1
2
3
4
5
6
7Network Working Group N. Williams
8Request for Comments: 5056 Sun
9Category: Standards Track November 2007
10
11
12 On the Use of Channel Bindings to Secure Channels
13
14Status of This Memo
15
16 This document specifies an Internet standards track protocol for the
17 Internet community, and requests discussion and suggestions for
18 improvements. Please refer to the current edition of the "Internet
19 Official Protocol Standards" (STD 1) for the standardization state
20 and status of this protocol. Distribution of this memo is unlimited.
21
22Abstract
23
24 The concept of channel binding allows applications to establish that
25 the two end-points of a secure channel at one network layer are the
26 same as at a higher layer by binding authentication at the higher
27 layer to the channel at the lower layer. This allows applications to
28 delegate session protection to lower layers, which has various
29 performance benefits.
30
31 This document discusses and formalizes the concept of channel binding
32 to secure channels.
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58Williams Standards Track [Page 1]
59
60RFC 5056 On Channel Bindings November 2007
61
62
63Table of Contents
64
65 1. Introduction ....................................................3
66 1.1. Conventions Used in This Document ..........................4
67 2. Definitions .....................................................4
68 2.1. Properties of Channel Binding ..............................6
69 2.2. EAP Channel Binding ........................................9
70 3. Authentication and Channel Binding Semantics ...................10
71 3.1. The GSS-API and Channel Binding ...........................10
72 3.2. SASL and Channel Binding ..................................11
73 4. Channel Bindings Specifications ................................11
74 4.1. Examples of Unique Channel Bindings .......................11
75 4.2. Examples of End-Point Channel Bindings ....................12
76 5. Uses of Channel Binding ........................................12
77 6. Benefits of Channel Binding to Secure Channels .................14
78 7. IANA Considerations ............................................15
79 7.1. Registration Procedure ....................................15
80 7.2. Comments on Channel Bindings Registrations ................16
81 7.3. Change Control ............................................17
82 8. Security Considerations ........................................17
83 8.1. Non-Unique Channel Bindings and Channel Binding
84 Re-Establishment ..........................................18
85 9. References .....................................................19
86 9.1. Normative References ......................................19
87 9.2. Informative References ....................................19
88 Appendix A. Acknowledgments .......................................22
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114Williams Standards Track [Page 2]
115
116RFC 5056 On Channel Bindings November 2007
117
118
1191. Introduction
120
121 In a number of situations, it is useful for an application to be able
122 to handle authentication within the application layer, while
123 simultaneously being able to utilize session or transport security at
124 a lower network layer. For example, IPsec [RFC4301] [RFC4303]
125 [RFC4302] is amenable to being accelerated in hardware to handle very
126 high link speeds, but IPsec key exchange protocols and the IPsec
127 architecture are not as amenable to use as a security mechanism
128 within applications, particularly applications that have users as
129 clients. A method of combining security at both layers is therefore
130 attractive. To enable this to be done securely, it is necessary to
131 "bind" the mechanisms together -- so as to avoid man-in-the-middle
132 vulnerabilities and enable the mechanisms to be integrated in a
133 seamless way. This is the objective of "Channel Bindings".
134
135 The term "channel binding", as used in this document, derives from
136 the Generic Security Service Application Program Interface (GSS-API)
137 [RFC2743], which has a channel binding facility that was intended for
138 binding GSS-API authentication to secure channels at lower network
139 layers. The purpose and benefits of the GSS-API channel binding
140 facility were not discussed at length, and some details were left
141 unspecified. Now we find that this concept can be very useful,
142 therefore we begin with a generalization and formalization of
143 "channel binding" independent of the GSS-API.
144
145 Although inspired by and derived from the GSS-API, the notion of
146 channel binding described herein is not at all limited to use by GSS-
147 API applications. We envision use of channel binding by applications
148 that utilize other security frameworks, such as Simple Authentication
149 and Security Layer (SASL) [RFC4422] and even protocols that provide
150 their own authentication mechanisms (e.g., the Key Distribution
151 Center (KDC) exchanges of Kerberos V [RFC4120]). We also envision
152 use of the notion of channel binding in the analysis of security
153 protocols.
154
155 The main goal of channel binding is to be able to delegate
156 cryptographic session protection to network layers below the
157 application in hopes of being able to better leverage hardware
158 implementations of cryptographic protocols. Section 5 describes some
159 intended uses of channel binding. Also, some applications may
160 benefit by reducing the amount of active cryptographic state, thus
161 reducing overhead in accessing such state and, therefore, the impact
162 of security on latency.
163
164
165
166
167
168
169
170Williams Standards Track [Page 3]
171
172RFC 5056 On Channel Bindings November 2007
173
174
175 The critical security problem to solve in order to achieve such
176 delegation of session protection is ensuring that there is no man-
177 in-the-middle (MITM), from the point of view the application, at the
178 lower network layer to which session protection is to be delegated.
179
180 There may well be an MITM, particularly if either the lower network
181 layer provides no authentication or there is no strong connection
182 between the authentication or principals used at the application and
183 those used at the lower network layer.
184
185 Even if such MITM attacks seem particularly difficult to effect, the
186 attacks must be prevented for certain applications to be able to make
187 effective use of technologies such as IPsec [RFC2401] [RFC4301] or
188 HTTP with TLS [RFC4346] in certain contexts (e.g., when there is no
189 authentication to speak of, or when one node's set of trust anchors
190 is too weak to believe that it can authenticate its peers).
