requested in this document.

IANA understands that, upon approval of this document, there are five actions which IANA must complete.

In the SMI Network Management MGMT Codes Internet-standard MIBsubregistry
of the Network Management Parameters registry located at:

http://www.iana.org/assignments/smi-numbers

a new subregistry will be created as follows:

Registry Name: [ see question below ]
Reference: [ RFC-to-be ]
Registration Procedures: [ see question below ]

Prefix: iso.org.dod.internet.security.kerberosV5.policies (1.3.6.1.5.2.5)

IANA Question -> What should the new subregistry be named?
IANA Question -> What are the registration procedures for new entries in the
newly created subregisty?

In the newly created (see above) subregistry of the SMI Network Management MGMT
Codes Internet-standard MIBsubregistry of the Network Management Parameters
registry located at:

http://www.iana.org/assignments/smi-numbers

four new MIB will be registered as follows:

Decimal: [ TBD by IANA at time of registration ]
Name: [ see question below ]
Description: Password Quality Policy
References: [ RFC-to-be ]

Decimal: [ TBD by IANA at time of registration ]
Name: [ see question below ]
Description: Password Management Policy
References: [ RFC-to-be ]

Decimal: [ TBD by IANA at time of registration ]
Name: [ see question below ]
Description: Keying Policy
References: [ RFC-to-be ]

Decimal: [ TBD by IANA at time of registration ]
Name: [ see question below ]
Description: Ticket Flag Policy
References: [ RFC-to-be ]

IANA Question -> For each of the MIbs being proposed above, what is
the short name to be used for the MIB?

IANA notes that the authors have suggested values for each of the four MIBs in the document.

IANA understands that these are the only actions required of IANA upon approval of this document.

Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC.  This message is only to confirm what actions will be performed.
2012-05-31
12 Jean Mahoney Request for Last Call review by GENART is assigned to Joel Halpern
2012-05-31
12 Jean Mahoney Request for Last Call review by GENART is assigned to Joel Halpern
2012-05-29
12 Amy Vezza
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Subject: Last Call:  (An information model for Kerberos version …
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Subject: Last Call:  (An information model for Kerberos version 5) to Proposed Standard


The IESG has received a request from the Kerberos WG (krb-wg) to consider
the following document:
- 'An information model for Kerberos version 5'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2012-06-12. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  This document describes an information model for Kerberos version 5
  from the point of view of an administrative service.  There is no
  standard for administrating a kerberos 5 KDC.  This document
  describes the services exposed by an administrative interface to a
  KDC.




The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-krb-wg-kdc-model/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-krb-wg-kdc-model/ballot/


No IPR declarations have been submitted directly on this I-D.


2012-05-29
12 Amy Vezza State changed to In Last Call from Last Call Requested
2012-05-29
12 Stephen Farrell Last call was requested
2012-05-29
12 Stephen Farrell Ballot approval text was generated
2012-05-29
12 Stephen Farrell Ballot writeup was generated
2012-05-29
12 Stephen Farrell State changed to Last Call Requested from AD Evaluation::AD Followup
2012-05-29
12 Stephen Farrell Last call announcement was generated
2012-05-29
12 (System) Sub state has been changed to AD Followup from Revised ID Needed
2012-05-29
12 Leif Johansson New version available: draft-ietf-krb-wg-kdc-model-12.txt
2012-04-09
11 Stephen Farrell State changed to AD Evaluation::Revised ID Needed from AD Evaluation::AD Followup
2012-03-11
11 (System) Sub state has been changed to AD Followup from Revised ID Needed
2012-03-11
11 Leif Johansson New version available: draft-ietf-krb-wg-kdc-model-11.txt
2011-08-12
10 Stephen Farrell State changed to AD Evaluation::Revised ID Needed from Publication Requested.
2011-07-28
10 Cindy Morgan
(1.a) Who is the Document Shepherd for this document? Has the
Document Shepherd personally reviewed this version of the
document and, in particular, does he …
(1.a) Who is the Document Shepherd for this document? Has the
Document Shepherd personally reviewed this version of the
document and, in particular, does he or she believe this
version is ready for forwarding to the IESG for publication?

>> The Document Shepherd for this document is Jeffrey Hutzelman,
>> . I have reviewed this document, and I believe
>> it is ready for IETF-wide review and publication as a
>> Proposed Standard.

(1.b) Has the document had adequate review both from key WG members
and from key non-WG members? Does the Document Shepherd have
any concerns about the depth or breadth of the reviews that
have been performed?

>> This document has received extensive review within the
>> working group, including multiple last calls, each of
>> which generated additional comments. It has been reviewed
>> by WG participants familiar with several possible schema
>> languages. Any issues raised have been resolved.

(1.c) Does the Document Shepherd have concerns that the document
needs more review from a particular or broader perspective,
e.g., security, operational complexity, someone familiar with
AAA, internationalization or XML?

>> I don't believe any particular additional review is required.
>> Of course, more review is always welcome.

(1.d) Does the Document Shepherd have any specific concerns or
issues with this document that the Responsible Area Director
and/or the IESG should be aware of? For example, perhaps he
or she is uncomfortable with certain parts of the document, or
has concerns whether there really is a need for it. In any
event, if the WG has discussed those issues and has indicated
that it still wishes to advance the document, detail those
concerns here. Has an IPR disclosure related to this document
been filed? If so, please include a reference to the
disclosure and summarize the WG discussion and conclusion on
this issue.

>> I have no concerns.
>> No IPR disclosures related to this document have been filed.

(1.e) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with
others being silent, or does the WG as a whole understand and
agree with it?

