Intended Category: Standards Track Expires March 2006 September 2005

Similar documents
Intended Category: Standards Track Expires July 2006 January 2006

Expires October 2005 Updates RFC 3280 April 2005

Expires: October 9, 2005 April 7, 2005

Network Working Group. Intended status: Standards Track Columbia U. Expires: March 5, 2009 September 1, 2008

Network Working Group Internet-Draft August 2005 Expires: February 2, Atom Link No Follow draft-snell-atompub-feed-nofollow-00.

Network Working Group Internet-Draft January 25, 2006 Expires: July 29, Feed Rank draft-snell-atompub-feed-index-05.txt. Status of this Memo

Expires in six months 24 October 2004 Obsoletes: RFC , , 3377, 3771

Request for Comments: 4680 Updates: 4346 September 2006 Category: Standards Track

Network Working Group Internet-Draft August 2005 Expires: February 2, Atom Link No Follow draft-snell-atompub-feed-nofollow-03.

Category: Standards Track October 2006

Network Working Group Internet-Draft October 27, 2007 Intended status: Experimental Expires: April 29, 2008

Category: Standards Track Microsoft May 2004

Request for Comments: 5178 Category: Standards Track Isode Ltd. May 2008

Intended status: Standards Track August 15, 2008 Expires: February 16, 2009

Request for Comments: 3861 Category: Standards Track August 2004

Request for Comments: TIS Labs March Storing Certificates in the Domain Name System (DNS)

Jabber, Inc. August 20, 2004

Category: Standards Track Cisco H. Tschofenig Nokia Siemens Networks August 2008

Network Working Group. Siemens Networks GmbH & Co KG February Online Certificate Status Protocol (OCSP) Extensions to IKEv2

Network Working Group. Category: Standards Track December 2005

Request for Comments: 4255 Category: Standards Track SPARTA January Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints

Intended status: Standards Track Expires: August 28, 2008 Hitachi A. Kobayashi NEC Corp. M. Stiemerling (Ed.) NEC Europe Ltd.

Network Working Group. Obsoletes: draft-ietf-dhc-new-opt-msg-00.txt June 2000 Expires December 2000

TCP Maintenance and Minor Extensions (tcpm) Intended status: Standards Track Expires: May 1, 2009 October 28, 2008

Intended status: Informational. B. Wyman October 2, 2007

Network Working Group. N. Williams Sun Microsystems June 2006

This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026.

Obsoletes: 2632 July 2004 Category: Standards Track. Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Certificate Handling

INTERNET-DRAFT DTLS over DCCP February 6, DTLS over DCCP

Request for Comments: 5179 Category: Standards Track May 2008

Request for Comments: 3764 Category: Standards Track April enumservice registration for Session Initiation Protocol (SIP) Addresses-of-Record

Using SRP for TLS Authentication

Network Working Group. Category: Standards Track DENIC eg January 2005

Network Working Group. Category: Standards Track July 2007

Isode Limited March 2008

Network Working Group. Category: Standards Track August Dynamic Host Configuration Protocol for IPv6 (DHCPv6) Relay Agent Remote-ID Option

Opaque Information Distribution

Category: Standards Track Cisco Systems, Inc. March 2005

Network Working Group Request for Comments: 4143 Category: Standards Track Brandenburg November 2005

Category: Standards Track September MIB Textual Conventions for Uniform Resource Identifiers (URIs)

Network Working Group. Updates: 3463, 4468, 4954 June 2008 Category: Best Current Practice. A Registry for SMTP Enhanced Mail System Status Codes

Request for Comments: 4633 Category: Experimental August 2006

Category: Experimental April BinaryTime: An Alternate Format for Representing Date and Time in ASN.1

draft fanf smtp quickstart 01 : 1/7

Request for Comments: Category: Standards Track January 2008

Internet Engineering Task Force (IETF) Request for Comments: 6818 Updates: 5280 January 2013 Category: Standards Track ISSN:

Request for Comments: 3934 Updates: 2418 October 2004 BCP: 94 Category: Best Current Practice

Internet Engineering Task Force (IETF) Updates: 5280 May 2018 Category: Standards Track ISSN:

expires in six months October 1997 Internet Public Key Infrastructure Operational Protocols: FTP and HTTP <draft-ietf-pkix-opp-ftp-http-01.

