[jira] [Assigned] (DIRKRB-135) Add logging support in both KDC and KrbClient

2015-03-23 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-135?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng reassigned DIRKRB-135:


Assignee: (was: Emmanuel Lecharny)

 Add logging support in both KDC and KrbClient
 -

 Key: DIRKRB-135
 URL: https://issues.apache.org/jira/browse/DIRKRB-135
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng

 Currently no logging is done in either KDC server or KrbClient, which is far 
 from ideal. We should output meaningful logs help troubleshooting. I guess we 
 could leverage slf4j library or just use the Java logging API? The latter 
 would be better in the sense that we won't introduce a 3rd party library.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Assigned] (DIRKRB-172) Working on a standalone KDC server

2015-03-23 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-172?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng reassigned DIRKRB-172:


Assignee: (was: Kai Zheng)

 Working on a standalone KDC server
 --

 Key: DIRKRB-172
 URL: https://issues.apache.org/jira/browse/DIRKRB-172
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng

 We're working on a standalone KDC server, running, testing, and fixing. This 
 is to track all the related issues.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Assigned] (DIRKRB-131) Decouple Kerberos from the Directory Server

2015-03-23 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-131?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng reassigned DIRKRB-131:


Assignee: (was: Kiran Ayyagari)

 Decouple Kerberos from the Directory Server
 ---

 Key: DIRKRB-131
 URL: https://issues.apache.org/jira/browse/DIRKRB-131
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng

 As discussed in the mailing list, we would decouple Kerberos logics from the 
 Directory Server, to better maintain the dependencies and avoid the 
 complexities. In the end, the Directory Server can be used as an identity 
 backend for the KDC server in the plugin or dynamical loading approach.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Assigned] (DIRKRB-132) Decouple Kerberos from the Directory Studio

2015-03-23 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-132?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng reassigned DIRKRB-132:


Assignee: (was: Emmanuel Lecharny)

 Decouple Kerberos from the Directory Studio
 ---

 Key: DIRKRB-132
 URL: https://issues.apache.org/jira/browse/DIRKRB-132
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng

 As discussed in the mailing list, we would decouple Kerberos logics from the 
 Directory related projects and codes, to better maintain the dependencies and 
 avoid the complexities. The Directory Studio should be also taken care of, 
 but I'm not sure we would totally remove the embedded KDC server from the 
 tool itself since that involves compatibility concern. Please give your 
 feedback here, thanks.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Assigned] (DIRKRB-130) Consolidate the existing Change Password protocol implementation

2015-03-23 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-130?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng reassigned DIRKRB-130:


Assignee: (was: Emmanuel Lecharny)

 Consolidate the existing Change Password protocol implementation
 

 Key: DIRKRB-130
 URL: https://issues.apache.org/jira/browse/DIRKRB-130
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng

 Currently the existing Kerberos implementation in ApacheDS contains the 
 Change Password protocol server. This is to consolidate the functionality 
 into the new KDC server.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Assigned] (DIRKRB-109) We need a logo for the subproject

2015-03-23 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-109?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng reassigned DIRKRB-109:


Assignee: (was: Emmanuel Lecharny)

 We need a logo for the subproject
 -

 Key: DIRKRB-109
 URL: https://issues.apache.org/jira/browse/DIRKRB-109
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Pierre Smits
 Attachments: DIRKRB-109_v3.png, DIRKRB-109_v4.png, logo draft.png, 
 logo with color.png


 The logo should preferably be of size 125 x 125 pixels in order to use it 
 also as  web ads (IAB standards).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Assigned] (DIRKRB-123) Implementing cross-realm support

2015-03-23 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-123?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng reassigned DIRKRB-123:


Assignee: (was: Emmanuel Lecharny)

 Implementing cross-realm support
 

 Key: DIRKRB-123
 URL: https://issues.apache.org/jira/browse/DIRKRB-123
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng

 This is going to implement the cross-realm support, which can be used to 
 build trust relationship with MIT Kerberos KDC or MS AD.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-173) A Zookeeper based high reliable performance identity backend

2015-03-23 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-173?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14377255#comment-14377255
 ] 

Kai Zheng commented on DIRKRB-173:
--

Currently there's only basic setup for the back end. As I will focus on the 
FAST framework and some mechanisms, don't have time for it recently. Marked it 
as unassigned.

