Active and Passive Metrics and Methods (with Hybrid Types In-Between)
draft-ietf-ippm-active-passive-06
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2016-05-16
|
06 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2016-03-10
|
06 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2016-03-07
|
06 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2016-01-27
|
06 | (System) | RFC Editor state changed to EDIT |
2016-01-27
|
06 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2016-01-27
|
06 | (System) | Announcement was received by RFC Editor |
2016-01-26
|
06 | (System) | IANA Action state changed to No IC from In Progress |
2016-01-26
|
06 | (System) | IANA Action state changed to In Progress |
2016-01-26
|
06 | Amy Vezza | IESG state changed to Approved-announcement sent from Approved-announcement to be sent::Point Raised - writeup needed |
2016-01-26
|
06 | Amy Vezza | IESG has approved the document |
2016-01-26
|
06 | Amy Vezza | Closed "Approve" ballot |
2016-01-26
|
06 | Amy Vezza | Ballot approval text was generated |
2016-01-26
|
06 | Amy Vezza | Ballot writeup was changed |
2016-01-23
|
06 | Al Morton | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2016-01-23
|
06 | Al Morton | New version available: draft-ietf-ippm-active-passive-06.txt |
2016-01-21
|
05 | Tero Kivinen | Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Carl Wallace. |
2016-01-21
|
05 | Cindy Morgan | IESG state changed to Approved-announcement to be sent::Point Raised - writeup needed from IESG Evaluation |
2016-01-21
|
05 | Spencer Dawkins | Changed consensus to Yes from Unknown |
2016-01-21
|
05 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko |
2016-01-21
|
05 | Stephen Farrell | [Ballot comment] 4.3: would it be worth noting (here or elsewhere) that this seems to be a hard thing to do with non-e2e ciphertext, e.g. … [Ballot comment] 4.3: would it be worth noting (here or elsewhere) that this seems to be a hard thing to do with non-e2e ciphertext, e.g. part way along a VPN path |
2016-01-21
|
05 | Stephen Farrell | [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell |
2016-01-21
|
05 | Joel Jaeggli | [Ballot comment] Jouni Korhonen performed the opsdir review Summary: Ready with issues Major: None. Minor: * The IDnits gives a comment but the outdated … [Ballot comment] Jouni Korhonen performed the opsdir review Summary: Ready with issues Major: None. Minor: * The IDnits gives a comment but the outdated reference can be corrected at any time seen appropriate. * Line 412: expand DSCP on the first use. * Lines 413-414: there is no closing ")". * Lines 491-494: I find a discussion about IPR converage in this I-D somewhat odd. Specifically because there are no hard facts i.e., "..may be covered.." Maybe it is just me and if the WG has agree to have such text there I have no problem with it. - Jouni |
2016-01-21
|
05 | Joel Jaeggli | [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli |
2016-01-20
|
05 | Barry Leiba | [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba |
2016-01-20
|
05 | Ben Campbell | [Ballot Position Update] New position, No Objection, has been recorded for Ben Campbell |
2016-01-20
|
05 | Alia Atlas | [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas |
2016-01-20
|
05 | Deborah Brungard | [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard |
2016-01-20
|
05 | Alissa Cooper | [Ballot comment] Nice document, thanks. |
2016-01-20
|
05 | Alissa Cooper | [Ballot Position Update] New position, Yes, has been recorded for Alissa Cooper |
2016-01-19
|
05 | Alvaro Retana | [Ballot comment] Just a nit.. Section 3. (Terms and Definitions) says that the “definitions are consistent with [I-D.zheng-ippm-framework-passive].” Shouldn’t it be the other … [Ballot comment] Just a nit.. Section 3. (Terms and Definitions) says that the “definitions are consistent with [I-D.zheng-ippm-framework-passive].” Shouldn’t it be the other way around? |
2016-01-19
|
05 | Alvaro Retana | [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana |
2016-01-19
|
05 | Martin Stiemerling | [Ballot Position Update] New position, Yes, has been recorded for Martin Stiemerling |
2016-01-19
|
05 | Brian Haberman | [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman |
2016-01-18
|
05 | Terry Manderson | [Ballot comment] Thanks for writing this! Its a very useful reference. Especially the discussion/examples section. |
2016-01-18
|
05 | Terry Manderson | [Ballot Position Update] New position, No Objection, has been recorded for Terry Manderson |
2016-01-16
|
