[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
Re: Authentication Methods for LDAP - last call (mandatory CRAM-MD5)
> X-SMAP-Received-From: outside
> Resent-Date: Mon, 3 Aug 1998 15:52:10 -0700 (PDT)
> Date: Mon, 03 Aug 1998 17:46:37 -0500
> From: Mark Wahl <M.Wahl@INNOSOFT.COM>
> Subject: Re: Authentication Methods for LDAP - last call (mandatory CRAM-MD5)
> To: Jeff.Hodges@stanford.edu
> Cc: ietf-ldapext@netscape.com
> MIME-version: 1.0
> Resent-Message-ID: <"jxJS7.0.303.MyZnr"@glacier>
> Resent-From: ietf-ldapext@netscape.com
> X-Mailing-List: <ietf-ldapext@netscape.com> archive/latest/591
> X-Loop: ietf-ldapext@netscape.com
> Resent-Sender: ietf-ldapext-request@netscape.com
>
>
> > Client and server mplementations MUST have provisions for end-user addition
> > of support for at least these security mechanisms: <list of SASL mechs
here>.
>
> I don't think this statement is suitable for this document. The majority
> of IETF specifications describe the exchange of bits on the wire. So long as
> two implementations can generate/parse the same bits, then they interoperate.
> Currently the SASL API documents are an internet-draft for the client side,
> and require much more spec'ing (IMHO) on the server side. Requiring ALL
LDAPv3
> implementations, including an embedded LDAP client in a nonprogrammable device
> to support pluggable modules with an API that is still being developed does
> not seem successful.
>
> > [E.g. the fashion in which Netscape's client SDKs and Directory servers are
> > extensible through plug-ins.]
>
> As our ours and other clients and servers, but with a different API (and
> different language bindings?) since there is no one standard language.
>
> I would suggest that IF and WHEN suitable APIs for SASL become Standards Track
> (or at least informational), then LDAP implementations that support the
> reconfiguration of SASL mechanisms SHOULD do so with these APIs.
>
> > So, I think the CRAM-MD5 thing is fine (for now), but I wonder if the doc
> > goes far enough in that it doesn't profile Kerberos v4 or GSSAPI (Kerberos
> > v5 et al)
>
> Could you point me at any examples or papers describing the use of Kerberos
> SASL mechanisms on the wide-area Internet, especially where the client and
> server are located in different organizations? There is specification work
> going in PKIX and elsewhere on how to handle cross-certification for use by
> Start TLS, but I am not familar with that kind of activity for Kerberos.
>
> Mark Wahl, Directory Product Architect
> Innosoft International, Inc.
Public key certificates in Kerberos are specified in
draft-ietf-cat-kerberos-pk-init-06.txt.
Jonathan