2 NETWORK WORKING GROUP L. Zhu
3 Internet-Draft K. Jaganathan
4 Expires: February 8, 2005 Microsoft Corporation
10 OCSP Support for PKINIT
11 draft-ietf-krb-wg-ocsp-for-pkinit-00
15 This document is an Internet-Draft and is subject to all provisions
16 of section 3 of RFC 3667. By submitting this Internet-Draft, each
17 author represents that any applicable patent or other IPR claims of
18 which he or she is aware have been or will be disclosed, and any of
19 which he or she become aware will be disclosed, in accordance with
22 Internet-Drafts are working documents of the Internet Engineering
23 Task Force (IETF), its areas, and its working groups. Note that
24 other groups may also distribute working documents as
27 Internet-Drafts are draft documents valid for a maximum of six months
28 and may be updated, replaced, or obsoleted by other documents at any
29 time. It is inappropriate to use Internet-Drafts as reference
30 material or to cite them other than as "work in progress."
32 The list of current Internet-Drafts can be accessed at
33 http://www.ietf.org/ietf/1id-abstracts.txt.
35 The list of Internet-Draft Shadow Directories can be accessed at
36 http://www.ietf.org/shadow.html.
38 This Internet-Draft will expire on February 8, 2005.
42 Copyright (C) The Internet Society (2004).
46 This document defines a mechanism to enable in-band transmission of
47 OCSP responses. These responses are used to verify the validity of
48 the certificates used in PKINIT - the Kerberos Version 5 extension
49 that provides for the use of public key cryptography.
54 Zhu, et al. Expires February 8, 2005 [Page 1]
56 Internet-Draft OCSP Support for PKINIT August 2004
61 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
62 2. Conventions Used in This Document . . . . . . . . . . . . . . 4
63 3. Message Definition . . . . . . . . . . . . . . . . . . . . . . 5
64 4. Security Considerations . . . . . . . . . . . . . . . . . . . 6
65 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 7
66 6. References . . . . . . . . . . . . . . . . . . . . . . . . . . 7
67 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 7
68 Intellectual Property and Copyright Statements . . . . . . . . 9
110 Zhu, et al. Expires February 8, 2005 [Page 2]
112 Internet-Draft OCSP Support for PKINIT August 2004
117 Online Certificate Status Protocol (OCSP) [RFC2560] enables
118 applications to obtain timely information regarding the revocation
119 status of a certificate. Because OCSP responses are well-bounded and
120 small in size, constrained clients may wish to use OCSP to check the
121 validity of KDC certificates in order to avoid transmission of large
122 Certificate Revocation Lists (CRLs) and therefore save bandwidth on
123 constrained networks.
125 This document defines a pre-authentication type [CLARIFICATIONS],
126 where the client and the KDC MAY piggyback OCSP responses for
127 certificates used in authentication exchanges, as defined in
130 By using this OPTIONAL extension, PKINIT clients and the KDC can
131 maximize the reuse of cached OCSP responses.
166 Zhu, et al. Expires February 8, 2005 [Page 3]
168 Internet-Draft OCSP Support for PKINIT August 2004
171 2. Conventions Used in This Document
173 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
174 "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
175 document are to be interpreted as described in [RFC2119].
222 Zhu, et al. Expires February 8, 2005 [Page 4]
224 Internet-Draft OCSP Support for PKINIT August 2004
227 3. Message Definition
229 A pre-authentication type identifier is defined for this mechanism:
231 PA-PK-OCSP-RESPONSE 16
233 The corresponding pre-authentication field contains OCSP data as
236 PA-PK-OCSP-DATA ::= SEQUENCE OF OcspResponse
238 OcspResponse ::= OCTET STRING
239 -- contains a complete OCSP response,
240 -- defined in [RFC2560]
242 The client MAY send OCSP responses for certificates used in
243 PA-PK-AS-REQ via a PA-PK-OCSP-RESPONSE.
245 The KDC that receives a PA-PK-OCSP-RESPONSE the SHOULD send a
246 PA-PK-OCSP-RESPONSE in response. The client can request a
247 PA-PK-OCSP-RESPONSE by using an empty sequence in its request.
249 Note the lack of integrity protection for the empty or missing OCSP
250 response; lack of an expected OCSP response from the KDC for the
251 KDC's certificates SHOULD be treated as an error by the client,
252 unless it is configured otherwise.
