<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://k5wiki.kerberos.org/wiki?action=history&amp;feed=atom&amp;title=Projects%2FTLS-KDH</id>
		<title>Projects/TLS-KDH - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://k5wiki.kerberos.org/wiki?action=history&amp;feed=atom&amp;title=Projects%2FTLS-KDH"/>
		<link rel="alternate" type="text/html" href="https://k5wiki.kerberos.org/wiki?title=Projects/TLS-KDH&amp;action=history"/>
		<updated>2026-04-27T03:56:30Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.4</generator>

	<entry>
		<id>https://k5wiki.kerberos.org/wiki?title=Projects/TLS-KDH&amp;diff=5532&amp;oldid=prev</id>
		<title>Vanrein: New page: ''This project introduces Kerberos tickets with Forward Secrecy as TLS CipherSuites.''  {{project-early}}  External project links: * [http://tls-kdh.arpa2.net/tls-kdh.html Project working ...</title>
		<link rel="alternate" type="text/html" href="https://k5wiki.kerberos.org/wiki?title=Projects/TLS-KDH&amp;diff=5532&amp;oldid=prev"/>
				<updated>2015-09-03T11:42:48Z</updated>
		
		<summary type="html">&lt;p&gt;New page: &amp;#039;&amp;#039;This project introduces Kerberos tickets with Forward Secrecy as TLS CipherSuites.&amp;#039;&amp;#039;  {{project-early}}  External project links: * [http://tls-kdh.arpa2.net/tls-kdh.html Project working ...&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;''This project introduces Kerberos tickets with Forward Secrecy as TLS CipherSuites.''&lt;br /&gt;
&lt;br /&gt;
{{project-early}}&lt;br /&gt;
&lt;br /&gt;
External project links:&lt;br /&gt;
* [http://tls-kdh.arpa2.net/tls-kdh.html Project working pages]&lt;br /&gt;
* [http://tls-kdh.arpa2.net/spec/tls-kdh-ID.html Specification]&lt;br /&gt;
* [http://lists.arpa2.org/mailman/listinfo/tls-kdh Discussion list]&lt;br /&gt;
&lt;br /&gt;
We use '''TLS-KDH''' as a name for the protocol proposed on this page.&lt;br /&gt;
&lt;br /&gt;
==Mechanics of the Project==&lt;br /&gt;
&lt;br /&gt;
The TLS-KDH CipherSuite is a special way of using TLS:&lt;br /&gt;
&lt;br /&gt;
# The TLS client offers TLS-KDH CipherSuites in its ClientHello&lt;br /&gt;
# The TLS server selects a TLS-KDH CipherSuite in its ServerHello&lt;br /&gt;
# The TLS server sends no ServerCertificate&lt;br /&gt;
# The TLS server sends a ServerKeyExchange with a suitable Diffie-Hellman public key&lt;br /&gt;
# The TLS server may send a CertificateRequest to request a client identity (which the client may still refuse to supply)&lt;br /&gt;
# The TLS client chooses whether it will release its identity, or remain anonymous&lt;br /&gt;
# The TLS client looks for a service ticket in its local Kerberos infrastructure&lt;br /&gt;
# The TLS client sends a ClientKeyExchange holding a service ticket and a Diffie-Hellman public key response, encrypted to that ticket&lt;br /&gt;
# The TLS server accepts the service ticket and uses it to decrypt the Diffie-Hellman response&lt;br /&gt;
# Both now construct the shared secret, following normal Diffie-Hellman procedures for TLS&lt;br /&gt;
# Both now construct a proof of knowing the secret, thereby authentication to the other side&lt;br /&gt;
# Both now validate the other side before proceeding&lt;br /&gt;
&lt;br /&gt;
==Policy Choices for this Mechanism==&lt;br /&gt;
&lt;br /&gt;
* The server may or may not be equiped with a service ticket; this may depend on the server name&lt;br /&gt;
* The client may be willing to obtain a service ticket for all, some or no remote servers&lt;br /&gt;
* The client may be willing to provide its identity to all, some or no remote servers&lt;br /&gt;
* The KDC may be willing to provide service tickets for remote realms&lt;br /&gt;
&lt;br /&gt;
==Changes to Kerberos==&lt;br /&gt;
&lt;br /&gt;
* None.  Although independent work on [Realm Crossover in the KDC] is bound to be useful.&lt;br /&gt;
&lt;br /&gt;
==Changes to TLS==&lt;br /&gt;
&lt;br /&gt;
* The changes to TLS do not disturb older TLS implementations&lt;br /&gt;
* The TLS-KDH CipherSuites require TLS version 1.2 or later&lt;br /&gt;
* Both TLS clients and servers must be extended to support the TLS-KDH CipherSuites&lt;br /&gt;
&lt;br /&gt;
We expect to offer early support to [http://www.gnutls.org GnuTLS] soon.  The [http://tlspool.arpa2.net TLS Pool] will also support TLS-KDH.&lt;br /&gt;
&lt;br /&gt;
==Comparison to Other Work==&lt;br /&gt;
&lt;br /&gt;
See [http://tls-kdh.arpa2.net/related.html http://tls-kdh.arpa2.net/related.html]&lt;br /&gt;
&lt;br /&gt;
==Related Projects==&lt;br /&gt;
&lt;br /&gt;
See KREALM-XOVER.&lt;br /&gt;
&lt;br /&gt;
==Specifications==&lt;br /&gt;
&lt;br /&gt;
* [https://tools.ietf.org/html/rfc6112 RFC 6112] defines anonymous client tickets&lt;/div&gt;</summary>
		<author><name>Vanrein</name></author>	</entry>

	</feed>