>> There is concensus within the working group to publish this
>> document. This document has proceeded slowly and, as noted
>> above, there were several last calls, primarily because there
>> were few comments on the meat of the document between last
>> calls. However, there was extensive discussion at various
>> times on what the model should cover and what uses it should
>> aim to support.

(1.f) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in
separate email messages to the Responsible Area Director. (It
should be in a separate email because this questionnaire is
entered into the ID Tracker.)

>> There have been no such expressions of discontent.

(1.g) Has the Document Shepherd personally verified that the
document satisfies all ID nits? (See
http://www.ietf.org/ID-Checklist.html and
http://tools.ietf.org/tools/idnits/). Boilerplate checks are
not enough; this check needs to be thorough. Has the document
met all formal review criteria it needs to, such as the MIB
Doctor, media type and URI type reviews?

>> This document has been run through the idnits tool, and was
>> reviewed manually for compliance with requirements not checked
>> by the automatic tool. No additional formal review criteria
>> apply to this document.

(1.h) Has the document split its references into normative and
informative? Are there normative references to documents that
are not ready for advancement or are otherwise in an unclear
state? If such normative references exist, what is the
strategy for their completion? Are there normative references
that are downward references, as described in [RFC3967]? If
so, list these downward references to support the Area
Director in the Last Call procedure for them [RFC3967].

>> References have been split appropriately. There are no
>> normative downward references or normative references to
>> documents that are not ready for advancement. However,
>> there is an informative reference to a WG document which
>> has been stalled for some time, and some work may be needed
>> to rework text around mentions of that work-in-progress
>> if references to it are to be removed.

(1.i) Has the Document Shepherd verified that the document IANA
consideration section exists and is consistent with the body
of the document? If the document specifies protocol
extensions, are reservations requested in appropriate IANA
registries? Are the IANA registries clearly identified? If
the document creates a new registry, does it define the
proposed initial contents of the registry and an allocation
procedure for future registrations? Does it suggest a
reasonable name for the new registry? See [RFC2434]. If the
document describes an Expert Review process has Shepherd
conferred with the Responsible Area Director so that the IESG
can appoint the needed Expert during the IESG Evaluation?

>> This document requires no IANA actions per se. However,
>> it needs to create a new OID arc under
>> iso.org.dod.internet.security.kerberosV5, for which we
>> believe the security AD's to be authoritative.

(1.j) Has the Document Shepherd verified that sections of the
document that are written in a formal language, such as XML
code, BNF rules, MIB definitions, etc., validate correctly in
an automated checker?

>> No part of this document is written in a formal language
>> requiring such verification.

(1.k) The IESG approval announcement includes a Document
Announcement Write-Up. Please provide such a Document
Announcement Write-Up? Recent examples can be found in the
"Action" announcements for approved documents. The approval
announcement contains the following sections:


Technical Summary

This document describes an information model for Kerberos version 5
from the point of view of an administrative service. There is no
standard for administrating a kerberos 5 Key Distribution Center
(KDC). This document describes the services exposed by an
administrative interface to a KDC.

Working Group Summary

This document represents the consensus of the Kerberos Working Group.
and will serve as the basis for further development of an LDAP schema.


Document Quality

As an information model, this document does not specify anything
that can be directly implemented. Rather, it forms the basis for
further work, such as the production of an LDAP schema which can be
used to support administration of a Kerberos KDC. Producing such
a schema is a chartered work item of the Kerberos Working Group.

In addition, while this document is not necessarily intended to
serve as a basis for KDC database design, it has been informed by
the design of several implementations, including some which are
able to use LDAP as a data store for the KDC database.

Personnel

The Document Shepherd for this document is Jeffrey Hutzelman.
The responsible Area Director is Stephen Farrell.
2011-07-28
10 Cindy Morgan Draft added in state Publication Requested
2011-07-28
10 Cindy Morgan [Note]: 'Jeffrey Hutzelman (jhutz@cmu.edu) is the document shepherd.' added
2011-07-28
10 Jeffrey Hutzelman Apparently a comment is always required; that's annoying.
2011-07-28
10 Jeffrey Hutzelman IETF state changed to Submitted to IESG for Publication from Waiting for WG Chair Go-Ahead
2011-07-28
10 Jeffrey Hutzelman Waiting for go-ahead
2011-07-28
10 Jeffrey Hutzelman IETF state changed to Waiting for WG Chair Go-Ahead from WG Document
2011-07-28
10 Jeffrey Hutzelman Changed protocol writeup
2011-05-31
10 (System) New version available: draft-ietf-krb-wg-kdc-model-10.txt
2011-05-17
10 (System) Document has expired
2010-11-13
09 (System) New version available: draft-ietf-krb-wg-kdc-model-09.txt
2010-05-18
08 (System) New version available: draft-ietf-krb-wg-kdc-model-08.txt
2010-03-07
07 (System) New version available: draft-ietf-krb-wg-kdc-model-07.txt
2009-10-19
06 (System) New version available: draft-ietf-krb-wg-kdc-model-06.txt
2009-07-31
05 (System) New version available: draft-ietf-krb-wg-kdc-model-05.txt
2009-03-08
04 (System) New version available: draft-ietf-krb-wg-kdc-model-04.txt
2008-11-03
03 (System) New version available: draft-ietf-krb-wg-kdc-model-03.txt
2008-07-10
02 (System) New version available: draft-ietf-krb-wg-kdc-model-02.txt
2008-02-07
01 (System) New version available: draft-ietf-krb-wg-kdc-model-01.txt
2007-12-10
00 (System) New version available: draft-ietf-krb-wg-kdc-model-00.txt