Salted Challenge Response Authentication Mechanism (SCRAM) SASL and GSS-API Mechanisms
RFC 5802
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2020-01-21
|
11 | (System) | Received changes through RFC Editor sync (added Verified Errata tag) |
2018-12-20
|
11 | (System) | Received changes through RFC Editor sync (changed abstract to 'The secure authentication mechanism most widely deployed and used by Internet application protocols is the transmission … Received changes through RFC Editor sync (changed abstract to 'The secure authentication mechanism most widely deployed and used by Internet application protocols is the transmission of clear-text passwords over a channel protected by Transport Layer Security (TLS). There are some significant security concerns with that mechanism, which could be addressed by the use of a challenge response authentication mechanism protected by TLS. Unfortunately, the challenge response mechanisms presently on the standards track all fail to meet requirements necessary for widespread deployment, and have had success only in limited use. This specification describes a family of Simple Authentication and Security Layer (SASL; RFC 4422) authentication mechanisms called the Salted Challenge Response Authentication Mechanism (SCRAM), which addresses the security concerns and meets the deployability requirements. When used in combination with TLS or an equivalent security layer, a mechanism from this family could improve the status quo for application protocol authentication and provide a suitable choice for a mandatory-to-implement mechanism for future application protocol standards. [STANDARDS-TRACK]') |
2015-10-14
|
11 | (System) | Notify list changed from sasl-chairs@ietf.org, draft-ietf-sasl-scram@ietf.org, simon@josefsson.org to simon@josefsson.org |
2010-07-13
|
11 | Cindy Morgan | State Changes to RFC Published from RFC Ed Queue by Cindy Morgan |
2010-07-13
|
11 | Cindy Morgan | [Note]: 'RFC 5802' added by Cindy Morgan |
2010-07-12
|
11 | (System) | RFC published |
2010-02-08
|
11 | (System) | New version available: draft-ietf-sasl-scram-11.txt |
2009-10-27
|
11 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2009-10-27
|
11 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2009-10-27
|
11 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2009-10-27
|
11 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2009-10-26
|
11 | Cindy Morgan | State Changes to RFC Ed Queue from Approved-announcement sent by Cindy Morgan |
2009-10-26
|
11 | (System) | IANA Action state changed to In Progress |
2009-10-26
|
11 | Amy Vezza | IESG state changed to Approved-announcement sent |
2009-10-26
|
11 | Amy Vezza | IESG has approved the document |
2009-10-26
|
11 | Amy Vezza | Closed "Approve" ballot |
2009-10-23
|
11 | (System) | Removed from agenda for telechat - 2009-10-22 |
2009-10-22
|
11 | Cindy Morgan | State Changes to Approved-announcement to be sent from IESG Evaluation by Cindy Morgan |
2009-10-22
|
11 | Lisa Dusseault | [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault |
2009-10-22
|
11 | Cullen Jennings | [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings |
2009-10-22
|
11 | Ralph Droms | [Ballot Position Update] New position, No Objection, has been recorded by Ralph Droms |
2009-10-22
|
11 | Ralph Droms | [Ballot comment] Trivial editorial nit... Section 3, 4th para: Informative Note: Implementors are encouraged to create test cases that use both username passwords … [Ballot comment] Trivial editorial nit... Section 3, 4th para: Informative Note: Implementors are encouraged to create test cases that use both username passwords with non-ASCII codepoints. change to "username and passwords" |
2009-10-22
|
11 | Tim Polk | [Ballot Position Update] New position, No Objection, has been recorded by Tim Polk |
2009-10-22
|
11 | Magnus Westerlund | [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund |
2009-10-22
|
11 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko |
2009-10-21
|
11 | Ross Callon | [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon |
2009-10-21
|
11 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley |
2009-10-21
|
11 | Robert Sparks | [Ballot Position Update] New position, No Objection, has been recorded by Robert Sparks |
2009-10-21
|
11 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica |
2009-10-20
|
11 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded by Adrian Farrel |
2009-10-13
|
11 | Alexey Melnikov | [Ballot Position Update] New position, Recuse, has been recorded by Alexey Melnikov |
2009-10-12
|
11 | Pasi Eronen | Placed on agenda for telechat - 2009-10-22 by Pasi Eronen |