 A Zookeeper based high reliable  performance identity backend
 --

 Key: DIRKRB-173
 URL: https://issues.apache.org/jira/browse/DIRKRB-173
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng

 This will create a Zookeeper based identity backend targeting for high 
 reliable and high performance requirement and scenarios.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (DIRKRB-188) Calculating FAST armor key

2015-03-22 Thread Kai Zheng (JIRA)
Kai Zheng created DIRKRB-188:


 Summary: Calculating FAST armor key
 Key: DIRKRB-188
 URL: https://issues.apache.org/jira/browse/DIRKRB-188
 Project: Directory Kerberos
  Issue Type: New Feature
Reporter: Kai Zheng
Assignee: Kai Zheng


According to the FAST spec, in section of 
https://tools.ietf.org/html/rfc6113#page-17, we need to implement the facility 
for calculating armor key given key1, key2, pepper1, and pepper2. 



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (DIRKRB-188) Calculating FAST armor key

2015-03-22 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-188?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng updated DIRKRB-188:
-
Description: 
According to the FAST spec, in section of 
https://tools.ietf.org/html/rfc6113#page-17, we need to implement the facility 
for calculating armor key given key1, key2, pepper1, and pepper2, as defined as 
follows.
{noformat}
   KRB-FX-CF2() combines two protocol keys based on the pseudo-random()
   function defined in [RFC3961].

   Given two input keys, K1 and K2, where K1 and K2 can be of two
   different enctypes, the output key of KRB-FX-CF2(), K3, is derived as
   follows:

   KRB-FX-CF2(protocol key, protocol key, octet string,
 octet string)  -  (protocol key)

   PRF+(K1, pepper1) - octet-string-1
   PRF+(K2, pepper2) - octet-string-2
   KRB-FX-CF2(K1, K2, pepper1, pepper2) :=
  random-to-key(octet-string-1 ^ octet-string-2)

   Where ^ denotes the exclusive-OR operation.  PRF+() is defined as
   follows:

PRF+(protocol key, octet string) - (octet string)

PRF+(key, shared-info) := pseudo-random( key,  1 || shared-info ) ||
  pseudo-random( key, 2 || shared-info ) ||
  pseudo-random( key, 3 || shared-info ) || ...
{noformat}

  was:According to the FAST spec, in section of 
https://tools.ietf.org/html/rfc6113#page-17, we need to implement the facility 
for calculating armor key given key1, key2, pepper1, and pepper2. 


 Calculating FAST armor key
 --

 Key: DIRKRB-188
 URL: https://issues.apache.org/jira/browse/DIRKRB-188
 Project: Directory Kerberos
  Issue Type: New Feature
Reporter: Kai Zheng
Assignee: Kai Zheng

 According to the FAST spec, in section of 
 https://tools.ietf.org/html/rfc6113#page-17, we need to implement the 
 facility for calculating armor key given key1, key2, pepper1, and pepper2, as 
 defined as follows.
 {noformat}
KRB-FX-CF2() combines two protocol keys based on the pseudo-random()
function defined in [RFC3961].
Given two input keys, K1 and K2, where K1 and K2 can be of two
different enctypes, the output key of KRB-FX-CF2(), K3, is derived as
follows:
KRB-FX-CF2(protocol key, protocol key, octet string,
  octet string)  -  (protocol key)
PRF+(K1, pepper1) - octet-string-1
PRF+(K2, pepper2) - octet-string-2
KRB-FX-CF2(K1, K2, pepper1, pepper2) :=
   random-to-key(octet-string-1 ^ octet-string-2)
Where ^ denotes the exclusive-OR operation.  PRF+() is defined as
follows:
 PRF+(protocol key, octet string) - (octet string)
 PRF+(key, shared-info) := pseudo-random( key,  1 || shared-info ) ||
   pseudo-random( key, 2 || shared-info ) ||
   pseudo-random( key, 3 || shared-info ) || ...
 {noformat}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-109) We need a logo for the subproject

2015-03-20 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-109?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14370895#comment-14370895
 ] 

Kai Zheng commented on DIRKRB-109:
--

Emmanuel, I agree. Let's have it for now as we would allow very initial codes 
in. We can always improve incrementally later when have more hands. I believe 
we can find first-class logo designer some time afterwards.