05 | Brian Carpenter | Request for Telechat review by GENART Completed: Ready. Reviewer: Brian Carpenter. |
2016-01-14
|
05 | Jean Mahoney | Request for Telechat review by GENART is assigned to Brian Carpenter |
2016-01-14
|
05 | Jean Mahoney | Request for Telechat review by GENART is assigned to Brian Carpenter |
2016-01-12
|
05 | Spencer Dawkins | IESG state changed to IESG Evaluation from Waiting for Writeup |
2016-01-06
|
05 | (System) | IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed |
2016-01-06
|
05 | Benoît Claise | [Ballot comment] I had the explain the differences and pros/cons of active/passive so many times... Now I can simply refer to this document. Thanks Al. |
2016-01-06
|
05 | Benoît Claise | [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise |
2016-01-04
|
05 | Spencer Dawkins | Placed on agenda for telechat - 2016-01-21 |
2016-01-04
|
05 | Spencer Dawkins | Ballot has been issued |
2016-01-04
|
05 | Spencer Dawkins | [Ballot Position Update] New position, Yes, has been recorded for Spencer Dawkins |
2016-01-04
|
05 | Spencer Dawkins | Created "Approve" ballot |
2016-01-04
|
05 | Spencer Dawkins | Ballot writeup was changed |
2015-12-24
|
05 | Al Morton | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2015-12-24
|
05 | Al Morton | New version available: draft-ietf-ippm-active-passive-05.txt |
2015-12-24
|
04 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2015-12-21
|
04 | (System) | IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed |
2015-12-21
|
04 | Sabrina Tanamal | (Via drafts-lastcall-comment@iana.org): IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-ippm-active-passive-04.txt, which is currently in Last Call, and has the following comments: We understand that this … (Via drafts-lastcall-comment@iana.org): IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-ippm-active-passive-04.txt, which is currently in Last Call, and has the following comments: We understand that this document doesn't require any IANA actions. While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, IANA does not object. If this assessment is not accurate, please respond as soon as possible. Thank you, Sabrina Tanamal IANA Specialist ICANN |
2015-12-17
|
04 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Carl Wallace |
2015-12-17
|
04 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Carl Wallace |
2015-12-16
|
04 | Brian Carpenter | Request for Last Call review by GENART Completed: Almost Ready. Reviewer: Brian Carpenter. |
2015-12-15
|
04 | Jean Mahoney | Request for Last Call review by GENART is assigned to Brian Carpenter |
2015-12-15
|
04 | Jean Mahoney | Request for Last Call review by GENART is assigned to Brian Carpenter |
2015-12-14
|
04 | Jouni Korhonen | Request for Last Call review by OPSDIR Completed: Has Nits. Reviewer: Jouni Korhonen. |
2015-12-12
|
04 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Jouni Korhonen |
2015-12-12
|
04 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Jouni Korhonen |
2015-12-10
|
04 | Cindy Morgan | IANA Review state changed to IANA - Review Needed |
2015-12-10
|
04 | Cindy Morgan | The following Last Call announcement was sent out: From: The IESG To: "IETF-Announce" CC: ippm-chairs@ietf.org, ippm@ietf.org, draft-ietf-ippm-active-passive@ietf.org, spencerdawkins.ietf@gmail.com, ietf@trammell.ch, "Brian … The following Last Call announcement was sent out: From: The IESG To: "IETF-Announce" CC: ippm-chairs@ietf.org, ippm@ietf.org, draft-ietf-ippm-active-passive@ietf.org, spencerdawkins.ietf@gmail.com, ietf@trammell.ch, "Brian Trammell" Reply-To: ietf@ietf.org Sender: Subject: Last Call: (Active and Passive Metrics and Methods (and everything in-between, or Hybrid)) to Informational RFC The IESG has received a request from the IP Performance Metrics WG (ippm) to consider the following document: - 'Active and Passive Metrics and Methods (and everything in-between, or Hybrid)' as Informational RFC The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2015-12-24. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This memo provides clear definitions for Active and Passive performance assessment. The construction of Metrics and Methods can be described as Active or Passive. Some methods may use a subset of both active and passive attributes, and we refer to these as Hybrid Methods. This memo also describes multiple dimensions to help evaluate new methods as they emerge. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-ippm-active-passive/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-ippm-active-passive/ballot/ No IPR declarations have been submitted directly on this I-D. |