2009-10-12
|
11 | Pasi Eronen | State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Pasi Eronen |
2009-10-12
|
11 | Pasi Eronen | [Ballot Position Update] New position, Yes, has been recorded for Pasi Eronen |
2009-10-12
|
11 | Pasi Eronen | Ballot has been issued by Pasi Eronen |
2009-10-12
|
11 | Pasi Eronen | Created "Approve" ballot |
2009-10-12
|
10 | (System) | New version available: draft-ietf-sasl-scram-10.txt |
2009-10-07
|
09 | (System) | New version available: draft-ietf-sasl-scram-09.txt |
2009-10-02
|
08 | (System) | New version available: draft-ietf-sasl-scram-08.txt |
2009-09-28
|
11 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2009-09-25
|
11 | Amanda Baber | IANA comments: Action 1: Upon approval of this document, IANA will make the following assignments in the "SIMPLE AUTHENTICATION AND SECURITY LAYER (SASL) MECHANISMS" registry … IANA comments: Action 1: Upon approval of this document, IANA will make the following assignments in the "SIMPLE AUTHENTICATION AND SECURITY LAYER (SASL) MECHANISMS" registry at http://www.iana.org/assignments/sasl-mechanisms Note: SCRAM-* mechanisms allocated via IETF Review MECHANISMS USAGE REFERENCE OWNER ---------- ----- --------- ----- SCRAM-* COMMON [RFC-sasl-scram-07] IETF SASL WG SCRAM-SHA-1 COMMON [RFC-sasl-scram-07] IETF SASL WG SCRAM-SHA-1-PLUS COMMON [RFC-sasl-scram-07] IETF SASL WG Action 2: Upon approval of this document, IANA will make the following assignment in "iso.org.dod.internet.security.mechanisms (1.3.6.1.5.5)" at http://www.iana.org/assignments/smi-numbers Decimal Name Description References ------- ---- ------------------------------------ ---------- TBD scram Salted Challenge Response [RFC-sasl-scram-07] We understand the above to be the only IANA Actions for this document. |
2009-09-18
|
11 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Ran Canetti |
2009-09-18
|
11 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Ran Canetti |
2009-09-14
|
11 | Amy Vezza | Last call sent |
2009-09-14
|
11 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2009-09-14
|
11 | Pasi Eronen | State Changes to Last Call Requested from AD Evaluation::AD Followup by Pasi Eronen |
2009-09-14
|
11 | Pasi Eronen | Last Call was requested by Pasi Eronen |
2009-09-14
|
11 | (System) | Ballot writeup text was added |
2009-09-14
|
11 | (System) | Last call text was added |
2009-09-14
|
11 | (System) | Ballot approval text was added |
2009-09-10
|
07 | (System) | New version available: draft-ietf-sasl-scram-07.txt |
2009-09-09
|
11 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2009-09-09
|
06 | (System) | New version available: draft-ietf-sasl-scram-06.txt |
2009-09-09
|
11 | Pasi Eronen | State Changes to AD Evaluation::Revised ID Needed from AD Evaluation by Pasi Eronen |
2009-09-08
|
11 | Pasi Eronen | State Changes to AD Evaluation from Publication Requested by Pasi Eronen |
2009-09-08
|
11 | Pasi Eronen | [Note]: 'Simon Josefsson (simon@josefsson.org) is the document shepherd' added by Pasi Eronen |
2009-08-27
|
11 | Cindy Morgan | (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the … (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? Simon Josefsson is the document shepherd for this document. The document is ready for publication. (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? This document was reviewed by several active and experienced SASL WG members. So there are no concerns about the depth of the reviews. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? No concerns. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. No specific concerns. No IPR disclosure was filed for this document. (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? There is solid WG consensus behind the document. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) No. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See http://www.ietf.org/ID-Checklist.html and http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type and URI type reviews? idnits 2.11.12 was used to verify the document. It reports some missing references, but all appears to be errors in the tool. (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. The references are split between normative and informative, but also separates the normative references for GSS-API implementers with the intention that non-GSS-API implementers do not have to read the GSS-API normative references. There is one downward normative reference to an IANA registration: [tls-unique] Zhu, L., "Registration of TLS unique channel binding (generic)", IANA http://www.iana.org/assignments/ channel-binding-types/tls-unique, July 2008. The IANA page contains information that needs to be read by implementers. The same information is available in draft-altman-tls-channel-bindings-05 and the WG considered waiting for that document to be published, but preferred to downref the IANA page instead and added an informative reference to the I-D. This downref needs to be mentioned in the IETF last call. (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC2434]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? IANA considerations section exists. The document defines and registers a SASL mechanism family. