draft-brezak-spnego-http-01.txt   [plain text]




Kerberos working group                                         J.Brezak 
Internet Draft                                                Microsoft 
Document: draft-brezak-spnego-http-01.txt                                      
Category: Informational                                                 
                                                         September 2001 
 
 
           HTTP Authentication: SPNEGO Access Authentication 
 
 
Status of this Memo 
 
   This document is an Internet-Draft and is in full conformance with 
   all provisions of Section 10 of RFC2026 [1]. Internet-Drafts are 
   working documents of the Internet Engineering Task Force (IETF), its 
   areas, and its working groups. Note that other groups may also 
   distribute working documents as Internet-Drafts. Internet-Drafts are 
   draft documents valid for a maximum of six months and may be 
   updated, replaced, or obsoleted by other documents at any time. It 
   is inappropriate to use Internet- Drafts as reference material or to 
   cite them other than as "work in progress." 
     
   The list of current Internet-Drafts can be accessed at 
   http://www.ietf.org/ietf/1id-abstracts.txt  
    
   The list of Internet-Draft Shadow Directories can be accessed at 
   http://www.ietf.org/shadow.html. 
    
1. Abstract 
    
   This document describes how Microsoft's Internet Explorer 5.0 and 
   Internet Information Services 5.0 use Kerberos for security 
   enhancements of web transactions. The HTTP auth-scheme of 
   "negotiate" is defined here; when the negotiation results in the 
   selection of Kerberos, the security services of authentication and 
   optionally impersonation are performed. 
    
    
2. Conventions used in this document 
    
   In examples, "C:" and "S:" indicate lines sent by the client and 
   server respectively. 
    
   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 
   "SHOULD", "SHOULD NOT", "RECOMMENDED",  "MAY", and "OPTIONAL" in 
   this document are to be interpreted as described in RFC-2119 [3]. 
    
    
3. Access Authentication 
    
3.1 Reliance on the HTTP/1.1 Specification 
 
   This specification is a companion to the HTTP/1.1 specification [4] 
   and builds on the authentication mechanisms defined in [5]. It uses 
  
Brezak                 Category - Informational                      1 








                     SPNEGO Access Authentication       September 2001 

   the augmented BNF section 2.1 of that document, and relies on both 
   the non-terminals defined in that document and other aspects of the 
   HTTP/1.1 specification. 
    
    
4. HTTP Negotiate Authentication Scheme 
    
   Use of Kerberos is wrapped in an HTTP auth-scheme of "Negotiate".  
   The auth-params exchanged use data formats defined for use with the 
   GSS-API [6].  In particular, they follow the formats set for the 
   SPNEGO [7] and Kerberos [8] "mechanisms" for GSSAPI.  The 
   "Negotiate" auth-scheme calls for the use of SPNEGO GSSAPI tokens 
   which the specific mechanism type specifies. 
    
4.1 The WWW-Authenticate Response Header 
    
   If the server receives a request for an access-protected object, and 
   an acceptable Authorization header is not sent, the server responds 
   with a "401 Unauthorized" status code, and a WWW-Authenticate header 
   as per the framework described in [4]. The negotiate scheme will 
   operate as follows: 
    
    
        challenge       = "Negotiate" auth-data 
        auth-data       = 1#( [gssapi-data] ) 
         
   The meanings of the values of the directives used above are as 
   follows: 
    
   gssapi-data 
        If the gss_accept_security_context return a token for the 
        client, this directive contains is the base64 encoding of an 
        InitialContextToken as defined in [6]. 
  
   A status code 200 response can also carry a WWW-Authenticate 
   response header containing the final leg of a authentication. Before 
   using the contents of the response, the gssapi-data should be 
   processed by gss_init_security_context to determine the state of the 
   security context. If this function indicates success, the response 
   can be used by the application. Otherwise an appropriate action 
   based on the authentication status should be. 
    
   For example the authentication could have failed on the final leg if 
   mutual authentication was requested and the server was not able to 
   prove its identity. In this case, the returned results are suspect. 
   It is not always possible to mutually authenticate the server before 
   the HTTP operation. POST methods are in this category. 
    
   When the Kerberos Version 5 GSSAPI mechanism [RFC-1964] is being 
   used, the HTTP server will be using a principal name of the form of 
   "http/<hostname>". 
    
4.2 The Authorization Request Header 
 
  
Brezak                 Category - Informational                      2 








                     SPNEGO Access Authentication       September 2001 

   The client is expected to retry the request, passing an 
   Authorization header line, which is defined according to the 
   framework described in [4] utilized as follow: 
    
        credentials             = "Negotiate" auth-data2 
        auth-data2              = 1#( gssapi-data ) 
                                 
   gssapi-data 
        This directive contains is the base64 encoding of an 
        InitialContextToken as defined in [6]. 
    
   If a directive or its value is improper, or required directives are 
   missing, the propose response is 400 Bad Request. If a 401 
   Unauthorized status code is returned, the contents of the WWW-
   Authenticate response header is used to continue the authentication 
   as long as the opaque value is the same. 
    
5. Negotiate Operation Example 
    
   The user is logged onto realm A.COM as user@A.COM. The web server is 
   in realm B using the principal http/server@B.COM. Realm B.COM trusts 
   Realm A.COM  
    
   The client requests an access-protected document from server via a 
   GET method request. The URI of the document is 
   "http://www.nowhere.org/dir/index.html". 
    
   The first time the client requests the document, no Authorization 
   header is sent, so the server responds with: 
    
        HTTP/1.1 401 Unauthorized 
        WWW-Authenticate: Negotiate 
         
   The client will obtain the user credentials using the SPNEGO GSSAPI 
   mechanism type to identify generate a GSSAPI message to be sent to 
   the server with a new request, including the following Authorization 
   header: 
    
        Authorization: Negotiate 
        2a87421000492ade0234568ac0289eca874209af8bc028 
         
   The server will decode the gssapi-data and pass this to the SPNEGO 
   GSSAPI mechanism in the gss_accept_security_context function. The 
   return value from the gss_accept_security_context function can 
   indicate the security context is complete and supply final 
   authentication data to be returned to the client. If the server has 
   more gssapi data to send to the client to complete the context it is 
   to be carried in WWW-Authenticate header with the final response. 
   The response will be sent to the client, including the following 
   header: 
    
        HTTP/1.1 200 Success 
        WWW-Authenticate: Negotiate ade0234568ac874209af8bc0280289eca 
         
  
Brezak                 Category - Informational