The document shepherd is Benjamin Kaduk. The responsible Area Director
is Stephen Farrell.
This document provides a new authorization data container for Kerberos,
with functionality extending that of the existing AD-KDC-ISSUED container.
The new functionality allows a KDC to be able to validate that a ticket being
presented to the KDC contains authorization data issued by a KDC (in the same
realm), whereas AD-KDC-ISSUED only allows for the Kerberos application service
to perform that validation.
Since this is an update to the standards-track RFC 4120, it must also
be a standards-track document.
2. Review and Consensus
The review process for this document was quite spread out in time, with
action occurring in occasional bursts. Almost all of the Kerberos
experts who regularly participate in the WG have contributed to
reviewing this document at some point in its history, but not
necessarily all at the same time. There was a lot of discussion around
the time of the initial few revisions, but then a lull in activity.
Version -05 got a lot of review comments, which resulted in some
(substantive, but relatively minor) changes to the specification. It
was unclear what level of review those changes had received, after
essentially no comments were received during a WGLC period for the -08,
so we solicited further comments at that time, and got thorough review
from two Kerberos experts, which the shepherd believes is sufficient.
These post-WGLC reviews were largely editorial, but there were three
issues of substance that were raised, two of which received heavy
Discussion of the implicit criticality of authorization data in Kerberos
resulted in full consensus for the text in section 5.
The WG may choose to revisit the usage of critical authorization data in
Kerberos in future work, but that question does not need to be resolved
for this document to move forward.
Discussion of the binding of the CAMMAC to the ticket service principal
name resulted in full consensus for the text in the last paragraph of
The desire for a consumer of the CAMMAC to exist or an IANA registry
for authorization types to exist prior to publication of this document
did not receive much discussion, but seems to be resolved by the
existence of draft-jain-kitten-krb-auth-indicator, which came out
after the concern was raised.
There are not currently any implementations, but Red Hat and MIT plan
to collaborate to produce an implementation.
3. Intellectual Property
Each author has confirmed conformance with BCP 78/79.
There are no IPR declarations against this document.
4. Other Points
This document makes no request of IANA. It allocates numbers in the
Kerberos authorization data types registry and the Kerberos key usage
registry, which are currently managed independently of IANA (see also
draft-ietf-kitten-kerberos-iana-registries). As mentioned above,
the shepherd does not believe that publication of this document must wait
for these registries to be transferred into IANA's control. The current
registrar for these Kerberos registries is a coauthor of the document
and assigned the numbers listed in it.
'idnits' has a few false positives: though this document Updates RFC 4120,
it does not contain any content copied from RFC 4120 (all content is new
in this document), so no disclaimer for pre-RFC5378 work is needed.
Additionally, the checker notes for various ASN.1 tags, "Looks like a
reference, but probably isn't". We are in the "probably" case, here.