[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
Re: IETF ldapbis WG Last Call: draft-ietf-ldapbis-user-schema-05.txt
- To: "Ramsay, Ron" <Ron.Ramsay@ca.com>
- Subject: Re: IETF ldapbis WG Last Call: draft-ietf-ldapbis-user-schema-05.txt
- From: Michael Ströder <michael@stroeder.com>
- Date: Tue, 27 May 2003 09:56:22 +0200
- Cc: ietf-ldapbis@OpenLDAP.org
- In-reply-to: <1395B4B334FCC143B36AF788E68B63811E3F6E@ausyms21.ca.com>
- References: <1395B4B334FCC143B36AF788E68B63811E3F6E@ausyms21.ca.com>
- User-agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.3.1) Gecko/20030425
Ramsay, Ron wrote:
Yes, thanks, I did see the discussion. I am just saying that I wasn't
moved by it. I don't see how you can actually talk meaningfully about
'textual' passwords
I would define 'textual' passwords as passwords manually typed in by a user
on the keyboard or a similar character-based input device. More formally one
could define textual passwords as a character sequence with a known
character set and encoding.
As current practical experience shows arguing that you can stuff anything
(here an arbitrary character sequence and encoding) into an Octet String
leads to bad interoperability of LDAP applications.
At the moment the only almost safe way is to limit passwords to ASCII since
ISO-8859-1 and UTF-8 both used by some applications share the very same byte
encoding for ASCII. But there might be users who don't have a single ASCII
character on their input device...and there might be an application stuffing
UTF-16 into the password.
- do you scan a password first to see if it is valid
UTF-8 and, if so, convert it to unicode and apply stringprep?
No, off course!
Usually you can differentiate in the LDAP application where your password
comes from. Most times the application receives the password from the user
by some input device/input form etc. And then you know which character set
it is and you can easily convert it to UTF-8.
I can't get excited about that.
Let us clarify things:
Octet Strings for passwords are used because there could be a "locally
defined" mechanism for using arbitrary Octet Strings in Simple Bind (e.g.
automatically generated tickets, scanned mouse moves, biometric data or
similar). In this scenario an LDAP application will likely not interact with
a human user through a keyboard to ask for a password. This is still
possible with Kurt's recommendation.
Ciao, Michael.