254 When using OCSP, the response is signed by the OCSP server, which is
255 trusted by the receiver. Depending on local policy, further
256 verification of the validity of the OCSP servers MAY need to be done.
258 The client and the KDC SHOULD ignore invalid OCSP responses received
259 via this mechanism, and they MAY implement CRL processing logic as a
260 fall-back position, if the OCSP responses received via this mechanism
261 alone are not sufficient for the verification of certificate
262 validity. The client and/or the KDC MAY ignore a valid OCSP response
263 and perform their own revocation status verification independently.
265 The KDC MAY send a PA-PK-OCSP-RESPONSE when it does not receive a
266 PA-PK-OCSP-RESPONSE from the client.
278 Zhu, et al. Expires February 8, 2005 [Page 5]
280 Internet-Draft OCSP Support for PKINIT August 2004
283 4. Security Considerations
285 The pre-authentication data in this document do not actually
286 authenticate any principals, and MUST be used in conjunction with
289 There is a downgrade attack against clients which want OCSP responses
290 from the KDC for the KDC's certificates. The clients, however, can
291 treat the absence of valid OCSP responses as an error, based on their
334 Zhu, et al. Expires February 8, 2005 [Page 6]
336 Internet-Draft OCSP Support for PKINIT August 2004
339 5. IANA Considerations
341 This document defines a new pre-authentication type for use with
342 PKINIT to encode OCSP responses. The official value for this padata
343 identifier need to be acquired from IANA.
348 Neuman, B., Yu, Y., Hartman, S. and K. Raeburn, "The
349 Kerberos Network Authentication Service (V5)",
350 draft-ietf-krb-wg-kerberos-clarifications, Work in
353 [PKINIT] Tung, B. and B. Neuman, "Public Key Cryptography for
354 Initial Authentication in Kerberos",
355 draft-ietf-cat-kerberos-pk-init, Work in progress.
357 [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
358 Requirement Levels", BCP 14, RFC 2119, March 1997.
360 [RFC2560] Myers, M., Ankney, R., Malpani, A., Galperin, S. and C.
361 Adams, "X.509 Internet Public Key Infrastructure Online
362 Certificate Status Protocol - OCSP", RFC 2560, June 1999.
368 Microsoft Corporation
373 EMail: lzhu@microsoft.com
377 Microsoft Corporation
382 EMail: karthikj@microsoft.com
392 Zhu, et al. Expires February 8, 2005 [Page 7]
394 Internet-Draft OCSP Support for PKINIT August 2004
403 EMail: Nicolas.Williams@sun.com
448 Zhu, et al. Expires February 8, 2005 [Page 8]
450 Internet-Draft OCSP Support for PKINIT August 2004
453 Intellectual Property Statement
455 The IETF takes no position regarding the validity or scope of any
456 Intellectual Property Rights or other rights that might be claimed to
457 pertain to the implementation or use of the technology described in
458 this document or the extent to which any license under such rights
459 might or might not be available; nor does it represent that it has
460 made any independent effort to identify any such rights. Information
461 on the procedures with respect to rights in RFC documents can be
462 found in BCP 78 and BCP 79.
464 Copies of IPR disclosures made to the IETF Secretariat and any
465 assurances of licenses to be made available, or the result of an
466 attempt made to obtain a general license or permission for the use of
467 such proprietary rights by implementers or users of this
468 specification can be obtained from the IETF on-line IPR repository at
469 http://www.ietf.org/ipr.
471 The IETF invites any interested party to bring to its attention any
472 copyrights, patents or patent applications, or other proprietary
473 rights that may cover technology that may be required to implement
474 this standard. Please address the information to the IETF at
478 Disclaimer of Validity
480 This document and the information contained herein are provided on an
481 "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
482 OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
483 ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
484 INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
485 INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
486 WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
491 Copyright (C) The Internet Society (2004). This document is subject
492 to the rights, licenses and restrictions contained in BCP 78, and
493 except as set forth therein, the authors retain all their rights.
498 This document was based on conversations among the authors, Jeffrey
499 Altman, Sam Hartman, Martin Rex, and other members of the Kerberos
503 Zhu, et al. Expires February 8, 2005 [Page 9]