191 Additionally, secure channels that are susceptible to MITM attacks
192 because they provide no useful end-point authentication are useful
193 when combined with application-layer authentication (otherwise they
194 are only somewhat "better than nothing" -- see Better Than Nothing
195 Security (BTNS) [BTNS-AS]).
196
197 For example, Internet Small Computer Systems Interface (iSCSI)
198 [RFC3720] provides for application-layer authentication (e.g., using
199 Kerberos V), but relies on IPsec for transport protection; iSCSI does
200 not provide a binding between the two. iSCSI initiators have to be
201 careful to make sure that the name of the server authenticated at the
202 application layer and the name of the peer at the IPsec layer match
203 -- an informal form of channel binding.
204
205 This document describes a solution: the use of "channel binding" to
206 bind authentication at application layers to secure sessions at lower
207 layers in the network stack.
208
2091.1. Conventions Used in This Document
210
211 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
212 "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
213 document are to be interpreted as described in [RFC2119].
214
2152. Definitions
216
217 o Secure channel: a packet, datagram, octet stream connection, or
218 sequence of connections between two end-points that affords
219 cryptographic integrity and, optionally, confidentiality to data
220 exchanged over it. We assume that the channel is secure -- if an
221 attacker can successfully cryptanalyze a channel's session keys,
222 for example, then the channel is not secure.
223
224
225
226Williams Standards Track [Page 4]
227
228RFC 5056 On Channel Bindings November 2007
229
230
231 o Channel binding: the process of establishing that no man-in-the-
232 middle exists between two end-points that have been authenticated
233 at one network layer but are using a secure channel at a lower
234 network layer. This term is used as a noun.
235
236 o Channel bindings: [See historical note below.]
237
238 Generally, some data that "names" a channel or one or both of
239 its end-points such that if this data can be shown, at a higher
240 network layer, to be the same at both ends of a channel, then
241 there are no MITMs between the two end-points at that higher
242 network layer. This term is used as a noun.
243
244 More formally, there are two types of channel bindings:
245
246 + unique channel bindings:
247
248 channel bindings that name a channel in a cryptographically
249 secure manner and uniquely in time;
250
251 + end-point channel bindings:
252
253 channel bindings that name the authenticated end-points, or
254 even a single end-point, of a channel which are, in turn,
255 securely bound to the channel, but which do not identify a
256 channel uniquely in time.
257
258 o Cryptographic binding: (e.g., "cryptographically bound") a
259 cryptographic operation that causes an object, such as a private
260 encryption or signing key, or an established secure channel, to
261 "speak for" [Lampson91] some principal, such as a user, a
262 computer, etcetera. For example, a Public Key Infrastructure for
263 X.509 Certificates (PKIX) certificate binds a private key to the
264 name of a principal in the trust domain of the certificate's
265 issuer such that a possessor of said private key can act on behalf
266 of the user (or other entity) named by the certificate.
267
268 Cryptographic bindings are generally asymmetric in nature (not to
269 be confused with symmetric or asymmetric key cryptography) in that
270 an object is rendered capable of standing for another, but the
271 reverse is not usually the case (we don't say that a user speaks
272 for their private keys, but we do say that the user's private keys
273 speak for the user).
274
275 Note that there may be many instances of "cryptographic binding" in
276 an application of channel binding. The credentials that authenticate
277 principals at the application layer bind private or secret keys to
278 the identities of those principals, such that said keys speak for
279
280
281
282Williams Standards Track [Page 5]
283
284RFC 5056 On Channel Bindings November 2007
285
286
287 them. A secure channel typically consists of symmetric session keys
288 used to provide confidentiality and integrity protection to data sent
289 over the channel; each end-point's session keys speak for that end-
290 point of the channel. Finally, each end-point of a channel bound to
291 authentication at the application layer speaks for the principal
292 authenticated at the application layer on the same side of the
293 channel.
294
295 The terms defined above have been in use for many years and have been
296 taken to mean, at least in some contexts, what is stated below.
297 Unfortunately this means that "channel binding" can refer to the
298 channel binding operation and, sometimes to the name of a channel,
299 and "channel bindings" -- a difference of only one letter --
300 generally refers to the name of a channel.
301
302 Note that the Extensible Authentication Protocol (EAP) [RFC3748] uses
303 "channel binding" to refer to a facility that may appear to be
304 similar to the one decribed here, but it is, in fact, quite
305 different. See Section 2.2 for mode details.
306
3072.1. Properties of Channel Binding
308
309 Applications, authentication frameworks (e.g., the GSS-API, SASL),
310 security mechanisms (e.g., the Kerberos V GSS-API mechanism
311 [RFC1964]), and secure channels must meet the requirements and should
312 follow the recommendations that are listed below.
313
314 Requirements:
315
316 o In order to use channel binding, applications MUST verify that the
317 same channel bindings are observed at either side of the channel.
318 To do this, the application MUST use an authentication protocol at
319 the application layer to authenticate one, the other, or both
320 application peers (one at each end of the channel).
321
322 * If the authentication protocol used by the application supports
323 channel binding, the application SHOULD use it.
324
325 * An authentication protocol that supports channel binding MUST
326 provide an input slot in its API for a "handle" to the channel,
327 or its channel bindings.