 We need a logo for the subproject
 -

 Key: DIRKRB-109
 URL: https://issues.apache.org/jira/browse/DIRKRB-109
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Pierre Smits
Assignee: Emmanuel Lecharny
 Attachments: DIRKRB-109_v3.png, DIRKRB-109_v4.png, logo draft.png, 
 logo with color.png


 The logo should preferably be of size 125 x 125 pixels in order to use it 
 also as  web ads (IAB standards).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (DIRKRB-181) Better to use pretty Json format for the Json backend file

2015-03-19 Thread Kai Zheng (JIRA)
Kai Zheng created DIRKRB-181:


 Summary: Better to use pretty Json format for the Json backend file
 Key: DIRKRB-181
 URL: https://issues.apache.org/jira/browse/DIRKRB-181
 Project: Directory Kerberos
  Issue Type: Improvement
Reporter: Kai Zheng


Better to use pretty Json format for the Json backend file, for easier looking 
at and troubleshooting. Please google for it using Gson pretty print.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (DIRKRB-180) Better to use string representation of keys in Json backend file

2015-03-19 Thread Kai Zheng (JIRA)
Kai Zheng created DIRKRB-180:


 Summary: Better to use string representation of keys in Json 
backend file
 Key: DIRKRB-180
 URL: https://issues.apache.org/jira/browse/DIRKRB-180
 Project: Directory Kerberos
  Issue Type: Improvement
Reporter: Kai Zheng


Better to use string representation for principal keys in Json backend file. We 
can use {{bytesToHex}} for it, using {{bytesToHex}} and {{hex2bytes}}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-135) Add logging support in both KDC and KrbClient

2015-03-18 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-135?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14368097#comment-14368097
 ] 

Kai Zheng commented on DIRKRB-135:
--

Sorry for late on this. What might concern me about slf4j is it may add 
overhead or difficulty for porting the lib to android platform in future. But 
just google let me find below, which shows that it's just a perfect choice ! 
http://www.slf4j.org/android/
Will use slf4j consistently in the project, for simple. Thanks for you idea.

 Add logging support in both KDC and KrbClient
 -

 Key: DIRKRB-135
 URL: https://issues.apache.org/jira/browse/DIRKRB-135
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Emmanuel Lecharny

 Currently no logging is done in either KDC server or KrbClient, which is far 
 from ideal. We should output meaningful logs help troubleshooting. I guess we 
 could leverage slf4j library or just use the Java logging API? The latter 
 would be better in the sense that we won't introduce a 3rd party library.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (DIRKRB-178) Improve configuration library allowing to pluggin configuration format support

2015-03-18 Thread Kai Zheng (JIRA)
Kai Zheng created DIRKRB-178:


 Summary: Improve configuration library allowing to pluggin 
configuration format support
 Key: DIRKRB-178
 URL: https://issues.apache.org/jira/browse/DIRKRB-178
 Project: Directory Kerberos
  Issue Type: Improvement
Reporter: Kai Zheng
Assignee: Kai Zheng


This to enhance configuration framework to allow customizing and pluggin of 
configuration format loader, which will be used to support MIT configuration 
format by kerberos in more elegant way.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-102) [Apache Kerby] A dedicated Kerberos project

2015-03-18 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-102?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14368523#comment-14368523
 ] 

Kai Zheng commented on DIRKRB-102:
--

A mirror of the project was created in Github.
https://github.com/apache/directory-kerby

 [Apache Kerby] A dedicated Kerberos project 
 

 Key: DIRKRB-102
 URL: https://issues.apache.org/jira/browse/DIRKRB-102
 Project: Directory Kerberos
  Issue Type: New Feature
Reporter: Kai Zheng
  Labels: Kerberos

 As discussed in the community, we're going to create a dedicated Kerberos 
 project based on Haox project codebase (https://github.com/drankye/haox) 
 incorporating and consolidating the existing Kerberos functionalities in 
 ApacheDS. The long term goal is to establish a first class Kerberos 
 implementation in Java for the Apache world targeting today's environments in 
 cloud, Hadoop and mobile. It will provides rich, intuitive and interoperable 
 library and facilities that integrate multiple authentication mechanisms 
 including PKI, OTP and token (OAuth) as desired in above mentioned modern 
 environments.It will also implement a KDC server that can integrate various 
 identity back ends including simple memory database, SQL database and LDAP 
 server by dynamic plugin and loading approach, which allows it to be utilized 
 in various contexts and scenarios. 
 This serves as the master JIRA to track all the related tasks for the new sub 
 project. With the fundamental aspects and tasks resolved, we would go to next 
 phase targeting an Apache TLP project, as we agreed in the discussion. 



