3
NETWORK WORKING GROUP L. Zhu
4
Internet-Draft K. Jaganathan
5
Expires: August 4, 2005 Microsoft Corporation
11
OCSP Support for PKINIT
12
draft-ietf-krb-wg-ocsp-for-pkinit-04
16
This document is an Internet-Draft and is subject to all provisions
17
of Section 3 of RFC 3667. By submitting this Internet-Draft, each
18
author represents that any applicable patent or other IPR claims of
19
which he or she is aware have been or will be disclosed, and any of
20
which he or she become aware will be disclosed, in accordance with
23
Internet-Drafts are working documents of the Internet Engineering
24
Task Force (IETF), its areas, and its working groups. Note that
25
other groups may also distribute working documents as
28
Internet-Drafts are draft documents valid for a maximum of six months
29
and may be updated, replaced, or obsoleted by other documents at any
30
time. It is inappropriate to use Internet-Drafts as reference
31
material or to cite them other than as "work in progress."
33
The list of current Internet-Drafts can be accessed at
34
http://www.ietf.org/ietf/1id-abstracts.txt.
36
The list of Internet-Draft Shadow Directories can be accessed at
37
http://www.ietf.org/shadow.html.
39
This Internet-Draft will expire on August 4, 2005.
43
Copyright (C) The Internet Society (2005).
47
This document defines a mechanism to enable in-band transmission of
48
Online Certificate Status Protocol (OCSP) responses in the Kerberos
49
network authentication protocol. These responses are used to verify
50
the validity of the certificates used in PKINIT - the Kerberos
54
Zhu, et al. Expires August 4, 2005 [Page 1]
56
Internet-Draft OCSP Support for PKINIT January 2005
59
Version 5 extension that provides for the use of public key
64
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
65
2. Conventions Used in This Document . . . . . . . . . . . . . . 3
66
3. Message Definition . . . . . . . . . . . . . . . . . . . . . . 3
67
4. Security Considerations . . . . . . . . . . . . . . . . . . . 4
68
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5
69
6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 5
70
7. References . . . . . . . . . . . . . . . . . . . . . . . . . . 5
71
7.1 Normative References . . . . . . . . . . . . . . . . . . . 5
72
7.2 Informative References . . . . . . . . . . . . . . . . . . 5
73
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 5
74
Intellectual Property and Copyright Statements . . . . . . . . 7
110
Zhu, et al. Expires August 4, 2005 [Page 2]
112
Internet-Draft OCSP Support for PKINIT January 2005
117
Online Certificate Status Protocol (OCSP) [RFC2560] enables
118
applications to obtain timely information regarding the revocation
119
status of a certificate. Because OCSP responses are well-bounded and
120
small in size, constrained clients may wish to use OCSP to check the
121
validity of the certificates for Kerberos Key Distribution Center
122
(KDC) in order to avoid transmission of large Certificate Revocation
123
Lists (CRLs) and therefore save bandwidth on constrained networks
126
This document defines a pre-authentication type [CLARIFICATIONS],
127
where the client and the KDC MAY piggyback OCSP responses for
128
certificates used in authentication exchanges, as defined in
131
By using this OPTIONAL extension, PKINIT clients and the KDC can
132
maximize the reuse of cached OCSP responses.
134
2. Conventions Used in This Document
136
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
137
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
138
document are to be interpreted as described in [RFC2119].
140
3. Message Definition
142
A pre-authentication type identifier is defined for this mechanism:
144
PA-PK-OCSP-RESPONSE 16
146
The corresponding padata-value field [CLARIFICATIONS] contains the
147
DER [X60] encoding of the following ASN.1 type:
149
PKOcspData ::= SEQUENCE OF OcspResponse
151
OcspResponse ::= OCTET STRING
152
-- contains a complete OCSP response,
153
-- defined in [RFC2560]
155
The client MAY send OCSP responses for certificates used in
156
PA-PK-AS-REQ [PKINIT] via a PA-PK-OCSP-RESPONSE.
158
The KDC that receives a PA-PK-OCSP-RESPONSE then SHOULD send a
159
PA-PK-OCSP-RESPONSE containing OCSP responses for certificates used
160
in the KDC's PA-PK-AS-REP. The client can request a
161
PA-PK-OCSP-RESPONSE by using a PKOcspData containing an empty
166
Zhu, et al. Expires August 4, 2005 [Page 3]
168
Internet-Draft OCSP Support for PKINIT January 2005
171
The KDC MAY send a PA-PK-OCSP-RESPONSE when it does not receive a
172
PA-PK-OCSP-RESPONSE from the client.
174
The PA-PK-OCSP-RESPONSE sent by the KDC contains OCSP responses for
175
certificates used in PA-PK-AS-REP [PKINIT].
177
Note the lack of integrity protection for the empty or missing OCSP
178
response; lack of an expected OCSP response from the KDC for the
179
KDC's certificates SHOULD be treated as an error by the client,
180
unless it is configured otherwise.
