Public Key Cryptography for Initial Authentication in Kerberos (PKINIT)
RFC 4556
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2015-10-14
|
34 | (System) | Notify list changed from jhutz@cmu.edu, lzhu@windows.microsoft.com to jhutz@cmu.edu |
2012-08-22
|
34 | (System) | post-migration administrative database adjustment to the Yes position for Sam Hartman |
2006-07-10
|
34 | (System) | This was part of a ballot set with: draft-ietf-krb-wg-ocsp-for-pkinit |
2006-07-10
|
34 | Amy Vezza | State Changes to RFC Published from RFC Ed Queue by Amy Vezza |
2006-07-10
|
34 | Amy Vezza | [Note]: 'RFC 4556' added by Amy Vezza |
2006-06-30
|
34 | (System) | RFC published |
2006-02-24
|
34 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2006-02-24
|
34 | Amy Vezza | IESG state changed to Approved-announcement sent |
2006-02-24
|
34 | Amy Vezza | IESG has approved the document |
2006-02-24
|
34 | Amy Vezza | Closed "Approve" ballot |
2006-02-23
|
34 | Sam Hartman | State Changes to Approved-announcement to be sent::Point Raised - writeup needed from Approved-announcement to be sent by Sam Hartman |
2006-02-23
|
34 | Sam Hartman | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Sam Hartman |
2006-02-23
|
34 | Sam Hartman | [Ballot Position Update] Position for Sam Hartman has been changed to Yes from Discuss by Sam Hartman |
2006-02-17
|
34 | Amy Vezza | State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza |
2006-02-17
|
34 | (System) | Removed from agenda for telechat - 2006-02-16 |
2006-02-16
|
34 | Bill Fenner | [Ballot Position Update] New position, No Objection, has been recorded for Bill Fenner by Bill Fenner |
2006-02-16
|
34 | Allison Mankin | [Ballot Position Update] New position, No Objection, has been recorded for Allison Mankin by Allison Mankin |
2006-02-16
|
34 | Margaret Cullen | [Ballot Position Update] New position, No Objection, has been recorded for Margaret Wasserman by Margaret Wasserman |
2006-02-16
|
34 | Bert Wijnen | [Ballot Position Update] New position, No Objection, has been recorded for Bert Wijnen by Bert Wijnen |
2006-02-16
|
34 | Jon Peterson | [Ballot Position Update] New position, No Objection, has been recorded for Jon Peterson by Jon Peterson |
2006-02-16
|
34 | Michelle Cotton | IANA Comments: As described in the IANA Considerations section, we understand this document to have NO IANA Actions. There are some values within the document. … IANA Comments: As described in the IANA Considerations section, we understand this document to have NO IANA Actions. There are some values within the document. The IANA would like confirmation that these do NOT need to be registered. |
2006-02-16
|
34 | Mark Townsley | [Ballot Position Update] New position, No Objection, has been recorded for Mark Townsley by Mark Townsley |
2006-02-15
|
34 | Alex Zinin | [Ballot Position Update] New position, No Objection, has been recorded for Alex Zinin by Alex Zinin |
2006-02-14
|
34 | Ted Hardie | [Ballot comment] draft-ietf-cat-kerberos-pk-init-34 says: All data structures carried in OCTET STRINGs must be encoded according to the rules specified in corresponding specifications. "Corresponding specification" … [Ballot comment] draft-ietf-cat-kerberos-pk-init-34 says: All data structures carried in OCTET STRINGs must be encoded according to the rules specified in corresponding specifications. "Corresponding specification" isn't very clear here, as it isn't clear how it relates to the data structures spec. I think this example is clear: PA-PK-AS-REQ ::= SEQUENCE { signedAuthPack [0] IMPLICIT OCTET STRING, -- Contains a CMS type ContentInfo encoded -- according to [RFC3852]. For this, the OCTET STRING is, in fact, encoded according to RFC3852 (CMS). There are other data structures referring to other documents (e.g. 3280), but this wasn't very clear from the original phrasing. Would this be clearer? Each data structure using OCTET STRINGs will provide a specific reference to the encoding it uses. |
2006-02-14
|
34 | Ted Hardie | [Ballot Position Update] Position for Ted Hardie has been changed to No Objection from Undefined by Ted Hardie |
2006-02-14
|