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (DIRKRB-179) Adding kadmin tool to support the KDC

2015-03-18 Thread Kai Zheng (JIRA)
Kai Zheng created DIRKRB-179:


 Summary: Adding kadmin tool to support the KDC
 Key: DIRKRB-179
 URL: https://issues.apache.org/jira/browse/DIRKRB-179
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng


A kadmin like tool is needed to support the KDC server. Initially only local 
mode is supported, in other words, the tool should only be run locally on the 
KDC server host, and in this case it can operate the identity backend directly 
as 'root' user without worrying about security concerns. At this time two basic 
operations are definitely needed, creating principal and exporting keytab file. 
We can implement the tool incrementally after that in the following.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (DIRKRB-175) Extend Config API to allow set values in additon to get values

2015-03-17 Thread Kai Zheng (JIRA)
Kai Zheng created DIRKRB-175:


 Summary: Extend Config API to allow set values in additon to get 
values
 Key: DIRKRB-175
 URL: https://issues.apache.org/jira/browse/DIRKRB-175
 Project: Directory Kerberos
  Issue Type: Improvement
Reporter: Kai Zheng
Assignee: Kai Zheng


This will extend *Config* API to allow set values, which will help a lot in 
test cases, since we don't have to prepare configuration files, a map or a 
properties. We can directly set test configuration values to the Config object 
to prepare for it.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Resolved] (DIRKRB-175) Extend Config API to allow set values in additon to get values

2015-03-17 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-175?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng resolved DIRKRB-175.
--
Resolution: Fixed

commit 9ca5d36e4072ff1d1721bedc0683df7637739739
Author: Drankye dran...@gmail.com
Date:   Wed Mar 18 05:43:06 2015 +0800

DIRKRB-175 Extend Config API to allow set values in additon to get values

 Extend Config API to allow set values in additon to get values
 --

 Key: DIRKRB-175
 URL: https://issues.apache.org/jira/browse/DIRKRB-175
 Project: Directory Kerberos
  Issue Type: Improvement
Reporter: Kai Zheng
Assignee: Kai Zheng

 This will extend *Config* API to allow set values, which will help a lot in 
 test cases, since we don't have to prepare configuration files, a map or a 
 properties. We can directly set test configuration values to the Config 
 object to prepare for it.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-176) Adding klist utility tool

2015-03-17 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-176?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14364831#comment-14364831
 ] 

Kai Zheng commented on DIRKRB-176:
--

Thanks Liqi for taking this. Yes this tool is needed for a comprehensive 
solution, and can also be used to exercise/test our library codes.

 Adding klist utility tool
 -

 Key: DIRKRB-176
 URL: https://issues.apache.org/jira/browse/DIRKRB-176
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Liqi Yi
   Original Estimate: 672h
  Remaining Estimate: 672h

 The klist command allows current Kerberos user to view his/her Ticket 
 Granting Service tickets that are in the ticket cache.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-102) [Apache Kerby] A dedicated Kerberos project

2015-03-16 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-102?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14364150#comment-14364150
 ] 

Kai Zheng commented on DIRKRB-102:
--

To reflect the new project name *Apache Kerby*, the git repo was changed to:
https://git-wip-us.apache.org/repos/asf/directory-kerby.git 

 [Apache Kerby] A dedicated Kerberos project 
 

 Key: DIRKRB-102
 URL: https://issues.apache.org/jira/browse/DIRKRB-102
 Project: Directory Kerberos
  Issue Type: New Feature
Reporter: Kai Zheng
  Labels: Kerberos

 As discussed in the community, we're going to create a dedicated Kerberos 
 project based on Haox project codebase (https://github.com/drankye/haox) 
 incorporating and consolidating the existing Kerberos functionalities in 
 ApacheDS. The long term goal is to establish a first class Kerberos 
 implementation in Java for the Apache world targeting today's environments in 
 cloud, Hadoop and mobile. It will provides rich, intuitive and interoperable 
 library and facilities that integrate multiple authentication mechanisms 
 including PKI, OTP and token (OAuth) as desired in above mentioned modern 
 environments.It will also implement a KDC server that can integrate various 
 identity back ends including simple memory database, SQL database and LDAP 
 server by dynamic plugin and loading approach, which allows it to be utilized 
 in various contexts and scenarios. 
 This serves as the master JIRA to track all the related tasks for the new sub 
 project. With the fundamental aspects and tasks resolved, we would go to next 
 phase targeting an Apache TLP project, as we agreed in the discussion. 



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-173) A Zookeeper based high reliable performance identity backend

2015-03-16 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-173?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14364421#comment-14364421
 ] 

Kai Zheng commented on DIRKRB-173:
--

Hi Kiran,

Glad to have this discussion. We don't have specific usecase, but I thought the 
background would be Hadoop, and cloud, where high reliability, high performance 
and high scalability are highly desirable for any potential component to be 
hooked into. Zookeeper would be a good choice in this aspect. It's demonstrated 
in wide spread usages in big data and cloud environments as the coordination 
brain, critical configuration storage and etc. Yes it's also lightweight and 
can be embedded. It's also a tree, each znode being of key-value pairs. Looks 
like we share the same considerations in this, I don't like RDBMS here. Lin's 
working on the Json based one for its easy lightweight and inspecting; I'm 
working on this for any serious consideration. I guess we should also get the 
LDAP one out, but with the Json file based one and ZK based one out, we may be 
sure to have more ideas how to implement it.

