Re: WebISO: the killer kerberos app?

2004-03-19 Thread Wyllys Ingersoll
Damon Rand wrote: There is no reason why a user cannot obtain tickets for more than one realm provided that they are managed properly by the application. The TGT for the ACME domain will be in one credential cache; if the ACME domain TGT cannot be used for cross-realm authentication with BAMBI;

Re: WebISO: the killer kerberos app?

2004-03-12 Thread Christopher Kranz
Russ Allbery [EMAIL PROTECTED] wrote in message news:[EMAIL PROTECTED]... [snip] The application server then receives and decodes that authenticator, validates it, and then creates a cookie containing a more persistant authenticator just for that service. That cookie is, however, now that

RE: WebISO: the killer kerberos app?

2004-03-09 Thread Kevin Coffman
Russ Allbery [EMAIL PROTECTED] write: kevin mcgowan [EMAIL PROTECTED] writes: With kx.509, users have the power to never send their Kerberos password over the network -- translating desktop single sign-on to the web. Cosign uses no domain cookies, allows users to logout of all cosign

Re: WebISO: the killer kerberos app?

2004-03-09 Thread kevin mcgowan
On Mar 9, 2004, at 1:14 AM, Russ Allbery wrote: For whatever it's worth, the reason why we didn't go with a solution based on client-side certificates is that it doesn't make it possible for application servers to obtain credentials on behalf of the user and that was one of our requirements.

Re: WebISO: the killer kerberos app?

2004-03-09 Thread Russ Allbery
Kevin Coffman [EMAIL PROTECTED] writes: Our answer to the proxy issue when certificates are used for authentication is Kerberized Credentials Translation (KCT). The web server captures the SSL handshake between itself and the client, forwards that handshake and other info to the KCT (a

Re: WebISO: the killer kerberos app?

2004-03-09 Thread Kevin Coffman
Russ Allbery wrote: Kevin Coffman [EMAIL PROTECTED] writes: Our answer to the proxy issue when certificates are used for authentication is Kerberized Credentials Translation (KCT). The web server captures the SSL handshake between itself and the client, forwards that handshake and

Re: WebISO: the killer kerberos app?

2004-03-08 Thread Wyllys Ingersoll
On Thu, 2004-03-04 at 20:43, Russ Allbery wrote: Christopher Kranz [EMAIL PROTECTED] writes: It occurred to me that if you think of the web client as the credentials cache Kerberos could easily be used as a WebISO solution. The web client connects to the web app. If you don't already

Re: WebISO: the killer kerberos app?

2004-03-08 Thread Russ Allbery
Wyllys Ingersoll [EMAIL PROTECTED] writes: Isn't this very similar to the what Passport and Project Liberty propose to use? Basically, its a variation of the secure cookie scheme. Netegrity does something similar as well. Right. Is there a comparison anywhere between webauthv3 and the

Re: WebISO: the killer kerberos app?

2004-03-08 Thread Wyllys Ingersoll
One thing I dislike about webauth is that it is using raw KRB5 as opposed to the more portable and extensible GSSAPI interface. Why was GSSAPI not chosen? WebAuth only uses Kerberos v5 in one particular place, namely the bootstrap for an application server. Note that any

Re: WebISO: the killer kerberos app?

2004-03-08 Thread Russ Allbery
Wyllys Ingersoll [EMAIL PROTECTED] writes: Writing new code is the barrier that will prevent it from going much beyond the experimental stage unless it is adopted by a mainstream browser (mozilla) and web server (apache). What makes you think that WebAuth hasn't gone beyond the experimental

Re: WebISO: the killer kerberos app?

2004-03-08 Thread Wyllys Ingersoll
On Mon, 2004-03-08 at 14:21, Russ Allbery wrote: Wyllys Ingersoll [EMAIL PROTECTED] writes: Writing new code is the barrier that will prevent it from going much beyond the experimental stage unless it is adopted by a mainstream browser (mozilla) and web server (apache). What makes you

Re: WebISO: the killer kerberos app?

2004-03-08 Thread Ken Hornstein
What makes you think that WebAuth hasn't gone beyond the experimental stage? I guess I chose the wrong words there. Basically, I just meant moving it beyond Stanford and into the mainstream. I did not mean to marginalize your efforts. Actually ... judging by the people who want some form

Re: WebISO: the killer kerberos app?

2004-03-08 Thread Russ Allbery
kevin mcgowan [EMAIL PROTECTED] writes: With kx.509, users have the power to never send their Kerberos password over the network -- translating desktop single sign-on to the web. Cosign uses no domain cookies, allows users to logout of all cosign protected services, is capable of transferring

Re: WebISO: the killer kerberos app?

2004-03-08 Thread Henry B. Hotz
There's also kx509. At 12:00 PM -0500 3/8/04, [EMAIL PROTECTED] wrote: Date: Mon, 08 Mar 2004 08:38:05 -0500 From: Wyllys Ingersoll [EMAIL PROTECTED] To: Russ Allbery [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Subject: Re: WebISO: the killer kerberos app? Message-ID: [EMAIL PROTECTED] In-Reply

Re: WebISO: the killer kerberos app?

2004-03-07 Thread Christopher Kranz
Russ Allbery [EMAIL PROTECTED] wrote in message news:[EMAIL PROTECTED]... Christopher Kranz [EMAIL PROTECTED] writes: Why not just pass the TGT, the session ticket, and the authenticator as cookies? Let Kerberos do the hard stuff. Kerberos was designed to be able to securely

Re: WebISO: the killer kerberos app?

2004-03-05 Thread Christopher D. Clausen
On Thursday, March 04, 2004 7:43p [EMAIL PROTECTED] wrote: This is exactly the design of Stanford's WebAuth v3. :) See: http://webauthv3.stanford.edu/ Is there a similar solution that will work with apache 1.3? CDC Christopher D. Clausen [EMAIL PROTECTED] SysAdmin

Re: WebISO: the killer kerberos app?

2004-03-05 Thread Russ Allbery
Christopher Kranz [EMAIL PROTECTED] writes: Why not just pass the TGT, the session ticket, and the authenticator as cookies? Let Kerberos do the hard stuff. Kerberos was designed to be able to securely authenticate someone over an insecure network. This way you don't have to create new

Re: WebISO: the killer kerberos app?

2004-03-05 Thread Christopher Kranz
Russ Allbery [EMAIL PROTECTED] wrote in message news:[EMAIL PROTECTED]... This is exactly the design of Stanford's WebAuth v3. :) See: http://webauthv3.stanford.edu/ This is lot closer to what I had envisioned than say Pubcookie. But it still looks like it does more work than it has

WebISO: the killer kerberos app?

2004-03-05 Thread Christopher Kranz
I've been looking into a number of WebISO solutions over the last several months. The one thing that struck me is how Kerberos like a number of the solutions appear to be. That is, they use a trusted 3rd party with a shared secret and then have a persistent token that allows logins without

Re: WebISO: the killer kerberos app?

2004-03-05 Thread Russ Allbery
Christopher Kranz [EMAIL PROTECTED] writes: Russ Allbery [EMAIL PROTECTED] wrote: No, you still have to require that the connection between the web client and the web application server be encrypted. The thing that you're missing is that doing regular Kerberos involves a computational step

Re: WebISO: the killer kerberos app?

2004-03-04 Thread Russ Allbery
Christopher Kranz [EMAIL PROTECTED] writes: I've been looking into a number of WebISO solutions over the last several months. The one thing that struck me is how Kerberos like a number of the solutions appear to be. That is, they use a trusted 3rd party with a shared secret and then have a