2015-12-10
|
04 | Cindy Morgan | IESG state changed to In Last Call from Last Call Requested |
2015-12-10
|
04 | Spencer Dawkins | Last call was requested |
2015-12-10
|
04 | Spencer Dawkins | Last call announcement was generated |
2015-12-10
|
04 | Spencer Dawkins | Ballot approval text was generated |
2015-12-10
|
04 | Spencer Dawkins | Ballot writeup was generated |
2015-12-10
|
04 | Spencer Dawkins | IESG state changed to Last Call Requested from AD Evaluation |
2015-12-10
|
04 | Spencer Dawkins | IESG state changed to AD Evaluation from Publication Requested |
2015-12-10
|
04 | Al Morton | New version available: draft-ietf-ippm-active-passive-04.txt |
2015-12-08
|
03 | Brian Trammell | Internet Engineering Task Force (IETF) B. Kaduk Request for Comments: 7546 … Internet Engineering Task Force (IETF) B. Kaduk Request for Comments: 7546 MIT Category: Informational May 2015 ISSN: 2070-1721 Structure of the Generic Security Service (GSS) Negotiation Loop Abstract This document specifies the generic structure of the negotiation loop to establish a Generic Security Service (GSS) security context between initiator and acceptor. The control flow of the loop is indicated for both parties, including error conditions, and indications are given for where application-specific behavior must be specified. Status of This Memo This document is not an Internet Standards Track specification; it is published for informational purposes. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Not all documents approved by the IESG are a candidate for any level of Internet Standard; see Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc7546. Copyright Notice Copyright (c) 2015 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Kaduk Informational [Page 1] RFC 7546 Structure of the GSS Negotiation Loop May 2015 Table of Contents 1. Introduction ....................................................2 2. Application Protocol Requirements ...............................3 3. Loop Structure ..................................................4 3.1. Anonymous Initiators .......................................5 3.2. GSS_Init_sec_context .......................................5 3.3. Sending from Initiator to Acceptor .........................6 3.4. Acceptor Sanity Checking ...................................6 3.5. GSS_Accept_sec_context .....................................7 3.6. Sending from Acceptor to Initiator .........................8 3.7. Initiator Input Validation .................................9 3.8. Continue the Loop ..........................................9 4. After Security Context Negotiation ..............................9 4.1. Authorization Checks ......................................10 4.2. Using Partially Complete Security Contexts ................10 4.3. Additional Context Tokens .................................11 5. Sample Code ....................................................12 5.1. GSS Application Sample Code ...............................13 6. Security Considerations ........................................19 7. References .....................................................20 7.1. Normative References ......................................20 7.2. Informative References ....................................20 Acknowledgements ..................................................21 Author's Address ..................................................21 1. Introduction "Generic Security Service Application Program Interface Version 2, Update 1" [RFC2743] provides a generic interface for security services in the form of an abstraction layer over the underlying security mechanisms that an application may use. A GSS initiator and acceptor exchange messages, called "tokens", until a security context is established. Such a security context allows for each party to authenticate the other, the passing of confidential and/or integrity- protected messages between the initiator and acceptor, the generation of identical pseudorandom bit strings by both participants [RFC4401], and more. During context establishment, security context tokens are exchanged synchronously, one at a time; the initiator sends the first context token. The number of tokens that must be exchanged between the initiator and acceptor in order to establish the security context is dependent on the underlying mechanism as well as the desired properties of the security context and is, in general, not known to the application. Accordingly, the application's control flow must include a loop within which GSS security context tokens are