KERBEROS ROAD MAP SAM HARTMAN MIT KERBEROS CONSORTIUM APRIL 7, 2008



Similar documents
MIT Kerberos Software Development Roadmap

Table of Contents. KITC use-case 11 June 2010 Copyright MIT-KC All Rights Reserved. Page 4 of 14

How To Use The Gss-Api And Sspi For A Security Reason On A Microsoft Microsoft Server (Or A Microsplatte)

Recommended Practices for Deploying & Using Kerberos in Mixed Environments

NIST PKI 06: Integrating PKI and Kerberos (updated April 2007) Jeffrey Altman

An Oracle White Paper Dec Oracle Access Management Security Token Service

TOPIC HIERARCHY. Distributed Environment. Security. Kerberos

WebLogic Server 7.0 Single Sign-On: An Overview

API Architecture. for the Data Interoperability at OSU initiative

-- Mario G. Salvadori, Why Buildings Fall Down*

A method to Implement the Kerberos User. Authentication and the secured Internet Service

SharePoint 2013 Logical Architecture

Managing Identity & Access in On-premise and Cloud Environments. Ellen Newlands Identity Management Product Manager Red Hat, Inc

Single Sign-on (SSO) technologies for the Domino Web Server

RSA SecurID Ready Implementation Guide

Overview of Recent Developments on Generic Security Services Application Programming Interface

Kerberos on z/os. Active Directory On Windows Server William Mosley z/os NAS Development. December Interaction with.

Two SSO Architectures with a Single Set of Credentials

Identity Management: The authentic & authoritative guide for the modern enterprise

WhatsUpGold. v3.0. WhatsConnected User Guide

How Reflection Software Facilitates PCI DSS Compliance

Information Technology Services Classification Level Range C Reports to. Manager ITS Infrastructure Effective Date June 29 th, 2015 Position Summary

Functions of NOS Overview of NOS Characteristics Differences Between PC and a NOS Multiuser, Multitasking, and Multiprocessor Systems NOS Server

Session 17 Windows 7 Professional DNS & Active Directory(Part 2)

ENTERPRISE LINUX SECURITY ADMINISTRATION

DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide

Introduction to SAML

GL-550: Red Hat Linux Security Administration. Course Outline. Course Length: 5 days

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)

Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation.

Securing Citrix with SSL VPN Technology

CA Performance Center

Using SAP Logon Tickets for Single Sign on to Microsoft based web applications

Design and Implementation Guide. Apple iphone Compatibility

THE NEW DIGITAL EXPERIENCE

Crawl Proxy Installation and Configuration Guide

A viable alternative to TMG / UAG Web Application security, acceleration and authentication with DenyAll s DA-WAF

CS 356 Lecture 28 Internet Authentication. Spring 2013

Proxies. Chapter 4. Network & Security Gildas Avoine

Guide to SASL, GSSAPI & Kerberos v.6.0

Integration with Active Directory. Jeremy Allison Samba Team

Administering Jive Mobile Apps

Extend and Enhance AD FS

GL550 - Enterprise Linux Security Administration

SAP Mobile - Webinar Series SAP Mobile Platform 3.0 Security Concepts and Features

Using WhatsUp IP Address Manager 1.0

Implementing a Kerberos Single Sign-on Infrastructure

ENTERPRISE LINUX SECURITY ADMINISTRATION

Cross-Realm Trust Interoperability, MIT Kerberos and AD

Security Provider Integration Kerberos Authentication

Secure the Web: OpenSSO

Securing WebFOCUS A Primer. Bob Hoffman Information Builders

ProxySG TechBrief Enabling Transparent Authentication

Kerberos authentication made easy on OpenVMS

Testing & Assuring Mobile End User Experience Before Production. Neotys

SDN CENTRALIZED NETWORK COMMAND AND CONTROL

ICANWK504A Design and implement an integrated server solution

Going in production Winbind in large AD domains today. Günther Deschner (Red Hat / Samba Team)

API-Security Gateway Dirk Krafzig

2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual

Configuration Guide. BES12 Cloud

Cisco Application Networking for BEA WebLogic

Embedded Web Server Security

System Services. Engagent System Services 2.06

athenahealth Interface Connectivity SSH Implementation Guide

Cisco Application Networking for IBM WebSphere

Short Thoughts on Clouds, Security, and Privacy: Colliding Mindsets, Depopulated Buildings

HP AppPulse Mobile. Whitepaper: Privacy, Security, and Overhead. Document Release Date: September 2014 (v1.0)

Cloud Computing. Adam Barker

efolder BDR for Veeam Cloud Connection Guide

ORACLE S SIEBEL BUSINESS APPLICATIONS 8.0

VXLAN: Scaling Data Center Capacity. White Paper

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date

Configuration Guide BES12. Version 12.3

Kerberos: An Authentication Service for Computer Networks by Clifford Neuman and Theodore Ts o. Presented by: Smitha Sundareswaran Chi Tsong Su

Table of Contents. 1 Executive Summary SOA Overview Technology Processes and Governance... 8

CICS Web Service Security. Anthony Papageorgiou IBM CICS Development March 13, 2012 Session: 10282

2003, Rainbow Technologies, Inc.