34 | Ted Hardie | [Ballot comment] draft-ietf-cat-kerberos-pk-init-34 says: All data structures carried in OCTET STRINGs must be encoded according to the rules specified in corresponding specifications. "Corresponding specification" … [Ballot comment] draft-ietf-cat-kerberos-pk-init-34 says: All data structures carried in OCTET STRINGs must be encoded according to the rules specified in corresponding specifications. "Corresponding specification" isn't very clear here, as it isn't clear how it relates to the data structures spec. I think this example is clear: PA-PK-AS-REQ ::= SEQUENCE { signedAuthPack [0] IMPLICIT OCTET STRING, -- Contains a CMS type ContentInfo encoded -- according to [RFC3852]. For this, the OCTET STRING is, in fact, encoded according to RFC3852 (CMS). There are other data structures referring to other documents (e.g. 3280), but this wasn't very clear from the original phrasing. Would this be clearer? Each data Structures using OCTET STRINGs will provide a specific reference to the encoding it uses. |
2006-02-14
|
34 | Ted Hardie | [Ballot Position Update] New position, Undefined, has been recorded for Ted Hardie by Ted Hardie |
2006-02-14
|
34 | Brian Carpenter | [Ballot Position Update] Position for Brian Carpenter has been changed to No Objection from Undefined by Brian Carpenter |
2006-02-14
|
34 | Brian Carpenter | [Ballot comment] Logging the major comments from Gen-ART review by Elwyn Davies, on the pk-init draft: 1) While doing the LC review I was somewhat … [Ballot comment] Logging the major comments from Gen-ART review by Elwyn Davies, on the pk-init draft: 1) While doing the LC review I was somewhat confused about the registrations of 'magic numbers' across the various Kerberos RFCs/drafts. I would normally have expected that RFC4120 established a number of IANA registries for things such as the 'key usage' numbers and 'error numbers' but I have now had it explained that registration 'has been retained in the Working Group' probably until rfc1510ter is published. I personally have some qualms about the integrity of this unusual practice, and I don't see a single public list of the registrations (although somebody clearly knows them all!). It appears that RFC4120 'pre-registered' some of the items needed for this draft (flagged with [pkinit] in RFC4120) but in the subsequent development of this draft additional items have become necessary. I think it should be made clear which additional items are new and which were already registered in RFC4120 just as would be the case if there were IANA considerations. 2) The key usage number that is cited in s3.2.3.2 is overloaded (see detailed comment below). Discussion indicates that this does not result in a security problem (because it is used with a different key) but there needs to be some comment to explain that this has happened and why it isn't a problem. 3) Appendix C should mention Windows XP. Discussion indicates that the 'next version' after Windows 2003 Server referred to is not in fact Windows XP as this naive reader assumed but something that might have an internal code name of Vista. However, I think this actually makes it more important to clarify the position of the KDC in Windows XP Professional. Windows XP Professional is not just a Kerberos client but can also act as a server if I understand correctly because Windows XP Professional can act as a Windows security domain controller in which role the KDC has to offer services even if the whole system is not a 'server' in the sense that Windows 2003 Server edition implies. |
2006-02-14
|
34 | Brian Carpenter | [Ballot Position Update] New position, Undefined, has been recorded for Brian Carpenter by Brian Carpenter |
2006-02-13
|
34 | Scott Hollenbeck | [Ballot Position Update] New position, No Objection, has been recorded for Scott Hollenbeck by Scott Hollenbeck |
2006-02-09
|
34 | Sam Hartman | [Ballot discuss] Genart review comments indicate that this spec re-uses key usage 6 for a different purpose than RFC 4120. From a security standpoint … [Ballot discuss] Genart review comments indicate that this spec re-uses key usage 6 for a different purpose than RFC 4120. From a security standpoint that turns out to be fine. However text explaining the re-use and noting that it is not a security problem is required. |
2006-02-09
|
34 | Sam Hartman | [Ballot Position Update] Position for Sam Hartman has been changed to Discuss from Yes by Sam Hartman |
2006-02-09
|
34 | Sam Hartman | State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Sam Hartman |
2006-02-09
|
34 | Sam Hartman | [Ballot Position Update] New position, Yes, has been recorded for Sam Hartman |
2006-02-09
|
34 | Sam Hartman | Ballot has been issued by Sam Hartman |
2006-02-09
|
34 | Sam Hartman | Created "Approve" ballot |
2006-02-09
|
34 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-34.txt |
2006-02-08
|
