[Date Prev][Date Next] [Chronological] [Thread] [Top]

Re: auth-response comments



> First, please note my general aversion to unsolicited controls.
> IMO, controls should only be sent to clients which are known to
> be able to make use of the information.
> 

I would concurr with this. In the general case, the client initiates a 
request and might use a control. This then gives the server the 
opportunity to put related controls in the response. If the client does 
not use a control, the server should assume the client is uninformed 
about them.

David

***************************************************

David Chadwick
IS Institute, University of Salford, Salford M5 4WT
Tel +44 161 295 5351  Fax +44 161 745 8169
Mobile +44 790 167 0359
Email D.W.Chadwick@salford.ac.uk
Home Page  http://www.salford.ac.uk/its024/chadwick.htm
Understanding X.500  http://www.salford.ac.uk/its024/X500.htm
X.500/LDAP Seminars http://www.salford.ac.uk/its024/seminars.htm
Entrust key validation string MLJ9-DU5T-HV8J

***************************************************