exchanged; the loop terminates upon successful establishment of a Kaduk Informational [Page 2] RFC 7546 Structure of the GSS Negotiation Loop May 2015 security context or an error condition. The GSS-API, together with its security mechanisms, specifies the format and encoding of the context tokens themselves, but the application protocol must specify the necessary framing for the application to determine what octet strings constitute GSS security context tokens and pass them into the GSS-API implementation as appropriate. The GSS-API C-bindings [RFC2744] provide some example code for such a negotiation loop, but this code does not specify the application's behavior on unexpected or error conditions. As such, individual application protocol specifications have had to specify the structure of their GSS negotiation loops, including error handling, on a per- protocol basis (see [RFC4462], [RFC3645], [RFC5801], [RFC4752], and [RFC2203]). This represents a substantial duplication of effort, and the various specifications go into different levels of detail and describe different possible error conditions. Therefore, it is preferable to have the structure of the GSS negotiation loop, including error conditions and token passing, described in a single specification that can then be referred to from other documents in lieu of repeating the structure of the loop each time. This document fills that role. The necessary requirements for correctly performing a GSS negotiation loop are essentially all included in [RFC2743], but they are scattered in many different places. This document brings all the requirements together into one place for the convenience of implementors, even though the normative requirements remain in [RFC2743]. In a few places, this document notes additional behavior that is useful for applications but is not mandated by [RFC2743]. 2. Application Protocol Requirements Part of the purpose of this document is to guide the development of new application protocols using the GSS-API, as well as the development of new application software using such protocols. The following list consists of features that are necessary or useful in such an application protocol: o Protocols require a way to frame and identify security context negotiation tokens during the GSS negotiation loop. o Error tokens should generally also get special framing, as the recipient may have no other way to distinguish unexpected error context tokens from per-message tokens. Kaduk Informational [Page 3] RFC 7546 Structure of the GSS Negotiation Loop May 2015 o Protocols may benefit from a generic means of indicating an error, possibly accompanied by a descriptive string, to be used if error tokens are not available or not usable due to constraints of the application protocol. o A protocol may use the negotiated GSS security context for per- message operations; in such cases, the protocol will need a way to frame and identify those per-message tokens and the nature of their contents. For example, a protocol message may be accompanied by the output of GSS_GetMIC() over that message; the protocol must identify the location and size of that Message Identity Code (MIC) token and indicate that it is a MIC token and to what cleartext it corresponds. o Applications are responsible for authorization of the authenticated peer principal names that are supplied by the GSS- API. Such names are mechanism specific and may come from a different portion of a federated identity scheme. Application protocols may need to supply additional information to support the authorization of access to a given resource, such as the Secure Shell version 2 (SSHv2) "username" parameter. 3. Loop Structure The loop is begun by the appropriately named initiator, which calls GSS_Init_sec_context() with an empty (zero-length) input_token and a fixed set of input flags containing the desired attributes for the security context. The initiator should not change any of the input parameters to GSS_Init_sec_context() between calls to it during the loop, with the exception of the input_token parameter, which will contain a message from the acceptor after the initial call, and the input_context_handle, which must be the result returned in the output_context_handle of the previous call to GSS_Init_sec_context() (GSS_C_NO_CONTEXT for the first call). (In the C bindings, there is only a single read/modify context_handle argument, so the same variable should be passed for each call in the loop.) RFC 2743 only requires that the claimant_cred_handle argument remain constant over all calls in the loop, but