328
329 * If the authentication protocol does not support a channel
330 binding operation, but provides a "security layer" with at
331 least integrity protection, then the application MUST use the
332 authentication protocol's integrity protection facilities to
333 exchange channel bindings, or cryptographic hashes thereof.
334
335
336
337
338Williams Standards Track [Page 6]
339
340RFC 5056 On Channel Bindings November 2007
341
342
343 * The name of the type of channel binding MUST be used by the
344 application and/or authentication protocol to avoid ambiguity
345 about which of several possible types of channels is being
346 bound. If nested instances of the same type of channel are
347 available, then the innermost channel MUST be used.
348
349 o Specifications of channel bindings for any secure channels MUST
350 provide for a single, canonical octet string encoding of the
351 channel bindings. Under this framework, channel bindings MUST
352 start with the channel binding unique prefix followed by a colon
353 (ASCII 0x3A).
354
355 o The channel bindings for a given type of secure channel MUST be
356 constructed in such a way that an MITM could not easily force the
357 channel bindings of a given channel to match those of another.
358
359 o Unique channel bindings MUST bind not only the key exchange for
360 the secure channel, but also any negotiations and authentication
361 that may have taken place to establish the channel.
362
363 o End-point channel bindings MUST be bound into the secure channel
364 and all its negotiations. For example, a public key as an end-
365 point channel binding should be used to verify a signature of such
366 negotiations (or to encrypt them), including the initial key
367 exchange and negotiation messages for that channel -- such a key
368 would then be bound into the channel. A certificate name as end-
369 point channel binding could also be bound into the channel in a
370 similar way, though in the case of a certificate name, the binding
371 also depends on the strength of the authentication of that name
372 (that is, the validation of the certificate, the trust anchors,
373 the algorithms used in the certificate path construction and
374 validation, etcetera).
375
376 o End-point channel bindings MAY be identifiers (e.g., certificate
377 names) that must be authenticated through some infrastructure,
378 such as a public key infrastructure (PKI). In such cases,
379 applications MUST ensure that the channel provides adequate
380 authentication of such identifiers (e.g., that the certificate
381 validation policy and trust anchors used by the channel satisfy
382 the application's requirements). To avoid implementation
383 difficulties in addressing this requirement, applications SHOULD
384 use cryptographic quantities as end-point channel bindings, such
385 as certificate-subject public keys.
386
387 o Applications that desire confidentiality protection MUST use
388 application-layer session protection services for confidentiality
389 protection when the bound channel does not provide confidentiality
390 protection.
391
392
393
394Williams Standards Track [Page 7]
395
396RFC 5056 On Channel Bindings November 2007
397
398
399 o The integrity of a secure channel MUST NOT be weakened should
400 their channel bindings be revealed to an attacker. That is, the
401 construction of the channel bindings for any type of secure
402 channel MUST NOT leak secret information about the channel. End-
403 point channel bindings, however, MAY leak information about the
404 end-points of the channel (e.g., their names).
405
406 o The channel binding operation MUST be at least integrity protected
407 in the security mechanism used at the application layer.
408
409 o Authentication frameworks and mechanisms that support channel
410 binding MUST communicate channel binding failure to applications.
411
412 o Applications MUST NOT send sensitive information, requiring
413 confidentiality protection, over the underlying channel prior to
414 completing the channel binding operation.
415
416 Recommendations:
417
418 o End-point channel bindings where the end-points are meaningful
419 names SHOULD NOT be used when the channel does not provide
420 confidentiality protection and privacy protection is desired.
421 Alternatively, channels that export such channel bindings SHOULD
422 provide for the use of a digest and SHOULD NOT introduce new
423 digest/hash agility problems as a result.
424
425 Options:
426
427 o Authentication frameworks and mechanisms that support channel
428 binding MAY fail to establish authentication if channel binding
429 fails.
430
431 o Applications MAY send information over the underlying channel and
432 without integrity protection from the application-layer
433 authentication protocol prior to completing the channel binding
434 operation if such information requires only integrity protection.
435 This could be useful for optimistic negotiations.
436
437 o A security mechanism MAY exchange integrity-protected channel
438 bindings.
439
440 o A security mechanism MAY exchange integrity-protected digests of
441 channel bindings. Such mechanisms SHOULD provide for hash/digest
442 agility.
443
444 o A security mechanism MAY use channel bindings in key exchange,
445 authentication, or key derivation, prior to the exchange of
446 "authenticator" messages.
447
448
449
450Williams Standards Track [Page 8]
451
452RFC 5056 On Channel Bindings November 2007
453
454
4552.2. EAP Channel Binding
456
457 This section is informative. This document does not update EAP
458 [RFC3748], it neither normatively describes, nor does it impose
459 requirements on any aspect of EAP or EAP methods.
460
461 EAP [RFC3748] includes a concept of channel binding described as
462 follows:
463
464 The communication within an EAP method of integrity-protected
465 channel properties such as endpoint identifiers which can be
466 compared to values communicated via out of band mechanisms (such
467 as via a AAA or lower layer protocol).
468
469 Section 7.15 of [RFC3748] describes the problem as one where a
470 Network Access Server (NAS) (a.k.a. "authenticator") may lie to the
471 peer (client) and cause the peer to make incorrect authorization
472 decisions (e.g., as to what traffic may transit through the NAS).
473 This is not quite like the purpose of generic channel binding (MITM
474 detection).