 A Zookeeper based high reliable  performance identity backend
 --

 Key: DIRKRB-173
 URL: https://issues.apache.org/jira/browse/DIRKRB-173
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Kai Zheng

 This will create a Zookeeper based identity backend targeting for high 
 reliable and high performance requirement and scenarios.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-173) A Zookeeper based high reliable performance identity backend

2015-03-16 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-173?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14364554#comment-14364554
 ] 

Kai Zheng commented on DIRKRB-173:
--

We have a memory store using a capacity configurable hashmap and it's used by 
default. But as it doesn't work with any kadmin stuff so we need a persistent 
one. Json based would be much easy to be out first. An LDAP one can be out 
later I guess, let we see if any contribution interest. Anyway, given the 
common test framework for backends and we have the Json based and ZK based in 
hand, it would be much easier for the LDAP one since we only need do the very 
LDAP specific things. I thought we need to have the LDAP backend done before 
the first release of the sub project, which makes it well connected with the 
main parts (LDAP). Makes sense ? Thanks.

 A Zookeeper based high reliable  performance identity backend
 --

 Key: DIRKRB-173
 URL: https://issues.apache.org/jira/browse/DIRKRB-173
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Kai Zheng

 This will create a Zookeeper based identity backend targeting for high 
 reliable and high performance requirement and scenarios.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-173) A Zookeeper based high reliable performance identity backend

2015-03-16 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-173?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14364563#comment-14364563
 ] 

Kai Zheng commented on DIRKRB-173:
--

Sounds good to me. Before the time, I will also communicate about it with 
potential contributors. I may also have some time for it. 

 A Zookeeper based high reliable  performance identity backend
 --

 Key: DIRKRB-173
 URL: https://issues.apache.org/jira/browse/DIRKRB-173
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Kai Zheng

 This will create a Zookeeper based identity backend targeting for high 
 reliable and high performance requirement and scenarios.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-171) No response to client when incorrect password

2015-03-15 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-171?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14362277#comment-14362277
 ] 

Kai Zheng commented on DIRKRB-171:
--

Added some negative tests like incorrect password and ensure KDC not be 
affected by bad client requests.

 No response to client when incorrect password
 -

 Key: DIRKRB-171
 URL: https://issues.apache.org/jira/browse/DIRKRB-171
 Project: Directory Kerberos
  Issue Type: Improvement
Reporter: Lin Chen
Assignee: Kai Zheng

 When client request a ticket from kdc server, client should input a password. 
 If the password is incorrect, server will throw many exceptions but the 
 client would not get any response about what's wrong. Maybe it is not very 
 user-friendly.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-135) Add logging support in both KDC and KrbClient

2015-03-14 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-135?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14362183#comment-14362183
 ] 

Kai Zheng commented on DIRKRB-135:
--

Thanks Emmanuel. I agree SLF4J will be the right choice. I will use it in 
server side first. For client and the library, I'm thinking about an even 
lighter one.

 Add logging support in both KDC and KrbClient
 -

 Key: DIRKRB-135
 URL: https://issues.apache.org/jira/browse/DIRKRB-135
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Emmanuel Lecharny

 Currently no logging is done in either KDC server or KrbClient, which is far 
 from ideal. We should output meaningful logs help troubleshooting. I guess we 
 could leverage slf4j library or just use the Java logging API? The latter 
 would be better in the sense that we won't introduce a 3rd party library.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Assigned] (DIRKRB-110) Refine the IdentityService/Backend API for KDC

2015-03-14 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-110?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng reassigned DIRKRB-110:


Assignee: Kai Zheng  (was: Kiran Ayyagari)

 Refine the IdentityService/Backend API for KDC
 --

 Key: DIRKRB-110
 URL: https://issues.apache.org/jira/browse/DIRKRB-110
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Kai Zheng

 Currently a simple IdentityService API is defined and various KDC database 
 backends can be implemented. Via this, all database specific dependencies can 
 be separated and decoupled from KDC. Given this API is refined and made sure 
 to serve the role, we can add to implement an LdapIdentityBackend using the 
 ApacheDS LDAP server.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Resolved] (DIRKRB-110) Refine the IdentityService/Backend API for KDC

2015-03-14 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-110?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng resolved DIRKRB-110.
--
Resolution: Fixed

It was already done.

