[Date Prev][Date Next] [Chronological] [Thread] [Top]

re cross-certification questions (a short rant)



> Could you point me at any examples or papers describing the use of
> Kerberos  SASL mechanisms on the wide-area Internet, especially where
> the client and  server are located in different organizations?  

I presume that here you meant to say "Kerberos mechanisms" -- because it is 
essentially irrelevant whether they were initiated via SASL or not.

No, I don't have any references at my fingertips, but have queried 
krb-protocol@MIT.EDU to see if they know.

Yes, there is cross-certification facilities in kerberos, and it nominally 
works. However, it features n**2 scaling issues.

Kerberos scales quite well as a primary key distribution protocol within an 
administrative domain. Such domains may contain non-trivial numbers of people. 
Stanford, UMich, and MIT are prime examples. Nearly 40K people (and growing) 
in our case. UMich is significantly larger. I'm not sure about MIT.

> There is specification work going in PKIX and elsewhere on how to handle
> cross-certification for use by Start TLS, but I am not familar with
> that kind of activity for Kerberos. 

By "Start TLS", I'm assuming you meant to say simply "TLS". 

Yes, cross-certification seems to be a large-in-scope subtle-but-important 
issue.

Nominally, public-key-based (i.e. asymmetric) ciphersuites will scale better 
across administrative domains than secret-key (symmetric) ones -- because you 
just hand your public key out to everyone and forget about it. BUT, the rub 
comes when people who've ended up with your key want some assurance that it is 
indeed your key -- they want to know how much to trust it, and need some way 
to figure this out. This is, I think, what the PK-based security mechanism 
folks are talking about (at a high level) when they say "cross-certification"

I tend to believe that at a high level, the PK-based folks' real-world 
cross-certification scaling issues are of roughly the same order of magnitude 
as the secret-key-based folks'.

That said, I think that authentication across administrative domain boundaries 
on the Internet at large is presently a research topic, and we should not let 
trying to accommodate it hold up our present work. I.e. we should not forgo 
profiling Kerberos with LDAP just because it has cross-certification (i.e. 
cross-admin-domain) scaling issues.

Note that mechanisms such as Kerberos (and CRAM-MD5) being "intra-" 
administrative domain solutions ~does not~ necessarily mean they are 
topologically limited. This is an important point for overall security of 
intranets (and thus by implication, the Internet). For example, when I grab my 
laptop and travel to IETF meetings and then connect back to Stanford (e.g. my 
desktop machine in my office, plus our AFS-based distributed file system) from 
the IETF terminal room, I'm authenticated via Kerberos and my sessions are 
encrypted - no passwords in the clear. We essentially provide ourselves a 
Virtal Private Network capability with this technology, and have been doing it 
for quite a while.

Thus, we ~can~ address, with mechanisms such as Kerberos (and even CRAM-MD5), 
the immediate non-trivial security issues ~within~ administrative domains and 
without topological restrictions.

I think that that is very worthwhile. I also think that we, as application 
protocol designers & implementors & deployers, can worry about explicitly 
facilitating cross-administrative domain security when the real-world issues 
are better understood and addressed by the security mechanism designers and 
implementors.

Jeff