475
476 Section 7.15 of [RFC3748] calls for "a protected exchange of channel
477 properties such as endpoint identifiers" such that "it is possible to
478 match the channel properties provided by the authenticator via out-
479 of-band mechanisms against those exchanged within the EAP method".
480
481 This has sometimes been taken to be very similar to the generic
482 notion of channel binding provided here. However, there is a very
483 subtle difference between the two concepts of channel binding that
484 makes it much too difficult to put forth requirements and
485 recommendations that apply to both. The difference is about the
486 lower-layer channel:
487
488 o In the generic channel binding case, the identities of either end
489 of this channel are irrelevant to anything other than the
490 construction of a name for that channel, in which case the
491 identities of the channel's end-points must be established a
492 priori.
493
494 o Whereas in the EAP case, the identity of the NAS end of the
495 channel, and even security properties of the channel itself, may
496 be established during or after authentication of the EAP peer to
497 the EAP server.
498
499 In other words: there is a fundamental difference in mechanics
500 (timing of lower-layer channel establishment) and in purpose
501 (authentication of lower-layer channel properties for authorization
502 purposes vs. MITM detection).
503
504
505
506Williams Standards Track [Page 9]
507
508RFC 5056 On Channel Bindings November 2007
509
510
511 After some discussion we have concluded that there is no simple way
512 to obtain requirements and recommendations that apply to both generic
513 and EAP channel binding. Therefore, EAP is out of the scope of this
514 document.
515
5163. Authentication and Channel Binding Semantics
517
518 Some authentication frameworks and/or mechanisms provide for channel
519 binding, such as the GSS-API and some GSS-API mechanisms, whereas
520 others may not, such as SASL (however, ongoing work is adding channel
521 binding support to SASL). Semantics may vary with respect to
522 negotiation, how the binding occurs, and handling of channel binding
523 failure (see below).
524
525 Where suitable channel binding facilities are not provided,
526 application protocols MAY include a separate, protected exchange of
527 channel bindings. In order to do this, the application-layer
528 authentication service must provide message protection services (at
529 least integrity protection).
530
5313.1. The GSS-API and Channel Binding
532
533 The GSS-API [RFC2743] provides for the use of channel binding during
534 initialization of GSS-API security contexts, though GSS-API
535 mechanisms are not required to support this facility.
536
537 This channel binding facility is described in [RFC2743] and
538 [RFC2744].
539
540 GSS-API mechanisms must fail security context establishment when
541 channel binding fails, and the GSS-API provides no mechanism for the
542 negotiation of channel binding. As a result GSS-API applications
543 must agree a priori, through negotiation or otherwise, on the use of
544 channel binding.
545
546 Fortunately, it is possible to design GSS-API pseudo-mechanisms that
547 simply wrap around existing mechanisms for the purpose of allowing
548 applications to negotiate the use of channel binding within their
549 existing methods for negotiating GSS-API mechanisms. For example,
550 NFSv4 [RFC3530] provides its own GSS-API mechanism negotiation, as
551 does the SSHv2 protocol [RFC4462]. Such pseudo-mechanisms are being
552 proposed separately, see [STACKABLE].
553
554
555
556
557
558
559
560
561
562Williams Standards Track [Page 10]
563
564RFC 5056 On Channel Bindings November 2007
565
566
5673.2. SASL and Channel Binding
568
569 SASL [RFC4422] does not yet provide for the use of channel binding
570 during initialization of SASL contexts.
571
572 Work is ongoing [SASL-GS2] to specify how SASL, particularly its new
573 bridge to the GSS-API, performs channel binding. SASL will likely
574 differ from the GSS-API in its handling of channel binding failure
575 (i.e., when there may be an MITM) in that channel binding
576 success/failure will only affect the negotiation of SASL security
577 layers. That is, when channel binding succeeds, SASL should select
578 no security layers, leaving session cryptographic protection to the
579 secure channel that SASL authentication has been bound to.
580
5814. Channel Bindings Specifications
582
583 Channel bindings for various types of secure channels are not
584 described herein. Some channel bindings specifications can be found
585 in:
586
587 +--------------------+----------------------------------------------+
588 | Secure Channel | Reference |
589 | Type | |
590 +--------------------+----------------------------------------------+
591 | SSHv2 | [SSH-CB] |
592 | | |
593 | TLS | [TLS-CB] |
594 | | |
595 | IPsec | There is no specification for IPsec channel |
596 | | bindings yet, but the IETF Better Than |
597 | | Nothing Security (BTNS) WG is working to |
598 | | specify IPsec channels, and possibly IPsec |
599 | | channel bindings. |
600 +--------------------+----------------------------------------------+
601
6024.1. Examples of Unique Channel Bindings
603
604 The following text is not normative, but is here to show how one
605 might construct channel bindings for various types of secure
606 channels.
607
608 For SSHv2 [RFC4251] the SSHv2 session ID should suffice as it is a
609 cryptographic binding of all relevant SSHv2 connection parameters:
610 key exchange and negotiation.
611
612 The TLS [RFC4346] session ID is simply assigned by the server. As
613 such, the TLS session ID does not have the required properties to be
614 useful as a channel binding because any MITM, posing as the server,
615
616
617
618Williams Standards Track [Page 11]
619
620RFC 5056 On Channel Bindings November 2007
621
622
623 can simply assign the same session ID to the victim client as the
624 server assigned to the MITM. Instead, the initial, unencrypted TLS
625 finished messages (the client's, the server's, or both) are
626 sufficient as they are the output of the TLS pseudo-random function,
627 keyed with the session key, applied to all handshake material.