Network Working Group. Category: Standards Track June Dynamic Host Configuration Protocol for IPv6 (DHCPv6) Relay Agent Subscriber-ID Option

Request for Comments: 5010 Category: Standards Track Cisco Systems, Inc. September 2007

Request for Comments: 4759 Category: Standards Track Neustar Inc. L. Conroy Roke Manor Research November 2006

Network Working Group Request for Comments: A. Zinin Alcatel-Lucent March 2007

Category: Standards Track October 2006

Network Working Group. Category: Standards Track <draft-aboba-radius-iana-03.txt> 30 March 2003 Updates: RFC IANA Considerations for RADIUS

Updates: 2409 May 2005 Category: Standards Track. Algorithms for Internet Key Exchange version 1 (IKEv1)

Category: Standards Track July The Post Office Protocol (POP3) Simple Authentication and Security Layer (SASL) Authentication Mechanism

Internet Engineering Task Force (IETF) Request for Comments: 5917 Category: Informational June 2010 ISSN:

Network Working Group. Category: Informational May OSPF Database Exchange Summary List Optimization

<draft-ietf-dnsind-rfc2052bis-03.txt> Levon Esibov Microsoft Corp. October 1999 Expires April 2000

Network Working Group. Category: Informational SPARTA, Inc. S. Crocker Shinkuro Inc. S. Krishnaswamy SPARTA, Inc. August 2007

RFC 4871 DomainKeys Identified Mail (DKIM) Signatures -- Update draft-ietf-dkim-rfc4871-errata-03-01dc

Category: Informational September 2004

Network Working Group Request for Comments: 5235 January 2008 Obsoletes: 3685 Category: Standards Track

Category: Standards Track December 2007

Network Working Group. Updates: 2634 August 2007 Category: Standards Track

Network Working Group. February Media Gateway Control Protocol (MGCP) Redirect and Reset Package

Network Working Group Request for Comments: 4869 Category: Informational May Suite B Cryptographic Suites for IPsec. Status of This Memo

Network Working Group Request for Comments: Category: Best Current Practice October 2008

Network Working Group. Category: Standards Track Juniper Networks August 2008

Category: Informational 1 April 2001

Network Working Group Request for Comments: 4242 Category: Standards Track University of Southampton B. Volz Cisco Systems, Inc.

Internet Engineering Task Force (IETF) Request for Comments: 6490 Category: Standards Track. G. Michaelson APNIC. S. Kent BBN February 2012

E. Lewis ARIN September 23, KEY RR Secure Entry Point Flag draft-ietf-dnsext-keyrr-key-signing-flag-09. Status of this Memo

Category: Informational January 2010 ISSN:

Network Working Group. February 2005

Category: Standards Track June 2006

Category: Standards Track March Extensible Provisioning Protocol (EPP) Transport Over TCP

Category: Standards Track June Requesting Attributes by Object Class in the Lightweight Directory Access Protocol (LDAP) Status of This Memo

Network Working Group Request for Comments: 4424 February 2006 Updates: 4348 Category: Standards Track

Request for Comments: 5208 Category: Informational May 2008

Category: Experimental June 2006

Network Working Group. Category: Standards Track Cisco Systems May 2007

Internet-Draft November 12, 2005 Obsoletes: 3548 (if approved) Expires: May 16, 2006

Network Working Group. Category: Standards Track Samsung S. Kumar Tech Mahindra Ltd S. Madanapalli Samsung May 2008

Network Working Group. Category: Informational November 2007

Request for Comments: 5115 Category: Standards Track UCL January Telephony Routing over IP (TRIP) Attribute for Resource Priority

Network Working Group. Cisco Systems June 2007

Expires: February 25, 2004 August 27, Using the NETCONF Configuration Protocol over Secure Shell (SSH) draft-wasserman-netconf-over-ssh-00.

Category: Informational May Use of Hash Algorithms in Internet Key Exchange (IKE) and IPsec

Internet Engineering Task Force (IETF) Request for Comments: 7817 Updates: 2595, 3207, 3501, 5804 March 2016 Category: Standards Track ISSN:

Network Working Group Request for Comments: Cisco Systems, Inc. December 2005

Network Working Group. BCP: 131 July 2007 Category: Best Current Practice

Authentication, Authorization and Accounting Requirements for the Session Initiation Protocol

Request for Comments: 4142 Category: Standards Track Nine by Nine November 2005

Expires: September 2, 2005 F. Bari Cingular Wireless P. Eronen Nokia March 2005

Internet Engineering Task Force. Intended Status: Informational. Additional Reserved Top Level Domains draft-chapin-additional-reserved-tlds-00

Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile draft-ietf-pkix-rfc3280bis-04.

