Kerberos (krb-wg)
-----------------

 Charter
 Last Modified: 2007-11-12

 Current Status: Active Working Group

 Chair(s):
     Jeffrey Hutzelman  <jhutz@cmu.edu>
     Larry Zhu  <lzhu@windows.microsoft.com>

 Security Area Director(s):
     Tim Polk  <tim.polk@nist.gov>
     Sam Hartman  <hartmans-ietf@mit.edu>

 Security Area Advisor:
     Sam Hartman  <hartmans-ietf@mit.edu>

 Mailing Lists: 
     General Discussion:ietf-krb-wg@lists.anl.gov
     To Subscribe:      https://lists.anl.gov/mailman/listinfo/ietf-krb-wg
     Archive:           https://lists.anl.gov/pipermail/ietf-krb-wg/

Description of Working Group:

Kerberos over the years has been ported to virtually every operating
system. There are at least two open source versions, with numerous
commercial versions based on these and other proprietary 
implementations. Kerberos evolution has continued in recent years, 
with the development of a new crypto framework, publication of a new 
version of the Kerberos specification, support for initial 
authentication using public keys, and numerous extensions developed in 
and out of the IETF.

However, wider deployment and advances in technology bring with them 
both new challenges and new opportunities, particularly with regard to 
making initial authentication of users to the Kerberos system both 
convenient and secure. In addition, several key features remain 
undefined.

The Kerberos Working Group will continue to improve the core Kerberos
specification, develop extensions to address new needs and technologies
related to improving the process of client authentication, and produce
specifications for missing functionality.


Specifically, the Working Group will:

* Complete existing work:
- ECC for PKINIT (draft-zhu-pkinit-ecc-03.txt)
- Set/Change Password 
(draft-ietf-krb-wg-kerberos-set-passwd-05.txt)
- Naming Constraints (draft-ietf-krb-wg-naming-02.txt)
- Anonymity (draft-ietf-krb-wg-anon-03.txt)
- Hash agility for GSS-KRB5 
(draft-ietf-krb-wg-gss-cb-hash-agility-00.txt)
- Hash agility for PKINIT (draft-ietf-krb-wg-pkinit-alg-agility-01.txt)
- Referrals (draft-ietf-krb-wg-kerberos-referrals-08.txt)

* Prepare and advance a specification for an updated, backward-
compatible version of the Kerberos version 5 protocol which supports 
non-ASCII principal and realm names, salt strings, and passwords; 
insures that those portions of the protocol which are not encrypted 
are nonetheless authenticated whenever possible; and enables future 
protocol revisions and extensions.

* Develop extensions which reduce or eliminate exposure of Kerberos
clients' long-term keys to attack and enable the use of alternate
mechanisms for initial authentication. This task will comprise the
following items:
- A model and framework for preauthentication mechanisms
- A mechanism for providing a protected channel for carrying
preauthentication data and/or a reply key between a Kerberos
client and KDC, within the KDC_REQ/KDC_REP exchange.
- Support for One-Time Passwords
- Support for hardware authentication tokens
- Support for using TLS to secure communications with Kerberos KDCs.

* Examine issues related to the current cross-realm model, produce a
list of problems to be solved, and evaluate approaches to solving them.

* Develop extensions to Kerberos and a GSS-API mechanism (IAKERB) to
enable Kerberos clients to communicate with a KDC by using a GSS-API
acceptor as a proxy.

* Produce a data model for information needed by the KDC, and an LDAP
schema for management of that data.

 Goals and Milestones:

   Done         First meeting 

   Done         Submit the Kerberos Extensions document to the IESG for 
                consideration as a Proposed standard. 

   Done         Complete first draft of Pre-auth Framework 

   Done         Complete first draft of Extensions 

   Done         Submit K5-GSS-V2 document to IESG for consideration as a 
                Proposed Standard 

   Done         Last Call on OCSP for PKINIT 

   Done         Consensus on direction for Change/Set password 

   Done         PKINIT to IESG 

   Done         Enctype Negotiation to IESG 

   Done         Last Call on PKINIT ECC 

   Done         TCP Extensibility to IESG 

   Jul 2007       Set/Change Password to IESG 

   Jul 2007       Naming Constraints to IESG 

   Done         ECC for PKINIT to IESG 

   Aug 2007       Anonymity to IESG 

   Aug 2007       Hash agility for GSS-KRB5 to IESG 

   Aug 2007       Hash agility for PKINIT to IESG 

   Aug 2007       Choose direction for Kerberos v5.3 

   Sep 2007       WGLC on preauth framework 

   Nov 2007       WGLC on OTP 

   Nov 2007       WGLC on hardware preauth 

   Dec 2007       WGLC on data model 

   Dec 2007       WGLC on cross-realm issues 

   Jan 2008       WGLC on STARTTLS 

   Jan 2008       WGLC on Referrals 

   Mar 2008       WGLC on Kerberos v5.3 

   Mar 2008       WGLC on IAKERB 

   Mar 2008       WGLC on LDAP schema 


 Internet-Drafts:

Posted Revised         I-D Title   <Filename>
------ ------- --------------------------------------------
May 2003 Sep 2007   <draft-ietf-krb-wg-kerberos-set-passwd-07.txt>
                Kerberos Set/Change Key/Password Protocol Version 2 

Sep 2005 Oct 2007   <draft-zhu-pkinit-ecc-04.txt>
                ECC Support for PKINIT 

Jun 2006 Jan 2008   <draft-ietf-krb-wg-anon-05.txt>
                Anonymity Support for Kerberos 

Jun 2006 Oct 2007   <draft-ietf-krb-wg-naming-04.txt>
                Additional Kerberos Naming Constraints 

Nov 2006 Nov 2007   <draft-ietf-krb-wg-gss-cb-hash-agility-03.txt>
                Kerberos Version 5 GSS-API Channel Binding Hash Agility 

Oct 2007 Dec 2007   <draft-ietf-krb-wg-cross-problem-statement-02.txt>
                Problem statement on the cross-realm operation of Kerberos 

Oct 2007 Jan 2008   <draft-ietf-krb-wg-otp-preauth-02.txt>
                OTP Preauthentication 

Oct 2007 Oct 2007   <draft-ietf-krb-wg-iakerb-00.txt>
                Initial and Pass Through Authentication Using Kerberos V5 and 
                the GSS- API (IAKERB) 

Dec 2007 Dec 2007   <draft-ietf-krb-wg-kdc-model-00.txt>
                An information model for Kerberos version 5 

 Request For Comments:

  RFC   Stat Published     Title
------- -- ----------- ------------------------------------
RFC3962Standard  Feb 2005    AES Encryption for Kerberos 5 

RFC3961Standard  Feb 2005    Encryption and Checksum Specifications for Kerberos 5 

RFC4120Standard  Jul 2005    The Kerberos Network Authentication Service (V5) 

RFC4121Standard  Jul 2005    The Kerberos Version 5 Generic Security Service 
                       Application Program Interface (GSS-API) Mechanism: 
                       Version 2 

RFC4537 PS   Jun 2006    Kerberos Cryptosystem Negotiation Extension 

RFC4557 PS   Jun 2006    Online Certificate Status Protocol (OCSP) Support for 
                       Public Key Cryptography for Initial Authentication in 
                       Kerberos (PKINIT) 

RFC4556 PS   Jun 2006    Public Key Cryptography for Initial Authentication in 
                       Kerberos (PKINIT) 

RFC5021 PS   Aug 2007    Extended Kerberos Version 5 Key Distribution Center 
                       (KDC) Exchanges Over TCP