628
6294.2. Examples of End-Point Channel Bindings
630
631 The following text is not normative, but is here to show how one
632 might construct channel bindings for various types of secure
633 channels.
634
635 For SSHv2 [RFC4251] the SSHv2 host public key, when present, should
636 suffice as it is used to sign the algorithm suite negotiation and
637 Diffie-Hellman key exchange; as long the client observes the host
638 public key that corresponds to the private host key that the server
639 used, then there cannot be an MITM in the SSHv2 connection. Note
640 that not all SSHv2 key exchanges use host public keys; therefore,
641 this channel bindings construction is not as useful as the one given
642 in Section 4.1.
643
644 For TLS [RFC4346]the server certificate should suffice for the same
645 reasons as above. Again, not all TLS cipher suites involve server
646 certificates; therefore, the utility of this construction of channel
647 bindings is limited to scenarios where server certificates are
648 commonly used.
649
6505. Uses of Channel Binding
651
652 Uses for channel binding identified so far:
653
654 o Delegating session cryptographic protection to layers where
655 hardware can reasonably be expected to support relevant
656 cryptographic protocols:
657
658 * NFSv4 [RFC3530] with Remote Direct Data Placement (RDDP)
659 [NFS-DDP] for zero-copy reception where network interface
660 controllers (NICs) support RDDP. Cryptographic session
661 protection would be delegated to Encapsulating Security Payload
662 (ESP) [RFC4303] / Authentication Headers (AHs) [RFC4302].
663
664 * iSCSI [RFC3720] with Remote Direct Memory Access (RDMA)
665 [RFC5046]. Cryptographic session protection would be delegated
666 to ESP/AH.
667
668 * HTTP with TLS [RFC2817] [RFC2818]. In situations involving
669 proxies, users may want to bind authentication to a TLS channel
670 between the last client-side proxy and the first server-side
671
672
673
674Williams Standards Track [Page 12]
675
676RFC 5056 On Channel Bindings November 2007
677
678
679 proxy ("concentrator"). There is ongoing work to expand the
680 set of choices for end-to-end authentication at the HTTP layer,
681 that, coupled with channel binding to TLS, would allow for
682 proxies while not forgoing protection over public internets.
683
684 o Reducing the number of live cryptographic contexts that an
685 application must maintain:
686
687 * NFSv4 [RFC3530] multiplexes multiple users onto individual
688 connections. Each user is authenticated separately, and users'
689 remote procedure calls (RPCs) are protected with per-user GSS-
690 API security contexts. This means that large timesharing
691 clients must often maintain many cryptographic contexts per-
692 NFSv4 connection. With channel binding to IPsec, they could
693 maintain a much smaller number of cryptographic contexts per-
694 NFSv4 connection, thus reducing memory pressure and
695 interactions with cryptographic hardware.
696
697 For example, applications that wish to use RDDP to achieve zero-copy
698 semantics on reception may use a network layer understood by NICs to
699 offload delivery of application data into pre-arranged memory
700 buffers. Note that in order to obtain zero-copy reception semantics
701 either application data has to be in cleartext relative to this RDDP
702 layer, or the RDDP implementation must know how to implement
703 cryptographic session protection protocols used at the application
704 layer.
705
706 There are a multitude of application-layer cryptographic session
707 protection protocols available. It is not reasonable to expect that
708 NICs should support many such protocols. Further, some application
709 protocols may maintain many cryptographic session contexts per-
710 connection (for example, NFSv4 does). It is thought to be simpler to
711 push the cryptographic session protection down the network stack (to
712 IPsec), and yet be able to produce NICs that offload other operations
713 (i.e., TCP/IP, ESP/AH, and DDP), than it would be to add support in
714 the NIC for the many session cryptographic protection protocols in
715 use in common applications at the application layer.
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730Williams Standards Track [Page 13]
731
732RFC 5056 On Channel Bindings November 2007
733
734
735 The following figure shows how the various network layers are
736 related:
737
738 +---------------------+
739 | Application layer |<---+
740 | |<-+ | In cleartext, relative
741 +---------------------+ | | to each other.
742 | RDDP |<---+
743 +---------------------+ |
744 | TCP/SCTP |<-+
745 +---------------------+ | Channel binding of app-layer
746 | ESP/AH |<-+ authentication to IPsec
747 +---------------------+
748 | IP |
749 +---------------------+
750 | ... |
751 +---------------------+
752
7536. Benefits of Channel Binding to Secure Channels
754
755 The use of channel binding to delegate session cryptographic
756 protection include:
757
758 o Performance improvements by avoiding double protection of
759 application data in cases where IPsec is in use and applications
760 provide their own secure channels.
761
762 o Performance improvements by leveraging hardware-accelerated IPsec.
763
764 o Performance improvements by allowing RDDP hardware offloading to
765 be integrated with IPsec hardware acceleration.
766
767 Where protocols layered above RDDP use privacy protection, RDDP
768 offload cannot be done. Thus, by using channel binding to
769 IPsec, the privacy protection is moved to IPsec, which is
770 layered below RDDP. So, RDDP can address application protocol
771 data that's in cleartext relative to the RDDP headers.
772
773 o Latency improvements for applications that multiplex multiple
774 users onto a single channel, such as NFS with RPCSEC_GSS
775 [RFC2203].