Internet Engineering Task Force (IETF) Request for Comments: 6160 Category: Standards Track April 2011 ISSN:

Network Working Group Request for Comments: 5509 Category: Standards Track April 2009

Transcription:

INTERNET-DRAFT S. Santesson (Microsoft) Intended Category: Standards Track Expires March 2006 September 2005 Internet X.509 Public Key Infrastructure Subject Alternative Name for expression of service name <draft-ietf-pkix-srvsan-00.txt> Status of this Memo By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than a "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/1id-abstracts.html The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html Abstract This document defines a new name form for inclusion in the othername filed of an X.509 Subject Alternative Name extension which allows a certificate subject to be associated with the service name and domain name components of a DNS Service Resource Record. Santesson [Page 1]

Table of Contents 1 Introduction... 2 2 Name definitions... 3 3 Security Considerations... 3 4 IANA Considerations... 4 5 References... 4 Appendix A. ASN.1 definitions... 5 Authors Addresses... 5 Disclaimer... 6 Copyright Statement... 6 1. Introduction RFC 2782 [N3] Defines a DNS RR (Resource Record) for specifying the location of services (SRV RR) which allows clients to ask for a specific service/protocol for a specific domain and get back the names of any available servers. Server discovery through a DNS query based on service/protocol relative to a domain is from an authentication perspective fundamentally different from when a client has prior trusted knowledge about the name and address of the server it attempts to connect. While authentication of the name and address of a server makes sense when the name and address of the server is prior knowledge, it typically has very little value if the name and address of the server is obtained from an untrusted source. Subsequent authentication of a server discovered through DNS RR lookup based on service name typically requires the client to authenticate that the connected server is authorized to provide the requested service rather than authenticating the servers host name. While DNS servers may have the capacity to provide trusted information, they may in many other situations not be trusted enough to do that, in which case the server may be required to provide verifiable credentials to support its due authorization to provide a requested service. One example where expression of such authorization can be very useful is when locating and authenticating a legitimate Kerberos KDC server. To support these scenarios, this standard defines a new name form for expression of service name relative to a domain in X.509 certificates. Current dnsname GeneralName Subject Alternative name form only provide for DNS host names to be expressed in "preferred name Santesson [Page 2]

syntax," as specified by RFC 1034 [N4]. This definition therefore not broad enough to allow expression of a service related to that domain. 2. Name definitions This section defines the SRVName name as a form of othername from the GeneralName structure in SubjectAltName defined in RFC 3280 [N2]. id-on-srvname OBJECT IDENTIFIER ::= { id-on? } SRVName ::= UTF8String (SIZE (1..MAX)) The SRVName, if present, MUST contain a service name and a domain name in the following form: _Service.Name The content of the components of this name form MUST be consistent with the corresponding definition of these components in an SRV RR according to RFC 2782 [N3]. The content of these components are: Service The symbolic name of the desired service, as defined in Assigned Numbers [N5] or locally. An underscore (_) is prepended to the service identifier to avoid collisions with DNS labels that occur in nature. Some widely used services, notably POP, don t have a single universal name. If Assigned Numbers names the service indicated, that name is the only name which is allowed in the service component of this name form. The Service is case insensitive. Name The DNS domain name of the domain where the specified service is located. Example: _mail.example.com Even though this name form is based on the service resource record (SRV RR) definition in RFC 2782 [N3] and may be used to enhance subsequent authentication of DNS based service discovery, this standard does not define any new conditions or requirements regarding use of SRV RR for service discovery or where and when such use is appropriate. Santesson [Page 3]

3 Security Considerations Assignment of services to hosts may be subject to change. Implementers should be aware of the need to revoke old certificates that no longer reflect the current assignment of services and thus make sure that all issued certificates are up to date. When X.509 certificates enhanced with the name form specified in this standard is used to enhance authentication of service discovery based on a SRV RR query to a DNS server, all security considerations of RFC 2782 applies. 4 IANA Considerations This document has no actions for IANA. 5 References Normative references: [N1] [N2] [N3] [N4] [N5] S. Bradner, "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. R. Housley, W. Polk, W. Ford, and D. Solo, "Internet X.509 Public Key Infrastructure: Certificate and Certificate Revocation List (CRL) Profile", RFC 3280, April 2002. A. Gulbrandsen and P. Vixie, "A DNS RR for specifying the location of services (DNS SRV)", RFC 2782, February 2000. P. Mockapetris, "DOMAIN NAMES - CONCEPTS AND FACILITIES", RFC 1034, November 1987 J. Reynolds, "Assigned Numbers: RFC 1700 is Replaced by an On-line Database", RFC 3232, January 2002. Santesson [Page 4]

Appendix A. ASN.1 definitions TBD Authors Addresses Stefan Santesson Microsoft Tuborg Boulevard 12 2900 Hellerup Denmark EMail: stefans@microsoft.com Santesson [Page 5]

Disclaimer This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Copyright Statement Copyright (C) The Internet Society (2005). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights. Expires March 2006 Santesson [Page 6]