 Refine the IdentityService/Backend API for KDC
 --

 Key: DIRKRB-110
 URL: https://issues.apache.org/jira/browse/DIRKRB-110
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Kai Zheng

 Currently a simple IdentityService API is defined and various KDC database 
 backends can be implemented. Via this, all database specific dependencies can 
 be separated and decoupled from KDC. Given this API is refined and made sure 
 to serve the role, we can add to implement an LdapIdentityBackend using the 
 ApacheDS LDAP server.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (DIRKRB-174) Common test utility for all kinds of identity backends

2015-03-14 Thread Kai Zheng (JIRA)
Kai Zheng created DIRKRB-174:


 Summary: Common test utility for all kinds of identity backends
 Key: DIRKRB-174
 URL: https://issues.apache.org/jira/browse/DIRKRB-174
 Project: Directory Kerberos
  Issue Type: Test
Reporter: Kai Zheng
Assignee: Kai Zheng


It will be good to have common test utility to ease writing tests in various 
identity backends. 



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-109) We need a logo for the subproject

2015-03-14 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-109?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14361626#comment-14361626
 ] 

Kai Zheng commented on DIRKRB-109:
--

Hi [~pfm.smits],

bq.Good suggestion, Emmanuel.
I thought the same. It would be great we have more options. Thanks any 
potential contribution.
bq.But before we start that, we should ask ourselves what kind of values do we 
want to instill with the logo...
IMHO, it would be good or at least not bad if it can connect with the simple 
position of the project, another Kerberos implementation in Java, or a kid of 
Kerberos. We may build more, but the base is Kerberos, 3-headed dog. 
bq.This issue is a good place to get those on the table.
I agree. It's good to put and discuss all the options here.

In the end, in case we may have only one option in reasonable time, would you 
mind if I use it in my presentation or elsewhere when introduce the project, 
and see how others like it ?

Regards,
Kai

 We need a logo for the subproject
 -

 Key: DIRKRB-109
 URL: https://issues.apache.org/jira/browse/DIRKRB-109
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Pierre Smits
Assignee: Emmanuel Lecharny
 Attachments: DIRKRB-109_v3.png, logo draft.png, logo with color.png


 The logo should preferably be of size 125 x 125 pixels in order to use it 
 also as  web ads (IAB standards).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-109) We need a logo for the subproject

2015-03-12 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-109?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14358354#comment-14358354
 ] 

Kai Zheng commented on DIRKRB-109:
--

Hi Pierre,

You just provided very good and valuable thought. Thank you so much. I thought 
the logo matches well with the project name Kerby, a kid of Kerberos, but as 
you said it may not match what some of us expect the project to be. I don't 
have idea how to balance it, so have a better and suitable one. Any idea how to 
adjust the logo ?

Best regards,
Kai

 We need a logo for the subproject
 -

 Key: DIRKRB-109
 URL: https://issues.apache.org/jira/browse/DIRKRB-109
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Pierre Smits
Assignee: Emmanuel Lecharny
 Attachments: logo draft.png


 The logo should preferably be of size 125 x 125 pixels in order to use it 
 also as  web ads (IAB standards).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-109) We need a logo for the subproject

2015-03-12 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-109?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14359791#comment-14359791
 ] 

Kai Zheng commented on DIRKRB-109:
--

Thanks [~HazelC] for taking this. It looks very cool !

 We need a logo for the subproject
 -

 Key: DIRKRB-109
 URL: https://issues.apache.org/jira/browse/DIRKRB-109
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Pierre Smits
Assignee: Emmanuel Lecharny
 Attachments: logo draft.png, logo with color.png


 The logo should preferably be of size 125 x 125 pixels in order to use it 
 also as  web ads (IAB standards).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Assigned] (DIRKRB-172) Working on a standalone KDC server

2015-03-12 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-172?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng reassigned DIRKRB-172:


Assignee: Kai Zheng

 Working on a standalone KDC server
 --

 Key: DIRKRB-172
 URL: https://issues.apache.org/jira/browse/DIRKRB-172
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Kai Zheng

 We're working on a standalone KDC server, running, testing, and fixing. This 
 is to track all the related issues.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (DIRKRB-168) Adding a json file based identity backend

2015-03-12 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-168?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng updated DIRKRB-168:
-
Summary: Adding a json file based identity backend  (was: Adding a 
json-based identity backend)

 Adding a json file based identity backend
 -

 Key: DIRKRB-168
 URL: https://issues.apache.org/jira/browse/DIRKRB-168
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Lin Chen

 Adding a json-based identity backend for kdc server.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-168) Adding a json file based identity backend

2015-03-12 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-168?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14359354#comment-14359354
 ] 

Kai Zheng commented on DIRKRB-168:
--

This is probably a most simple way to get a standalone server running first and 
fully functional.