34 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2006-01-25
|
34 | Amy Vezza | Last call sent |
2006-01-25
|
34 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2006-01-25
|
34 | Amy Vezza | State Changes to Last Call Requested from AD Evaluation by Amy Vezza |
2006-01-25
|
34 | Amy Vezza | Last Call was requested by Amy Vezza |
2006-01-25
|
34 | (System) | Ballot writeup text was added |
2006-01-25
|
34 | (System) | Last call text was added |
2006-01-25
|
34 | (System) | Ballot approval text was added |
2006-01-25
|
34 | Sam Hartman | 1.a) Have the chairs personally reviewed this version of the Internet Draft (ID), and in particular, do they believe this … 1.a) Have the chairs personally reviewed this version of the Internet Draft (ID), and in particular, do they believe this ID is ready to forward to the IESG for publication? >> Yes. 1.b) Has the document had adequate review from both key WG members and key non-WG members? Do you have any concerns about the depth or breadth of the reviews that have been performed? >> This document has been the primary work item of the Kerberos >> WG for some time, and has received extensive review from its >> participants. It also has received review from a number of >> individuals not normally active in this WG. >> >> While we would welcome further review with respect to PKI >> issues, which are outside the core competence of this working >> group, I believe at this point that the document has received >> sufficient review in that area that I feel comfortable sending >> the document to the IESG. 1.c) Do you have concerns that the document needs more review from a particular (broader) perspective (e.g., security, operational complexity, someone familiar with AAA, etc.)? >> No. 1.d) Do you have any specific concerns/issues with this document that you believe the ADs and/or IESG should be aware of? For example, perhaps you are uncomfortable with certain parts of the document, or have concerns whether there really is a need for it. In any event, if your issues have been discussed in the WG and the WG has indicated it that it still wishes to advance the document, detail those concerns in the write-up. >> No. 1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? >> This document represents a joint effort by a large number of >> working group participants, and I feel it represents the >> consensus of the group as a whole. 1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email to the Responsible Area Director. >> No. 1.g) Have the chairs verified that the document adheres to all of the ID nits? (see http://www.ietf.org/ID-Checklist.html). >> The automatic id-nits processor reports one line above 72 >> characters; this can and should be fixed in editing. >> >> This document defines new types of Kerberos preauthentication >> data, authorization data, and typed-data, as well as several >> new Kerberos error codes. As described in RFC4120, those >> registries are currently maintained by this WG, pending >> completion of an update to the Kerberos specification. Thus, >> no IANA action is required for these codes. In addition, >> several new Kerberos encryption types codes are reserved to >> have special meaning with PKINIT. These codes were previously >> reserved in RFC3961 for use by PKINIT; thus, no new IANA >> actions are required. 1.h) Is the document split into normative and informative references? Are there normative references to IDs, where the IDs are not also ready for advancement or are otherwise in an unclear state? (note here that the RFC editor will not publish an RFC with normative references to IDs, it will delay publication until all such IDs are also ready for publication as RFCs.) >> Yes, normative and informative references are split. All >> normative references are to published RFC's or IEEE or ITU-T >> specifications. >> >> There appear to be a few spurious references to RFC4121 where >> references to RFC4120 are all that is required, and there is a >> journal article listed in the informative references section >> which is not referenced in the text. Presumably these issues >> can be fixed in editing. Technical Summary This document describes protocol extensions (hereafter called PKINIT) to the Kerberos protocol specification. These extensions provide a method for integrating public key cryptography into the initial authentication exchange, by using asymmetric-key signature and/or encryption algorithms in pre-authentication data fields. Working Group Summary This document is the