draft-ietf-kitten-gssapi-prf-05.txt   draft-ietf-kitten-gssapi-prf-06.txt 
NETWORK WORKING GROUP N. Williams NETWORK WORKING GROUP N. Williams
Internet-Draft Sun Internet-Draft Sun
Expires: January 25, 2006 July 24, 2005 Expires: February 26, 2006 August 25, 2005
A PRF API extension for the GSS-API A PRF API extension for the GSS-API
draft-ietf-kitten-gssapi-prf-05.txt draft-ietf-kitten-gssapi-prf-06.txt
Status of this Memo Status of this Memo
By submitting this Internet-Draft, each author represents that any By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79. aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
skipping to change at page 1, line 33 skipping to change at page 1, line 33
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on January 25, 2006. This Internet-Draft will expire on February 26, 2006.
Copyright Notice Copyright Notice
Copyright (C) The Internet Society (2005). Copyright (C) The Internet Society (2005).
Abstract Abstract
This document defines a Pseudo-Random Function (PRF) extension to the This document defines a Pseudo-Random Function (PRF) extension to the
Generic Security Service Application Programming Interface (GSS-API) Generic Security Service Application Programming Interface (GSS-API)
for keying application protocols given an established GSS-API for keying application protocols given an established GSS-API
skipping to change at page 2, line 11 skipping to change at page 2, line 11
key secure session layers that don't or cannot use GSS-API per- key secure session layers that don't or cannot use GSS-API per-
message MIC (message integrity check) and wrap tokens for session message MIC (message integrity check) and wrap tokens for session
protection. protection.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1 Conventions used in this document . . . . . . . . . . . . . . 3 1.1 Conventions used in this document . . . . . . . . . . . . . . 3
2. GSS_Pseudo_random() . . . . . . . . . . . . . . . . . . . . . 3 2. GSS_Pseudo_random() . . . . . . . . . . . . . . . . . . . . . 3
2.1 C-Bindings . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.1 C-Bindings . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.2 Java Bindings . . . . . . . . . . . . . . . . . . . . . . . . 6
3. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 6 3. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 6
4. Security Considerations . . . . . . . . . . . . . . . . . . . 7 4. Security Considerations . . . . . . . . . . . . . . . . . . . 6
5. References . . . . . . . . . . . . . . . . . . . . . . . . . . 7 5. References . . . . . . . . . . . . . . . . . . . . . . . . . . 7
5.1 Normative References . . . . . . . . . . . . . . . . . . . . . 7 5.1 Normative References . . . . . . . . . . . . . . . . . . . . . 7
5.2 Informative References . . . . . . . . . . . . . . . . . . . . 8 5.2 Informative References . . . . . . . . . . . . . . . . . . . . 7
Author's Address . . . . . . . . . . . . . . . . . . . . . . . 8 Author's Address . . . . . . . . . . . . . . . . . . . . . . . 8
Intellectual Property and Copyright Statements . . . . . . . . 9 Intellectual Property and Copyright Statements . . . . . . . . 9
1. Introduction 1. Introduction
A need has arisen for users of the GSS-API to key applications' A need has arisen for users of the GSS-API to key applications'
cryptographic protocols using established GSS-API security contexts. cryptographic protocols using established GSS-API security contexts.
Such applications can use the GSS-API for authentication, but not for Such applications can use the GSS-API for authentication, but not for
transport security (for whatever reasons), and since the GSS-API does transport security (for whatever reasons), and since the GSS-API does
not provide a method for obtaining keying material from established not provide a method for obtaining keying material from established
security contexts such applications cannot make effective use of the security contexts such applications cannot make effective use of the
GSS-API. GSS-API.
To address this need we define a pseudo-random function (PRF) To address this need we define a pseudo-random function (PRF)
extension to the GSS-API. extension to the GSS-API.
Though this document specifies an abstract API as an extension to the Though this document specifies an abstract API as an extension to the
GSS-API version 2, update 1, and though it specifies the bindings of GSS-API version 2, update 1, and though it specifies the bindings of
this extension for the C and Java programming languages, it does not this extension for the C programming language, it does not specify a
specify a revision of the GSS-API and so does not address the matter revision of the GSS-API and so does not address the matter of how
of how portable applications detect support for and ensure access to portable applications detect support for and ensure access to this
this extension. We defer this matter to an expected, comprehensive extension. We defer this matter to an expected, comprehensive update
update to the GSS-API. to the GSS-API.
1.1 Conventions used in this document 1.1 Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119]. document are to be interpreted as described in [RFC2119].
2. GSS_Pseudo_random() 2. GSS_Pseudo_random()
Inputs: Inputs:
skipping to change at page 6, line 28 skipping to change at page 6, line 28
); );
Additional major status codes for the C-bindings: Additional major status codes for the C-bindings:
o GSS_S_CALL_INACCESSIBLE_READ o GSS_S_CALL_INACCESSIBLE_READ
o GSS_S_CALL_INACCESSIBLE_WRITE o GSS_S_CALL_INACCESSIBLE_WRITE
See [RFC2744]. See [RFC2744].
2.2 Java Bindings
For Java GSS_Pseudo_random() maps to a method, 'prf', of the class
that implements the GSSContext interface. Note that this document
does not modify any Java interfaces and does not specify a method by
which portable Java applications detect support for this GSS-API
extension -- we leave that to a subsequent, comprehensive update to
the GSS-API.
public static final int GSS_C_PRF_KEY_FULL = 0
public static final int GSS_C_PRF_KEY_PARTIAL = 1
public byte[] prf(int prf_key, byte inBuf[], int outlen)
throws GSSException
See [RFC2853].
3. IANA Considerations 3. IANA Considerations
This document has no IANA considerations currently. If and when a This document has no IANA considerations currently. If and when a
relevant IANA registry of GSS-API symbols is created then the generic relevant IANA registry of GSS-API symbols is created then the generic
and language-specific function names, constant names and constant and language-specific function names, constant names and constant
values described above should be added to such a registry. values described above should be added to such a registry.
4. Security Considerations 4. Security Considerations
Care should be taken in properly designing a mechanism's PRF Care should be taken in properly designing a mechanism's PRF
 End of changes. 

This html diff was produced by rfcdiff 1.25, available from http://www.levkowetz.com/ietf/tools/rfcdiff/