This presentation describes the IBM Tivoli Monitoring 6.1 Firewall Implementation: KDE Gateway Component.

Windows 2000 Security Architecture. Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

CLAIMS-BASED IDENTITY FOR WINDOWS

Juniper Networks Secure Access Kerberos Constrained Delegation

Security of information systems secure file transfer

How To Plan A Desktop Workspace Infrastructure

RSA SecurID Ready Implementation Guide

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

How To Set Up An Openfire With Libap On A Cdd (Dns) On A Pc Or Mac Or Ipad (Dnt) On An Ipad Or Ipa (Dn) On Your Pc Or Ipo (D

Embedded Web Server Security

Stateful Inspection Technology

Leveraging SAML for Federated Single Sign-on:

Configuring Integrated Windows Authentication for JBoss with SAS 9.2 Web Applications

Federated Identity in the Enterprise

How To Use Netscaler As An Afs Proxy

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

Middleware- Driven Mobile Applications

Deploying F5 with VMware View and Horizon View

Next Generation Network Firewall

Training module 2 Installing VMware View

Transcription:

KERBEROS ROAD MAP SAM HARTMAN MIT KERBEROS CONSORTIUM APRIL 7, 2008 1

GOALS OF ROAD MAP Priority discussions so far have focused on meeting short or medium term needs. We also need to establish a road map for the future. We should: Prepare Kerberos to meet future challenges so that tomorrow s Kerberos will be attractive in tomorrow s environment. Continue to lead the technology as our sponsors expect. Move forward on all pillars of our strategic vision ROAD MAP 2

STRATEGIC PILLARS We propose to make steady progress in the following areas. Kerberos on the Web Kerberos for Mobile Devices Maintaining and Securing Kerberos Vendor Independence ROAD MAP 3

HOW WE LL WORK Report progress on each pillar at board meetings. Requirements analysis, design and standardization of later items proceeds while implementation of earlier items are in progress. ROAD MAP 4

KERBEROS ON THE WEB 5

PRIORITIES Understand and analyze Kerberos/web services interactions WS-* Soap XML DSIG/encryption REST SAML Gateways between Kerberos, SAML and other federation technologies Kerberos through firewalls Authentication within the enterprise Managing Identity Broader Authentication KERBEROS ON THE WEB 6

WEB SERVICES Many Kerberos users are also making a heavy investment in web services. The consortium needs to understand this technology and see where there are gaps it can fill. Examine and Analyze: Protocols How Kerberos is implemented today? Implementation quality and availability KERBEROS ON THE WEB 7

WEB SERVICES Gap Analysis: Can a Kerberos infrastructure be used to secure all parts of a web services infrastructure? Will extensions to Kerberos break Kerberos integration into web services? Are implementations of these standards sufficiently available to meet customer needs? Is there sufficient documentation? What We Can Do: Improve standards and documentation. Add necessary support in Kerberos implementation. Identify gaps, but probably not write web services code ourselves. KERBEROS ON THE WEB 8

GATEWAYS TO FEDERATION TECHNOLOGY Kerberos is used alongside SAML and other authentication technologies between organizations. Little thought has been put into making this work in an interoperable manner. There are several challenges. Requesting an authority to convert from one technology to another. Translating information such as entitlements from one format to another Determining trust to assign to an authentication that has crossed mechanism boundaries KERBEROS ON THE WEB 9

KERBEROS THROUGH FIREWALLS Many companies have developed ad-hoc solutions to allow you to get Kerberos tickets over the same interface that will be used for web traffic. Firewalls near the client and server Kerberos needs to follow same path as application http://tools.ietf.org/id/draft-zhu-ws-kerb-04 may be part of the answer. KERBEROS ON THE WEB 10

AUTHENTICATION WITHIN THE ENTERPRISE Today, you need to have both a Kerberos and a certificate infrastructure to secure web authentication in the enterprise; work to remove the requirements for two security infrastructures. Improve user experience and configuration Web browsers all support Kerberos but tend to turn it off by default; find out why. Make it easier to use Kerberos and other mechanisms on the server side Work on client configuration issues. KERBEROS ON THE WEB 11

MANAGING IDENTITY Which identity should be used for a given service (Kerberos IdentityManagement)? Other identity frameworks have a variety of privacy mechanisms; can we take these mechanisms or something similar and use them in Kerberos How do you make this all usable? What we will do: Continue to work on KIM. Analyze how privacy has been addressed and what the needs are for Kerberos. KERBEROS ON THE WEB 12