result of work begun nearly 10 years ago in the CAT working group. In that time the two working groups have focused much of their energy on this work, resulting in quite a lot of discussion, some heated debate, and a few compromises. Due to timing constraints, one significant stakeholder was forced to adopt and deploy an early version of this specification, rather than waiting for the final product. While we regret being unable to meet their timeline, much of the intervening time was well-spent, and we think the protocol is significantly improved as a result. This document represents the consensus of the Kerberos Working Group. Protocol Quality Several major Kerberos implementors have indicated an intent to implement this protocol; some have done so already. While the current version has not yet been widely deployed, significant experience has been gained by wide deployment of earlier versions of this protocol. This protocol was reviewed by Jeffrey Hutzelman. |
2006-01-25
|
34 | Sam Hartman | [Note]: 'proto shepherd: jhutz@cmu.edu' added by Sam Hartman |
2006-01-25
|
34 | Sam Hartman | Placed on agenda for telechat - 2006-02-16 by Sam Hartman |
2006-01-25
|
34 | Sam Hartman | State Changes to AD Evaluation from AD Evaluation::AD Followup by Sam Hartman |
2006-01-24
|
34 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2006-01-24
|
33 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-33.txt |
2006-01-22
|
34 | Sam Hartman | State Change Notice email list have been change to jhutz@cmu.edu, lzhu@windows.microsoft.com from jhutz@cmu.edu |
2006-01-22
|
34 | Sam Hartman | State Changes to AD Evaluation::Revised ID Needed from AD Evaluation by Sam Hartman |
2006-01-22
|
34 | Sam Hartman | AD review sent to WG; minor revisions required |
2006-01-22
|
34 | Sam Hartman | State Changes to AD Evaluation from Publication Requested by Sam Hartman |
2006-01-13
|
34 | Dinara Suleymanova | Draft Added by Dinara Suleymanova in state Publication Requested |
2006-01-12
|
32 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-32.txt |
2005-12-27
|
31 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-31.txt |
2005-12-01
|
30 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-30.txt |
2005-10-21
|
29 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-29.txt |
2005-09-13
|
28 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-28.txt |
2005-07-21
|
27 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-27.txt |
2005-05-24
|
26 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-26.txt |
2005-02-21
|
25 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-25.txt |
2005-02-10
|
24 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-24.txt |
2005-01-31
|
23 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-23.txt |
2004-12-07
|
22 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-22.txt |
2004-10-26
|
21 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-21.txt |
2004-07-20
|
20 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-20.txt |
2004-04-12
|
19 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-19.txt |
2004-02-16
|
18 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-18.txt |
2003-11-24
|
17 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-17.txt |
2002-09-12
|
16 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-16.txt |
2001-11-29
|
15 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-15.txt |
2001-07-16
|
14 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-14.txt |
2001-03-02
|
13 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-13.txt |
2000-07-20
|
12 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-12.txt |
2000-03-15
|
11 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-11.txt |
1999-10-26
|
10 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-10.txt |
1999-07-01
|
09 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-09.txt |
1999-05-17
|
08 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-08.txt |
1998-11-13
|
07 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-07.txt |
1998-04-07
|
06 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-06.txt |
1997-11-21
|
05 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-05.txt |
1997-08-01
|
04 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-04.txt |
1997-03-28
|
03 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-03.txt |
1996-10-16
|
02 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-02.txt |
1996-06-10
|
01 | (System) | New version available: draft-ietf-cat-kerberos-pk-init-01.txt |