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? The document contains ABNF rules which passes Bill Fenner's ABNF Parser. (The tool complains about a missing OCTET symbol, but that is defined by RFC 5234 so it appears to be a tool limitiation.) (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up? Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary Relevant content can frequently be found in the abstract and/or introduction of the document. If not, this may be an indication that there are deficiencies in the abstract or introduction. The secure authentication mechanism most widely deployed and used by Internet application protocols is the transmission of clear-text passwords over a channel protected by Transport Layer Security (TLS). There are some significant security concerns with that mechanism, which could be addressed by the use of a challenge response authentication mechanism protected by TLS. Unfortunately, the challenge response mechanisms presently on the standards track all fail to meet requirements necessary for widespread deployment, and have had success only in limited use. This specification describes a family of Simple Authentication and Security Layer (SASL, RFC 4422) authentication mechanisms called the Salted Challenge Response Authentication Mechanism (SCRAM), which addresses the security concerns and meets the deployability requirements. When used in combination with TLS or an equivalent security layer, a mechanism from this family could improve the status-quo for application protocol authentication and provide a suitable choice for a mandatory-to-implement mechanism for future application protocol standards. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? There were significant and long discussions over several design choices, worth mentioning are: 1) Hash function. The decision was to define a SASL mechanism family to allow for future extension, but not register it as a family in the IANA registry. The decision is to use HMAC-SHA-1 as the initial default, and to register SCRAM-SHA-1* the mechanism name. The alternatives considered were HMAC-MD5 and HMAC-SHA-2. HMAC-SHA-1 was the compromise proposal. I believe that today this approach has strong support in the WG. 2) Channel binding type negotiation. After long considerations, it was decided to leave channel binding type negotiation external to SCRAM and to provide a default of tls-unique. This simplify the design and makes it easy to implement in popular configurations (i.e., together with TLS). I believe that today this approach has strong support in the WG. 3) IANA policy. Two aspects have been considered. First, whether to actually register a SASL mechanism family or just define a family and register the two family members as separate mechanism names. The conclusion has been to register a family. Secondly, the registration policy has been discussed. My impression is that nobody feels strongly about the issue but there are minor concerns that is now hopefully sufficiently well addressed. Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? There are several early experimental implementations and more implementers are interested. Personnel Who is the Document Shepherd for this document? Who is the Responsible Area Director? Simon Josefsson is the document shepherd for this document. |
2009-08-27
|
11 | Cindy Morgan | Draft Added by Cindy Morgan in state Publication Requested |
2009-08-27
|
11 | Cindy Morgan | [Note]: 'Simon Josefsson (simon@josefsson.org) is the document shepherd' added by Cindy Morgan |
2009-08-26
|
05 | (System) | New version available: draft-ietf-sasl-scram-05.txt |
2009-07-31
|
04 | (System) | New version available: draft-ietf-sasl-scram-04.txt |
2009-07-30
|
03 | (System) | New version available: draft-ietf-sasl-scram-03.txt |
2009-07-08
|
02 | (System) | New version available: draft-ietf-sasl-scram-02.txt |
2009-05-26
|
01 | (System) | New version available: draft-ietf-sasl-scram-01.txt |
2009-05-23
|
00 | (System) | New version available: draft-ietf-sasl-scram-00.txt |