776
777 Delegation of session cryptographic protection to IPsec requires
778 features not yet specified. There is ongoing work to specify:
779
780 o IPsec channels [CONN-LATCH];
781
782
783
784
785
786Williams Standards Track [Page 14]
787
788RFC 5056 On Channel Bindings November 2007
789
790
791 o Application programming interfaces (APIs) related to IPsec
792 channels [BTNS-IPSEC];
793
794 o Channel bindings for IPsec channels;
795
796 o Low infrastructure IPsec authentication [BTNS-CORE].
797
7987. IANA Considerations
799
800 IANA has created a new registry for channel bindings specifications
801 for various types of channels.
802
803 The purpose of this registry is not only to ensure uniqueness of
804 values used to name channel bindings, but also to provide a
805 definitive reference to technical specifications detailing each
806 channel binding available for use on the Internet.
807
808 There is no naming convention for channel bindings: any string
809 composed of US-ASCII alphanumeric characters, period ('.'), and dash
810 ('-') will suffice.
811
812 The procedure detailed in Section 7.1 is to be used for registration
813 of a value naming a specific individual mechanism.
814
8157.1. Registration Procedure
816
817 Registration of a new channel binding requires expert review as
818 defined in BCP 26 [RFC2434].
819
820 Registration of a channel binding is requested by filling in the
821 following template:
822
823 o Subject: Registration of channel binding X
824
825 o Channel binding unique prefix (name):
826
827 o Channel binding type: (One of "unique" or "end-point")
828
829 o Channel type: (e.g., TLS, IPsec, SSH, etc.)
830
831 o Published specification (recommended, optional):
832
833 o Channel binding is secret (requires confidentiality protection):
834 yes/no
835
836 o Description (optional if a specification is given; required if no
837 published specification is specified):
838
839
840
841
842Williams Standards Track [Page 15]
843
844RFC 5056 On Channel Bindings November 2007
845
846
847 o Intended usage: (one of COMMON, LIMITED USE, or OBSOLETE)
848
849 o Person and email address to contact for further information:
850
851 o Owner/Change controller name and email address:
852
853 o Expert reviewer name and contact information: (leave blank)
854
855 o Note: (Any other information that the author deems relevant may be
856 added here.)
857
858 and sending it via electronic mail to <channel-binding@ietf.org> (a
859 public mailing list) and carbon copying IANA at <iana@iana.org>.
860 After allowing two weeks for community input on the mailing list to
861 be determined, an expert will determine the appropriateness of the
862 registration request and either approve or disapprove the request
863 with notice to the requestor, the mailing list, and IANA.
864
865 If the expert approves registration, it adds her/his name to the
866 submitted registration.
867
868 The expert has the primary responsibility of making sure that channel
869 bindings for IETF specifications go through the IETF consensus
870 process and that prefixes are unique.
871
872 The review should focus on the appropriateness of the requested
873 channel binding for the proposed use, the appropriateness of the
874 proposed prefix, and correctness of the channel binding type in the
875 registration. The scope of this request review may entail
876 consideration of relevant aspects of any provided technical
877 specification, such as their IANA Considerations section. However,
878 this review is narrowly focused on the appropriateness of the
879 requested registration and not on the overall soundness of any
880 provided technical specification.
881
882 Authors are encouraged to pursue community review by posting the
883 technical specification as an Internet-Draft and soliciting comment
884 by posting to appropriate IETF mailing lists.
885
8867.2. Comments on Channel Bindings Registrations
887
888 Comments on registered channel bindings should first be sent to the
889 "owner" of the channel bindings and to the channel binding mailing
890 list.
891
892 Submitters of comments may, after a reasonable attempt to contact the
893 owner, request IANA to attach their comment to the channel binding
894 type registration itself by sending mail to <iana@iana.org>. At
895
896
897
898Williams Standards Track [Page 16]
899
900RFC 5056 On Channel Bindings November 2007
901
902
903 IANA's sole discretion, IANA may attach the comment to the channel
904 bindings registration.
905
9067.3. Change Control
907
908 Once a channel bindings registration has been published by IANA, the
909 author may request a change to its definition. The change request
910 follows the same procedure as the registration request.
911
912 The owner of a channel bindings may pass responsibility for the
913 channel bindings to another person or agency by informing IANA; this
914 can be done without discussion or review.
915
916 The IESG may reassign responsibility for a channel bindings
917 registration. The most common case of this will be to enable changes
918 to be made to mechanisms where the author of the registration has
919 died, has moved out of contact, or is otherwise unable to make
920 changes that are important to the community.
921
922 Channel bindings registrations may not be deleted; mechanisms that
923 are no longer believed appropriate for use can be declared OBSOLETE
924 by a change to their "intended usage" field. Such channel bindings
925 will be clearly marked in the lists published by IANA.
926
927 The IESG is considered to be the owner of all channel bindings that
928 are on the IETF standards track.
929
9308. Security Considerations
931
932 Security considerations appear throughout this document. In
933 particular see Section 2.1.
934
935 When delegating session protection from one layer to another, one
936 will almost certainly be making some session security trade-offs,
937 such as using weaker cipher modes in one layer than might be used in
938 the other. Evaluation and comparison of the relative cryptographic
939 strengths of these is difficult, may not be easily automated, and is
940 far out of scope for this document. Implementors and administrators
941 should understand these trade-offs. Interfaces to secure channels
942 and application-layer authentication frameworks and mechanisms could
943 provide some notion of security profile so that applications may
944 avoid delegation of session protection to channels that are too weak
945 to match a required security profile.