 Adding a json file based identity backend
 -

 Key: DIRKRB-168
 URL: https://issues.apache.org/jira/browse/DIRKRB-168
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Lin Chen

 Adding a json-based identity backend for kdc server.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Assigned] (DIRKRB-168) Adding a json file based identity backend

2015-03-12 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-168?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng reassigned DIRKRB-168:


Assignee: Kai Zheng

 Adding a json file based identity backend
 -

 Key: DIRKRB-168
 URL: https://issues.apache.org/jira/browse/DIRKRB-168
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Lin Chen
Assignee: Kai Zheng

 Adding a json-based identity backend for kdc server.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Assigned] (DIRKRB-170) Kdc server will throw exceptions when a client closed

2015-03-12 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-170?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng reassigned DIRKRB-170:


Assignee: Kai Zheng

 Kdc server will throw exceptions when a client closed
 -

 Key: DIRKRB-170
 URL: https://issues.apache.org/jira/browse/DIRKRB-170
 Project: Directory Kerberos
  Issue Type: Improvement
Reporter: Lin Chen
Assignee: Kai Zheng

 When a client was closed, the kdc server will throw many exceptions 
 constantly. Such as IOException: An existing connection was forcibly closed 
 by the remote host.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Assigned] (DIRKRB-171) No response to client when incorrect password

2015-03-12 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-171?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng reassigned DIRKRB-171:


Assignee: Kai Zheng

 No response to client when incorrect password
 -

 Key: DIRKRB-171
 URL: https://issues.apache.org/jira/browse/DIRKRB-171
 Project: Directory Kerberos
  Issue Type: Improvement
Reporter: Lin Chen
Assignee: Kai Zheng

 When client request a ticket from kdc server, client should input a password. 
 If the password is incorrect, server will throw many exceptions but the 
 client would not get any response about what's wrong. Maybe it is not very 
 user-friendly.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (DIRKRB-172) Working on a standalone KDC server

2015-03-12 Thread Kai Zheng (JIRA)
Kai Zheng created DIRKRB-172:


 Summary: Working on a standalone KDC server
 Key: DIRKRB-172
 URL: https://issues.apache.org/jira/browse/DIRKRB-172
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng


We're working on a standalone KDC server, running, testing, and fixing. This is 
to track all the related issues.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (DIRKRB-173) A Zookeeper based high performance identity backend

2015-03-12 Thread Kai Zheng (JIRA)
Kai Zheng created DIRKRB-173:


 Summary: A Zookeeper based high performance identity backend
 Key: DIRKRB-173
 URL: https://issues.apache.org/jira/browse/DIRKRB-173
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Kai Zheng


This will create a Zookeeper based identity backend targeting for high 
performance requirement and scenarios.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (DIRKRB-168) Adding a json file based identity backend

2015-03-12 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-168?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng updated DIRKRB-168:
-
Description: Adding a json-based identity backend for kdc server targeting 
for small, easy, development and test environment.  (was: Adding a json-based 
identity backend for kdc server.)

 Adding a json file based identity backend
 -

 Key: DIRKRB-168
 URL: https://issues.apache.org/jira/browse/DIRKRB-168
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Lin Chen
Assignee: Kai Zheng

 Adding a json-based identity backend for kdc server targeting for small, 
 easy, development and test environment.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (DIRKRB-173) A Zookeeper based high reliable performance identity backend

2015-03-12 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-173?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng updated DIRKRB-173:
-
Summary: A Zookeeper based high reliable  performance identity backend  
(was: A Zookeeper based high performance identity backend)

 A Zookeeper based high reliable  performance identity backend
 --

 Key: DIRKRB-173
 URL: https://issues.apache.org/jira/browse/DIRKRB-173
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Kai Zheng

 This will create a Zookeeper based identity backend targeting for high 
 performance requirement and scenarios.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (DIRKRB-173) A Zookeeper based high reliable performance identity backend

2015-03-12 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-173?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng updated DIRKRB-173:
-
Description: This will create a Zookeeper based identity backend targeting 
for high reliable and high performance requirement and scenarios.  (was: This 
will create a Zookeeper based identity backend targeting for high performance 
requirement and scenarios.)