BROADER AUTHENTICATION Finish requirements work for web authentication. Participate in discussions of web authentication in standards organizations. Perform market analysis to see where Kerberos used for broader web authentication would benefit people. KERBEROS ON THE WEB 13

MOBILE DEVICES 14

PRIORITIES Mobile platforms have relatively limited memory and CPU. Network bandwith is limited, packet loss relatively high and latency very high. Improve Kerberos in high-latency high-packet-loss environments. Reduce memory and CPU footprint. Facilitate Kerberos development for embedded platforms. Credential Management for Mobile Devices MOBILE DEVICES 15

NETWORK PERFORMANCE Problems: Lots of DNS traffic Multiple round trips with the KDC What we can do: Examine caching to reduce DNS traffic and store realm capabilities Advance proposals to have local KDCs perform cross-realm authentication MOBILE DEVICES 16

CPU AND MEMORY The first step is to profile for memory and CPU usage. Suspected Targets: Compile time options to strip out unneeded options Use native crypto library Compile out unneeded cache implementations etc. MOBILE DEVICES 17

FACILITATE EMBEDDED DEVELOPMENT Kerberos has been ported to VXworks and a number of other embedded operating systems. MIT has little contact with the teams performing these ports. Contact embedded Kerberos users to understand what changes they made and what problems they run into. Understand how Kerberos is used on embedded devices. Propose and prioritize projects as appropriate. MOBILE DEVICES 18

CREDENTIAL MANAGEMENT FOR MOBILE DEVICES Typing passwords on cell phones is hard. Storing passwords on cell phones is problematic because they can be stolen. What we can do:: Encourage use of pkinit or single use tokens to avoid dependence on passwords. Study usability of passwords on mobile devices and make recommendations. As appropriate, propose and prioritize projects for extensions to Kerberos that can help. MOBILE DEVICES 19

MAINTAINING AND SECURING 20

PRIORITIES In order for Kerberos to continue to be a prominent authentication system we need to spend time improving its security and flexibility. Principles: Adopt realistic solutions to security weaknesses Adopt technologies that encourage others to extend Kerberos and use it in new ways Specific Projects: Finish and implement FAST pre-authentication framework Implement Anonymous Pkinit Implement Mechanism Glue layer Implement PKU2U MAINTAINING AND SECURING 21

FAST PREAUTH FRAMEWORK The FAST preauthentication framework is a necessary first step for any standardized two-factor authentication. FAST will make it much easier to integrate other authentication systems into Kerberos and will fix some long-standing security problems. MAINTAINING AND SECURING 22

ANONYMOUS PKINIT Anonymous pkinit opens up significant new use cases for Kerberos. It allows a client to know the identity of a server without making its own identity available. It is also relatively easy to implement. We estimate around two months. MAINTAINING AND SECURING 23

PKU2U AND MECHANISM GLUE LAYER These two technologies will enable significant new uses of Kerberos and related security infrastructure. PKU2U: Mechanism for using certificates in GSS-API Allows application authors to support Kerberos and Certificates using the same code paths and mechanisms Important for NFS Mechanism Glue: Allows others to create new security mechanisms Significant work on combinations of security mechanisms (pseudomechanisms) that may have long-term value. Demand from one OS vendor already; Sun is already shipping a solution. MAINTAINING AND SECURING 24

VENDOR INDEPENDENCE 25

THE PROBLEM Kerberos provides many mechanisms for vendor-specific extension. This provides for innovation and product differentiation. Concern for Community: Encouraging vendors to document extensions so others can implement them and maintain interoperability Vendors control the evolution of their extension. What happens when an extension becomes critical and others need to evolve it? VENDOR INDEPENDENCE 26

ENCOURAGING DOCUMENTATION The Consortium Should: Maintain links to documentation on vendor extensions. Write best practices guidelines for documenting vendor extensions. Work with vendors to encourage them to document extensions and help them in their efforts. VENDOR INDEPENDENCE 27

PRESERVING OPEN EVOLUTION The question about what to do in order to avoid single vendors controlling evolution of significant parts of Kerberos is more complicated. Trade Offs: Producing an open alternative to a vendor extension is difficult and at least initially faces significant deployment challenges. However open and competitive evolution has been critical to Kerberos s success. The consortium has a critical role to play VENDOR INDEPENDENCE 28

PRESERVING OPEN EVOLUTION Consortium Role: Work with the community to understand where open evolution is critical: Specific examples General requirements and trends Find strategies for maintaining open evolution when it is critical. Above all, favor interoperability and open evolution; no duplication of work without strong need. VENDOR INDEPENDENCE 29