946
947 Channel binding makes "anonymous" channels (where neither end-point
948 is strongly authenticated to the other) useful. Implementors should
949 avoid making it easy to use such channels without channel binding.
950
951
952
953
954Williams Standards Track [Page 17]
955
956RFC 5056 On Channel Bindings November 2007
957
958
959 The security of channel binding depends on the security of the
960 channels, the construction of their channel bindings, and the
961 security of the authentication mechanism used by the application and
962 its channel binding method.
963
964 Channel bindings should be constructed in such a way that revealing
965 the channel bindings of a channel to third parties does not weaken
966 the security of the channel. However, for end-point channel bindings
967 disclosure of the channel bindings may disclose the identities of the
968 peers.
969
9708.1. Non-Unique Channel Bindings and Channel Binding Re-Establishment
971
972 Application developers may be tempted to use non-unique channel
973 bindings for fast re-authentication following channel re-
974 establishment. Care must be taken to avoid the possibility of
975 attacks on multi-user systems.
976
977 Consider a user multiplexing protocol like NFSv4 using channel
978 binding to IPsec on a multi-user client. If another user can connect
979 directly to port 2049 (NFS) on some server using IPsec and merely
980 assert RPCSEC_GSS credential handles, then this user will be able to
981 impersonate any user authenticated by the client to the server. This
982 is because the new connection will have the same channel bindings as
983 the NFS client's! To prevent this, the server must require that at
984 least a host-based client principal, and perhaps all the client's
985 user principals, re-authenticate and perform channel binding before
986 the server will allow the clients to assert RPCSEC_GSS context
987 handles. Alternatively, the protocol could require a) that secure
988 channels provide confidentiality protection and b) that fast re-
989 authentication cookies be difficult to guess (e.g., large numbers
990 selected randomly).
991
992 In other contexts there may not be such problems, for example, in the
993 case of application protocols that don't multiplex users over a
994 single channel and where confidentiality protection is always used in
995 the secure channel.
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010Williams Standards Track [Page 18]
1011
1012RFC 5056 On Channel Bindings November 2007
1013
1014
10159. References
1016
10179.1. Normative References
1018
1019 [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
1020 Requirement Levels", BCP 14, RFC 2119, March 1997.
1021
10229.2. Informative References
1023
1024 [BTNS-AS] Touch, J., Black, D., and Y. Wang, "Problem and
1025 Applicability Statement for Better Than Nothing Security
1026 (BTNS)", Work in Progress, October 2007.
1027
1028 [BTNS-CORE] Richardson, M. and N. Williams, "Better-Than-Nothing-
1029 Security: An Unauthenticated Mode of IPsec", Work in
1030 Progress, September 2007.
1031
1032 [BTNS-IPSEC] Richardson, M. and B. Sommerfeld, "Requirements for an
1033 IPsec API", Work in Progress, April 2006.
1034
1035 [CONN-LATCH] Williams, N., "IPsec Channels: Connection Latching",
1036 Work in Progress, September 2007.
1037
1038 [Lampson91] Lampson, B., Abadi, M., Burrows, M., and E. Wobber,
1039 "Authentication in Distributed Systems: Theory and
1040 Practive", October 1991.
1041
1042 [NFS-DDP] Callaghan, B. and T. Talpey, "NFS Direct Data
1043 Placement", Work in Progress, July 2007.
1044
1045 [RFC1964] Linn, J., "The Kerberos Version 5 GSS-API Mechanism",
1046 RFC 1964, June 1996.
1047
1048 [RFC2203] Eisler, M., Chiu, A., and L. Ling, "RPCSEC_GSS Protocol
1049 Specification", RFC 2203, September 1997.
1050
1051 [RFC2401] Kent, S. and R. Atkinson, "Security Architecture for the
1052 Internet Protocol", RFC 2401, November 1998.
1053
1054 [RFC2434] Narten, T. and H. Alvestrand, "Guidelines for Writing an
1055 IANA Considerations Section in RFCs", BCP 26, RFC 2434,
1056 October 1998.
1057
1058 [RFC2743] Linn, J., "Generic Security Service Application Program
1059 Interface Version 2, Update 1", RFC 2743, January 2000.
1060
1061 [RFC2744] Wray, J., "Generic Security Service API Version 2 :
1062 C-bindings", RFC 2744, January 2000.
1063
1064
1065
1066Williams Standards Track [Page 19]
1067
1068RFC 5056 On Channel Bindings November 2007
1069
1070
1071 [RFC2817] Khare, R. and S. Lawrence, "Upgrading to TLS Within
1072 HTTP/1.1", RFC 2817, May 2000.
1073
1074 [RFC2818] Rescorla, E., "HTTP Over TLS", RFC 2818, May 2000.
1075
1076 [RFC3530] Shepler, S., Callaghan, B., Robinson, D., Thurlow, R.,
1077 Beame, C., Eisler, M., and D. Noveck, "Network File
1078 System (NFS) version 4 Protocol", RFC 3530, April 2003.
1079
1080 [RFC3720] Satran, J., Meth, K., Sapuntzakis, C., Chadalapaka, M.,
1081 and E. Zeidner, "Internet Small Computer Systems
1082 Interface (iSCSI)", RFC 3720, April 2004.
1083
1084 [RFC3748] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and
1085 H. Levkowetz, "Extensible Authentication Protocol
1086 (EAP)", RFC 3748, June 2004.