the other non-excepted arguments should also remain fixed for reliable operation. The following subsections will describe the various steps of the loop, without special consideration to whether a call to GSS_Init_sec_context() or GSS_Accept_sec_context() is the first such call in the loop. Kaduk Informational [Page 4] RFC 7546 Structure of the GSS Negotiation Loop May 2015 3.1. Anonymous Initiators If the initiator is requesting anonymity by setting the anon_req_flag input to GSS_Init_sec_context(), then on non-error returns from GSS_Init_sec_context() (that is, when the major status is GSS_S_COMPLETE or GSS_S_CONTINUE_NEEDED) the initiator must verify that the output value of anon_state from GSS_Init_sec_context() is true before sending the security context token to the acceptor. Failing to perform this check could cause the initiator to lose anonymity. 3.2. GSS_Init_sec_context The initiator calls GSS_Init_sec_context() using the input_context_handle for the current security context being established and its fixed set of input parameters and the input_token received from the acceptor (if this is not the first iteration of the loop). The presence or absence of a nonempty output_token and the value of the major status code are the indicators for how to proceed: o If the major status code is GSS_S_COMPLETE and the output_token is empty, then the context negotiation is fully complete and ready for use by the initiator with no further actions. o If the major status code is GSS_S_COMPLETE and the output_token is nonempty, then the initiator's portion of the security context negotiation is complete but the acceptor's is not. The initiator must send the output_token to the acceptor so that the acceptor can establish its half of the security context. o If the major status code is GSS_S_CONTINUE_NEEDED and the output_token is nonempty, the context negotiation is incomplete. The initiator must send the output_token to the acceptor and await another input_token from the acceptor. o If the major status code is GSS_S_CONTINUE_NEEDED and the output_token is empty, the mechanism has produced an output that is not compliant with [RFC2743]. However, there are some known implementations of certain mechanisms such as NT LAN Manager Security Support Provider [NTLMSSP] that do produce empty context negotiation tokens. For maximum interoperability, applications should be prepared to accept such tokens and should transmit them to the acceptor if they are generated. Kaduk Informational [Page 5] RFC 7546 Structure of the GSS Negotiation Loop May 2015and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. One nit, caused by a space in a bracketed reference to an RFC in a diagram not meant to be a reference. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. None necessary (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The document has no IANA consideration. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. None. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. None. |
2015-12-08
|
03 | Brian Trammell | Responsible AD changed to Spencer Dawkins |
2015-12-08
|
03 | Brian Trammell | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2015-12-08
|
03 | Brian Trammell | IESG state changed to Publication Requested |
2015-12-08
|
03 | Brian Trammell | IESG process started in state Publication Requested |
2015-12-08
|
03 | Brian Trammell | This document now replaces draft-morton-ippm-active-passive instead of None |
2015-12-08
|
03 | Brian Trammell | Changed document writeup |
2015-12-08
|
03 | Brian Trammell | Changed document writeup |
2015-12-08
|
03 | Brian Trammell | Intended Status changed to Informational from None |
2015-12-08
|
03 | Brian Trammell | Tag Revised I-D Needed - Issue raised by WGLC cleared. |
2015-12-08
|
03 | Brian Trammell | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
2015-11-10
|
03 | Brian Trammell | Notification list changed to "Brian Trammell" <ietf@trammell.ch> |
2015-11-10
|
03 | Brian Trammell | Document shepherd changed to Brian Trammell |
2015-11-01
|
03 | Al Morton | New version available: draft-ietf-ippm-active-passive-03.txt |
2015-10-19
|
02 | Al Morton | New version available: draft-ietf-ippm-active-passive-02.txt |
2015-10-18
|
01 | Brian Trammell | Tag Revised I-D Needed - Issue raised by WGLC set. |
2015-10-07
|
01 | Brian Trammell | IETF WG state changed to In WG Last Call from WG Document |
2015-09-06
|
01 | Al Morton | New version available: draft-ietf-ippm-active-passive-01.txt |
2015-06-30
|
00 | Al Morton | New version available: draft-ietf-ippm-active-passive-00.txt |