< draft-ietf-kitten-kerberos-iana-registries-03.txt   draft-ietf-kitten-kerberos-iana-registries-04.txt >
Network Working Group T. Yu Network Working Group T. Yu
Internet-Draft MIT Kerberos Consortium Internet-Draft MIT Kerberos Consortium
Updates: rfc4120 (if approved) February 14, 2014 Updates: rfc4120 (if approved) March 30, 2017
Intended status: Standards Track Intended status: Standards Track
Expires: August 18, 2014 Expires: October 1, 2017
Move Kerberos protocol parameter registries to IANA Move Kerberos protocol parameter registries to IANA
draft-ietf-kitten-kerberos-iana-registries-03 draft-ietf-kitten-kerberos-iana-registries-04
Abstract Abstract
The Keberos 5 network authentication protocol has several numeric The Keberos 5 network authentication protocol has several numeric
protocol parameters. Most of these parameters are not currently protocol parameters. Most of these parameters are not currently
under IANA maintenance. This document requests that IANA take over under IANA maintenance. This document requests that IANA take over
the maintenance of the remainder of these Kerberos parameters. the maintenance of the remainder of these Kerberos parameters.
Status of this Memo Status of This Memo
This Internet-Draft is submitted in full conformance with the This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on August 18, 2014. This Internet-Draft will expire on October 1, 2017.
Copyright Notice Copyright Notice
Copyright (c) 2014 IETF Trust and the persons identified as the Copyright (c) 2017 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
skipping to change at page 7, line 8 skipping to change at page 7, line 13
MUST be Standards Action. MUST be Standards Action.
Protocol version number (pvno) values will not be registered. The Protocol version number (pvno) values will not be registered. The
location of the "pvno" value in Kerberos messages is not in a place location of the "pvno" value in Kerberos messages is not in a place
that implementations can meaningfully use to distinguish among that implementations can meaningfully use to distinguish among
different variants of the Kerberos protocol. different variants of the Kerberos protocol.
8. Contributors 8. Contributors
Sam Hartman proposed the text of the expert review guidelines. Love Sam Hartman proposed the text of the expert review guidelines. Love
Hornquist Astrand wrote a previous document Hornquist Astrand wrote a previous document (draft-lha-krb-wg-some-
(draft-lha-krb-wg-some-numbers-to-iana-00) with the same goals as numbers-to-iana-00) with the same goals as this document.
this document.
9. Acknowledgments 9. Acknowledgments
Thanks to Tom Petch for providing useful feedback on previous Thanks to Tom Petch for providing useful feedback on previous
versions of this document. versions of this document.
10. Security Considerations 10. Security Considerations
Assignments of new Keberos protocol parameter values can have Assignments of new Keberos protocol parameter values can have
security implications. In cases where the assignment policy calls security implications. In cases where the assignment policy calls
skipping to change at page 7, line 31 skipping to change at page 7, line 35
for expert review, the reviewer is responsible for evaluating whether for expert review, the reviewer is responsible for evaluating whether
adequate documentation exists concerning the security considerations adequate documentation exists concerning the security considerations
for the requested assignment. For assignments that require IETF for the requested assignment. For assignments that require IETF
review or standards action, the normal IETF processes ensure adequate review or standards action, the normal IETF processes ensure adequate
treatment of security considerations. treatment of security considerations.
11. IANA Considerations 11. IANA Considerations
This document requests that IANA create several registries for This document requests that IANA create several registries for
Kebreros protocol parameters: Kebreros protocol parameters:
o Address types o Address types
o Authorization data types o Authorization data types
o Error codes o Error codes
o Key usages o Key usages
o Name types o Name types
o AP-REQ options o AP-REQ options
o KDC-REQ options o KDC-REQ options
o Ticket flags
o Ticket flags
This document requests that IANA modify the existing "Pre- This document requests that IANA modify the existing "Pre-
authentication data and typed data" registry to contain an additional authentication data and typed data" registry to contain an additional
reference to this document, and to transform existing names in that reference to this document, and to transform existing names in that
registry to the lowercase-and-hyphens style. registry to the lowercase-and-hyphens style.
12. Open issues 12. Open issues
Do we make a registry for application tag numbers (equal to message Do we make a registry for application tag numbers (equal to message
type numbers)? We've said that we would replace the entire ASN.1 type numbers)? We've said that we would replace the entire ASN.1
module in that case, but Nico's recent proposal doesn't do that, and module in that case, but Nico's recent proposal doesn't do that, and
skipping to change at page 8, line 17 skipping to change at page 8, line 26
for registrations.) for registrations.)
Do transited encodings need a registry? They would probably require Do transited encodings need a registry? They would probably require
standards action, even if there were a registry. standards action, even if there were a registry.
13. References 13. References
13.1. Normative References 13.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997. Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<http://www.rfc-editor.org/info/rfc2119>.
[RFC3961] Raeburn, K., "Encryption and Checksum Specifications for [RFC3961] Raeburn, K., "Encryption and Checksum Specifications for
Kerberos 5", RFC 3961, February 2005. Kerberos 5", RFC 3961, DOI 10.17487/RFC3961, February
2005, <http://www.rfc-editor.org/info/rfc3961>.
[RFC4120] Neuman, C., Yu, T., Hartman, S., and K. Raeburn, "The [RFC4120] Neuman, C., Yu, T., Hartman, S., and K. Raeburn, "The
Kerberos Network Authentication Service (V5)", RFC 4120, Kerberos Network Authentication Service (V5)", RFC 4120,
July 2005. DOI 10.17487/RFC4120, July 2005,
<http://www.rfc-editor.org/info/rfc4120>.
[RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an [RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an
IANA Considerations Section in RFCs", BCP 26, RFC 5226, IANA Considerations Section in RFCs", BCP 26, RFC 5226,
May 2008. DOI 10.17487/RFC5226, May 2008,
<http://www.rfc-editor.org/info/rfc5226>.
13.2. Informative References 13.2. Informative References
[RFC1510] Kohl, J. and B. Neuman, "The Kerberos Network [RFC1510] Kohl, J. and C. Neuman, "The Kerberos Network
Authentication Service (V5)", RFC 1510, September 1993. Authentication Service (V5)", RFC 1510,
DOI 10.17487/RFC1510, September 1993,
<http://www.rfc-editor.org/info/rfc1510>.
Author's Address Author's Address
Tom Yu Tom Yu
MIT Kerberos Consortium MIT Kerberos Consortium
77 Massachusetts Ave 77 Massachusetts Ave
Cambridge, Massachusetts Cambridge, Massachusetts
USA USA
Email: tlyu@mit.edu Email: tlyu@mit.edu
 End of changes. 21 change blocks. 
16 lines changed or deleted 29 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/