1087
1088 [RFC4120] Neuman, C., Yu, T., Hartman, S., and K. Raeburn, "The
1089 Kerberos Network Authentication Service (V5)", RFC 4120,
1090 July 2005.
1091
1092 [RFC4251] Ylonen, T. and C. Lonvick, "The Secure Shell (SSH)
1093 Protocol Architecture", RFC 4251, January 2006.
1094
1095 [RFC4301] Kent, S. and K. Seo, "Security Architecture for the
1096 Internet Protocol", RFC 4301, December 2005.
1097
1098 [RFC4302] Kent, S., "IP Authentication Header", RFC 4302, December
1099 2005.
1100
1101 [RFC4303] Kent, S., "IP Encapsulating Security Payload (ESP)", RFC
1102 4303, December 2005.
1103
1104 [RFC4346] Dierks, T. and E. Rescorla, "The Transport Layer
1105 Security (TLS) Protocol Version 1.1", RFC 4346, April
1106 2006.
1107
1108 [RFC4422] Melnikov, A. and K. Zeilenga, "Simple Authentication and
1109 Security Layer (SASL)", RFC 4422, June 2006.
1110
1111 [RFC4462] Hutzelman, J., Salowey, J., Galbraith, J., and V. Welch,
1112 "Generic Security Service Application Program Interface
1113 (GSS-API) Authentication and Key Exchange for the Secure
1114 Shell (SSH) Protocol", RFC 4462, May 2006.
1115
1116
1117
1118
1119
1120
1121
1122Williams Standards Track [Page 20]
1123
1124RFC 5056 On Channel Bindings November 2007
1125
1126
1127 [RFC5046] Ko, M., Chadalapaka, M., Hufferd, J., Elzur, U., Shah,
1128 H., and P. Thaler, "Internet Small Computer System
1129 Interface (iSCSI) Extensions for Remote Direct Memory
1130 Access (RDMA)", RFC 5046, October 2007.
1131
1132 [SASL-GS2] Josefsson, S., "Using GSS-API Mechanisms in SASL: The
1133 GS2 Mechanism Family", Work in Progress, October 2007.
1134
1135 [SSH-CB] Williams, N., "Channel Binding Identifiers for Secure
1136 Shell Channels", Work in Progress, November 2007.
1137
1138 [STACKABLE] Williams, N., "Stackable Generic Security Service
1139 Pseudo-Mechanisms", Work in Progress, June 2006.
1140
1141 [TLS-CB] Altman, J. and N. Williams, "Unique Channel Bindings for
1142 TLS", Work in Progress, November 2007.
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178Williams Standards Track [Page 21]
1179
1180RFC 5056 On Channel Bindings November 2007
1181
1182
1183Appendix A. Acknowledgments
1184
1185 Thanks to Mike Eisler for his work on the Channel Conjunction
1186 Mechanism document and for bringing the problem to a head, Sam
1187 Hartman for pointing out that channel binding provides a general
1188 solution to the channel binding problem, and Jeff Altman for his
1189 suggestion of using the TLS finished messages as the TLS channel
1190 bindings. Also, thanks to Bill Sommerfeld, Radia Perlman, Simon
1191 Josefsson, Joe Salowey, Eric Rescorla, Michael Richardson, Bernard
1192 Aboba, Tom Petch, Mark Brown, and many others.
1193
1194Author's Address
1195
1196 Nicolas Williams
1197 Sun Microsystems
1198 5300 Riata Trace Ct.
1199 Austin, TX 78727
1200 US
1201
1202 EMail: Nicolas.Williams@sun.com
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234Williams Standards Track [Page 22]
1235
1236RFC 5056 On Channel Bindings November 2007
1237
1238
1239Full Copyright Statement
1240
1241 Copyright (C) The IETF Trust (2007).
1242
1243 This document is subject to the rights, licenses and restrictions
1244 contained in BCP 78, and except as set forth therein, the authors
1245 retain all their rights.
1246
1247 This document and the information contained herein are provided on an
1248 "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
1249 OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
1250 THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
1251 OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
1252 THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
1253 WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
1254
1255Intellectual Property
1256
1257 The IETF takes no position regarding the validity or scope of any
1258 Intellectual Property Rights or other rights that might be claimed to
1259 pertain to the implementation or use of the technology described in
1260 this document or the extent to which any license under such rights
1261 might or might not be available; nor does it represent that it has
1262 made any independent effort to identify any such rights. Information
1263 on the procedures with respect to rights in RFC documents can be
1264 found in BCP 78 and BCP 79.
1265
1266 Copies of IPR disclosures made to the IETF Secretariat and any
1267 assurances of licenses to be made available, or the result of an
1268 attempt made to obtain a general license or permission for the use of
1269 such proprietary rights by implementers or users of this
1270 specification can be obtained from the IETF on-line IPR repository at
1271 http://www.ietf.org/ipr.
1272
1273 The IETF invites any interested party to bring to its attention any
1274 copyrights, patents or patent applications, or other proprietary
1275 rights that may cover technology that may be required to implement
1276 this standard. Please address the information to the IETF at
1277 ietf-ipr@ietf.org.
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290Williams Standards Track [Page 23]
1291
1292