[AFS3-std] New Version Notification for draft-wilkinson-afs3-rxgk-04.txt (fwd)

Benjamin Kaduk kaduk@MIT.EDU
Tue, 2 Apr 2013 15:23:19 -0400 (EDT)


On Thu, 21 Mar 2013, Benjamin Kaduk wrote:

> This is git revision 4a3fa6e.
>
> I believe that this draft addresses all known issues that have been raised.

If there continues to be an absence of comments, I'll go ahead and ask the 
chairs to start a last call.

Some potentially interesting changes in the history (git log --reverse, 
trimmed to remove trivial stuff):


commit 36f0d81920566898704d77978bc597e5aea77a68
Author: Ben Kaduk <kaduk@mit.edu>
Date:   Wed Mar 20 11:35:01 2013 -0400

     Improve wording for actions when bytelife exceeded

     We just want to rekey, not "establish a new context", whatever
     that is.  Conveniently, we have a section to link to for this.

     Change-Id: I210115c7b6c864729012758a367c8295b7e1c6f8

commit 9efada0c5848f0c01a0c49cfbfe395cd520e1248
Author: Ben Kaduk <kaduk@mit.edu>
Date:   Wed Mar 20 14:16:35 2013 -0400

     Add some guidance on nonce lengths for key negotiation

     The client nonce is transmitted in the clear and as such does not
     really add entropy to the generated master key.  It does help ensure
     that the generated key is unique, e.g., if a kerberos service ticket
     is used to establish multiple GSS security contexts, though.
     Arguably more importantly, the client nonce also is included in the
     MIC of the startparams, and as such serves to prevent a replay attack
     of the returned MIC in concert with a MITM downgrade attack on the
     actual StartParams received by the server.

     The server nonce is wrapped in the GSS security context and does
     contribute real entropy to the resultant key; however, only as many
     bits of entropy as will be used for the key could possibly be useful.

     Change-Id: I711d955d9767482de366b2be192dfdcc56c1fce7

commit c623f0529227d9cb4b5e0f4dbb7b6a2269480ec4
Author: Ben Kaduk <kaduk@mit.edu>
Date:   Wed Mar 20 14:37:28 2013 -0400

     Security considerations on nonce lengths

     Change-Id: Iacd5db483f3a0f1953e4aa513106a6ff286a25c7

commit 43a0e9ce7bf471290fa26cf55860d33a6cac7305
Author: Ben Kaduk <kaduk@mit.edu>
Date:   Wed Mar 20 14:51:10 2013 -0400

     Attempt to be more clear about encrypted payloads

     We call the encrypt() routine.  The output bits are what goes on the
     wire.  Straightforward, right?

     Change-Id: I5cff4fdd59926d51cbb25e7649bda8358dc13c36

commit a9177ee165352b7ceea8d1def4e8fd753bee527c
Author: Ben Kaduk <kaduk@mit.edu>
Date:   Wed Mar 20 15:33:24 2013 -0400

     Supply bounds for variable-length arrays

     Define constants and use them.

     There is no limit for the RXGK_Data typedef at this time, though that
     is perhaps the most important case to consider.  Such a limit should
     probably be merged in with a prospective limit on the generic OpenAFS
     rx_opaque type.

     The authenticator limit implicitly limits the appdata and call_numbers
     fields, so separate limits are not needed there.

     Change-Id: I40067823738aa8ff0bbf62d1706abe8924f34e3a

commit 0148161da8ec45eeea037866516932fe65639083
Author: Ben Kaduk <kaduk@mit.edu>
Date:   Wed Mar 20 16:53:53 2013 -0400

     Use "security sensitive" buzzword for errorcode fields

     GSSNegotiate and CombineTokens have errorcode fields in their return
     structures, in order to hold security sensitive error codes.
     That is, codes which will change the security behavior of the client
     that receives them.  Mention this justification where these fields are used.

     Change-Id: I9f02391d2fca8ce5f0159d95688968c963bf2ac0

commit 609042d180bdc7603f5fe08e98c3fe136818fac8
Author: Ben Kaduk <kaduk@mit.edu>
Date:   Thu Mar 21 18:02:14 2013 -0400

     wordsmith bytelife discussion

     Change-Id: I7f3c55939b2b0c2aba856830998f5a3d664497e5

commit 3b71f31726bc7cbd3974c8dec492b916ed7795b5
Author: Ben Kaduk <kaduk@mit.edu>
Date:   Thu Mar 21 18:03:55 2013 -0400

     Wordsmith GSS negotiation loop a bit

     Note that we can get either one or both of an output token and
     output opaque.

     Change-Id: I7c8bde960c4b91561480efe0e65c93b8059560cf

commit 8779a484e6cee958c2be48a591202004a511a8c2
Author: Ben Kaduk <kaduk@mit.edu>
Date:   Thu Mar 21 18:07:17 2013 -0400

     Reorder ClientInfo discussion slightly

     Talk about errors first, then success.

     Also note that the client should verify that confidentiality
     protection was applied to the wrapped message.

     Change-Id: I2b0ab9be31e59656f72506813953b008134a4795

commit c58cdbfbfd286e5d028204e2e5bd756313049680
Author: Ben Kaduk <kaduk@mit.edu>
Date:   Thu Mar 21 18:14:37 2013 -0400

     Mention ReceivePacket handling

     It's just the inverse of PreparePacket (basically), but we also
     have to check the connection information to get the security
     properties that we want.

     Change-Id: I0a23fcf3f3c5849ea5afc75799540fde6516b6ee



-Ben