datatracker.ietf.org
Sign in
Version 5.7.1.p2, 2014-10-29
Report a bug

A Pseudo-Random Function (PRF) for the Kerberos V Generic Security Service Application Program Interface (GSS-API) Mechanism
RFC 4402

Document type: RFC - Proposed Standard (February 2006; Errata)
Document stream: IETF
Last updated: 2014-02-13
Other versions: plain text, pdf, html

IETF State: (None)
Consensus: Unknown
Document shepherd: No shepherd assigned

IESG State: RFC 4402 (Proposed Standard)
Responsible AD: Sam Hartman
Send notices to: jaltman@columbia.edu, nicolas.williams@sun.com

Network Working Group                                        N. Williams
Request for Comments: 4402                                           Sun
Category: Standards Track                                  February 2006

   A Pseudo-Random Function (PRF) for the Kerberos V Generic Security
       Service Application Program Interface (GSS-API) Mechanism

Status of This Memo

   This document specifies an Internet standards track protocol for the
   Internet community, and requests discussion and suggestions for
   improvements.  Please refer to the current edition of the "Internet
   Official Protocol Standards" (STD 1) for the standardization state
   and status of this protocol.  Distribution of this memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2006).

Abstract

   This document defines the Pseudo-Random Function (PRF) for the
   Kerberos V mechanism for the Generic Security Service Application
   Program Interface (GSS-API), based on the PRF defined for the
   Kerberos V cryptographic framework, for keying application protocols
   given an established Kerberos V GSS-API security context.

Table of Contents

   1. Introduction ....................................................2
      1.1. Conventions Used in This Document ..........................2
   2. Kerberos V GSS Mechanism PRF ....................................2
   3. IANA Considerations .............................................3
   4. Security Considerations .........................................3
   5. Normative References ............................................4

Williams                    Standards Track                     [Page 1]
RFC 4402           A PRF for the Kerberos V Mechanism      February 2006

1.  Introduction

   This document specifies the Kerberos V GSS-API mechanism's [RFC4121]
   pseudo-random function corresponding to [RFC4401].  The function is a
   "PRF+" style construction.  For more information see [RFC4401],
   [RFC2743], [RFC2744], and [RFC4121].

1.1.  Conventions Used in This Document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].

2.  Kerberos V GSS Mechanism PRF

   The GSS-API PRF [RFC4401] function for the Kerberos V mechanism
   [RFC4121] shall be the output of a PRF+ function based on the
   encryption type's PRF function keyed with the negotiated session key
   of the security context corresponding to the 'prf_key' input
   parameter of GSS_Pseudo_random().

   This PRF+ MUST be keyed with the key indicated by the 'prf_key' input
   parameter as follows:

   o  GSS_C_PRF_KEY_FULL -- use the sub-session key asserted by the
      acceptor, if any, or the sub-session asserted by the initiator, if
      any, or the Ticket's session key

   o  GSS_C_PRF_KEY_PARTIAL -- use the sub-session key asserted by the
      initiator, if any, or the Ticket's session key

   The PRF+ function is a simple counter-based extension of the Kerberos
   V pseudo-random function [RFC3961] for the encryption type of the
   security context's keys:

         PRF+(K, L, S) = truncate(L, T1 || T2 || .. || Tn)

         Tn = pseudo-random(K, n || S)

   where '||' is the concatenation operator, 'n' is encoded as a network
   byte order 32-bit unsigned binary number, truncate(L, S) truncates
   the input octet string S to length L, and pseudo-random() is the
   Kerberos V pseudo-random function [RFC3961].

   The maximum output size of the Kerberos V mechanism's GSS-API PRF
   then is, necessarily, 2^32 times the output size of the pseudo-
   random() function for the encryption type of the given key.

Williams                    Standards Track                     [Page 2]
RFC 4402           A PRF for the Kerberos V Mechanism      February 2006

   When the input size is longer than 2^14 octets as per [RFC4401] and
   exceeds an implementation's resources, then the mechanism MUST return
   GSS_S_FAILURE and GSS_KRB5_S_KG_INPUT_TOO_LONG as the minor status
   code.

3.  IANA Considerations

   This document has no IANA considerations currently.  If and when a
   relevant IANA registry of GSS-API symbols and constants is created,
   then the GSS_KRB5_S_KG_INPUT_TOO_LONG minor status code should be
   added to such a registry.

4.  Security Considerations

   Kerberos V encryption types' PRF functions use a key derived from
   contexts' session keys and should preserve the forward security

[include full document text]