182
When using OCSP, the response is signed by the OCSP server, which is
183
trusted by the receiver. Depending on local policy, further
184
verification of the validity of the OCSP servers may be needed
186
The client and the KDC SHOULD ignore invalid OCSP responses received
187
via this mechanism, and they MAY implement CRL processing logic as a
188
fall-back position, if the OCSP responses received via this mechanism
189
alone are not sufficient for the verification of certificate
190
validity. The client and/or the KDC MAY ignore a valid OCSP response
191
and perform their own revocation status verification independently.
193
4. Security Considerations
195
The pre-authentication data in this document do not actually
196
authenticate any principals, but is designed to be used in
197
conjunction with PKINIT.
199
There is no binding between PA-PK-OCSP-RESPONSE pre-authentication
200
data and PKINIT pre-authentication data other than a given OCSP
201
response corresponding to a certificate used in a PKINIT
202
pre-authentication data element. Attacks involving removal or
203
replacement of PA-PK-OCSP-RESPONSE pre-authentication data elements
204
are, at worst, downgrade attacks, where a PKINIT client or KDC would
205
proceed without use of CRLs or OCSP for certificate validation, or
206
denial of service attacks, where a PKINIT client or KDC that cannot
207
validate the other's certificate without an accompanying OCSP
208
response might reject the AS exchange or where they might have to
209
download very large CRLs in order to continue. Kerberos V does not
210
protect against denial-of-service attacks, therefore the
211
denial-of-service aspect of these attacks are acceptable.
213
If a PKINIT client or KDC cannot validate certificates without the
214
aid of a valid PA-PK-OCSP-RESPONSE then it SHOULD fail the AS
215
exchange, possibly according to local configuration.
222
Zhu, et al. Expires August 4, 2005 [Page 4]
224
Internet-Draft OCSP Support for PKINIT January 2005
227
5. IANA Considerations
229
No IANA actions are required for this document.
233
This document was based on conversations among the authors, Jeffrey
234
Altman, Sam Hartman, Martin Rex and other members of the Kerberos
239
7.1 Normative References
242
RFC-Editor: To be replaced by RFC number for draft-ietf-
243
krb-wg-kerberos-clarifications. Work in Progress.
245
[PKINIT] RFC-Editor: To be replaced by RFC number for draft-ietf-
246
cat-kerberos-pk-init. Work in Progress.
248
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
249
Requirement Levels", BCP 14, RFC 2119, March 1997.
251
[RFC2560] Myers, M., Ankney, R., Malpani, A., Galperin, S. and C.
252
Adams, "X.509 Internet Public Key Infrastructure Online
253
Certificate Status Protocol - OCSP", RFC 2560, June 1999.
255
[X690] ASN.1 encoding rules: Specification of Basic Encoding
256
Rules (BER), Canonical Encoding Rules (CER) and
257
Distinguished Encoding Rules (DER), ITU-T Recommendation
258
X.690 (1997) | ISO/IEC International Standard 8825-1:1998.
260
7.2 Informative References
263
RFC-Editor: To be replaced by RFC number for draft-deacon-
264
lightweight-ocsp-profile. Work in Progress.
270
Microsoft Corporation
275
Email: lzhu@microsoft.com
281
Zhu, et al. Expires August 4, 2005 [Page 5]
283
Internet-Draft OCSP Support for PKINIT January 2005
287
Microsoft Corporation
292
Email: karthikj@microsoft.com
301
Email: Nicolas.Williams@sun.com
337
Zhu, et al. Expires August 4, 2005 [Page 6]
339
Internet-Draft OCSP Support for PKINIT January 2005
342
Intellectual Property Statement
344
The IETF takes no position regarding the validity or scope of any
345
Intellectual Property Rights or other rights that might be claimed to
346
pertain to the implementation or use of the technology described in
347
this document or the extent to which any license under such rights
348
might or might not be available; nor does it represent that it has
349
made any independent effort to identify any such rights. Information
350
on the procedures with respect to rights in RFC documents can be
351
found in BCP 78 and BCP 79.
353
Copies of IPR disclosures made to the IETF Secretariat and any
354
assurances of licenses to be made available, or the result of an
355
attempt made to obtain a general license or permission for the use of
356
such proprietary rights by implementers or users of this
357
specification can be obtained from the IETF on-line IPR repository at
358
http://www.ietf.org/ipr.
360
The IETF invites any interested party to bring to its attention any
361
copyrights, patents or patent applications, or other proprietary
362
rights that may cover technology that may be required to implement
363
this standard. Please address the information to the IETF at
367
Disclaimer of Validity
369
This document and the information contained herein are provided on an
370
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
371
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
372
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
373
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
374
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
375
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
380
Copyright (C) The Internet Society (2005). This document is subject
381
to the rights, licenses and restrictions contained in BCP 78, and
382
except as set forth therein, the authors retain all their rights.
387
Funding for the RFC Editor function is currently provided by the
393
Zhu, et al. Expires August 4, 2005 [Page 7]