There are several approaches to skinning a cat, but what some people
are trying to do with GSS-API is the most awkard approach I could imagine.

The only correct solution to the problems with Kerberos name-games
and it's incompatibility is to provide a directory service.
Everyone that has trying to do large scale Kerberos infrastructures
combined with non-trivial (Posix-style) access control (lists)
knows that pretty well.

DCE has a Directory service, even Microsoft has it (although their
architecture is a real mess since there are plenty of serious bugs
and there is no small and clean API to deal with access control, names,
transformation between names and management of ACLs.)

Adding name-canonicalization to Kerberos without adding a Directory
to provide the necessary transformation to ACL maintenance will
significantly impair the usefulness of vanilla Kerberos 5,
because this pig will no longer fly with distributed gssapi-based
applications when any such features are used. 

-Martin



Ken Hornstein wrote:
> 
> My only comment is that I find it ironic that these two paragraphs
> appear in the same message:
> 
> >Fortunately you cannot change GSS-API v2, and I will do all that I can
> >to prevent a spec from entering the standards track that calls itself
> >a revision of GSS-API v2 does not have gss_canonicalize_name() and
> >gss_export_name() fully backwards compatible with current GSS-API v2.

Why?  rfc-2743/rfc-2744 is not going to change, what's so ironic about
that.  That means that one cannot pull the rug from under gssapi v2
compliant apps and gssapi mechanisms.

And I have plenty of running code to proof that what is in gssapi v2
is useful as it is.

So even if someone comes up with a gssapi v3 that is backward incompatible
with gssapi v2, then this will definitely *NOT* obsolete gssapi v2.
Just as IPv6 does not obsolete IPv4 for quite some time to come.


> 
> [...]
> 
> >A few years ago the IESG was quite explicit that the IETF is not
> >a rubber-stamping authority.  If you want something standardized
> >you must be prepared for changes to the (initial) proposal.
> >I hope the IESG still lives up to its standards.

This was about the gssapi extensions proposals from GRID.
Their best bet is to just submit their current specs as informational,
saving everyone time and headaches.

-++**==--++**==--++**==--++**==--++**==--++**==--++**==
This message was posted through the Stanford campus mailing list
server.  If you wish to unsubscribe from this mailing list, send the
message body of "unsubscribe ietf-cat-wg" to [EMAIL PROTECTED]

Reply via email to