 A Zookeeper based high reliable  performance identity backend
 --

 Key: DIRKRB-173
 URL: https://issues.apache.org/jira/browse/DIRKRB-173
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Kai Zheng

 This will create a Zookeeper based identity backend targeting for high 
 reliable and high performance requirement and scenarios.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (DIRKRB-167) Create a tools container module in top level for all kinds of Kerby KDC tools

2015-03-11 Thread Kai Zheng (JIRA)
Kai Zheng created DIRKRB-167:


 Summary: Create a tools container module in top level for all 
kinds of Kerby KDC tools
 Key: DIRKRB-167
 URL: https://issues.apache.org/jira/browse/DIRKRB-167
 Project: Directory Kerberos
  Issue Type: Task
Reporter: Kai Zheng
Assignee: Kai Zheng


This is to Create a tools container module in top level for all kinds of Kerby 
KDC tools.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Resolved] (DIRKRB-167) Create a tools container module in top level for all kinds of Kerby KDC tools

2015-03-11 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-167?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng resolved DIRKRB-167.
--
Resolution: Fixed

commit 2d36679053ec82afe0802802144cc10a94797bb3
Author: Drankye dran...@gmail.com
Date:   Thu Mar 12 05:17:27 2015 +0800

DIRKRB-167 Create a tools container module in top level for all kinds of 
Kerby KDC tools

 Create a tools container module in top level for all kinds of Kerby KDC tools
 -

 Key: DIRKRB-167
 URL: https://issues.apache.org/jira/browse/DIRKRB-167
 Project: Directory Kerberos
  Issue Type: Task
Reporter: Kai Zheng
Assignee: Kai Zheng

 This is to Create a tools container module in top level for all kinds of 
 Kerby KDC tools.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Resolved] (DIRKRB-160) Packing related jars as Kerberos client library for applications

2015-03-11 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-160?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng resolved DIRKRB-160.
--
Resolution: Fixed

It's well done, thanks !

 Packing related jars as Kerberos client library for applications
 

 Key: DIRKRB-160
 URL: https://issues.apache.org/jira/browse/DIRKRB-160
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Lin Chen

 To ease applications to use the Kerberos client library, it's good to provide 
 one or two single jars by incorporating related jars together, since we have 
 quite a few of modules and they're hard for normal users to select from.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Resolved] (DIRKRB-161) Packing related jars as Kerberos server library for applications

2015-03-11 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-161?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng resolved DIRKRB-161.
--
Resolution: Fixed

It's well done, thanks !

 Packing related jars as Kerberos server library for applications
 

 Key: DIRKRB-161
 URL: https://issues.apache.org/jira/browse/DIRKRB-161
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Lin Chen

 To ease applications to use the Kerberos server library, it's good to provide 
 one or two jars by incorporating related jars together, since we have quite a 
 few of modules and they're hard for normal users to select from.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Resolved] (DIRKRB-134) Installation packaging and service wrapper

2015-03-11 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-134?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng resolved DIRKRB-134.
--
Resolution: Fixed

I just merged this into master branch and we can continue to improve the work 
as follow up issues.

 Installation packaging and service wrapper
 --

 Key: DIRKRB-134
 URL: https://issues.apache.org/jira/browse/DIRKRB-134
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Lin Chen
 Attachments: DIRKRB-134_v1.patch, wrapper.conf, wrapper.stop.conf


 This is for having installation packaging and service wrapper for the KDC 
 server. We can borrow the existing artifacts from Directory Server.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-109) We need a logo for the subproject

2015-03-11 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-109?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14357856#comment-14357856
 ] 

Kai Zheng commented on DIRKRB-109:
--

I agree. I thought Lin has a very good understanding of the project. It's a 
Kerberos one, but cute and nice.
Back to Kiran's concern, do we need a sleepy head ?

 We need a logo for the subproject
 -

 Key: DIRKRB-109
 URL: https://issues.apache.org/jira/browse/DIRKRB-109
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Pierre Smits
Assignee: Emmanuel Lecharny
 Attachments: logo draft.png


 The logo should preferably be of size 125 x 125 pixels in order to use it 
 also as  web ads (IAB standards).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-109) We need a logo for the subproject

2015-03-11 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-109?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14356955#comment-14356955
 ] 

Kai Zheng commented on DIRKRB-109:
--

Yes it's pretty cute. As a three-heads animal, should the three heads behave 
the same or differently ? We don't expect any head to be sleepy ? If so, not 
sleepy at all for each head, then what effect would be ?

 We need a logo for the subproject
 -

 Key: DIRKRB-109
 URL: https://issues.apache.org/jira/browse/DIRKRB-109
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Pierre Smits
Assignee: Emmanuel Lecharny
 Attachments: logo draft.png


 The logo should preferably be of size 125 x 125 pixels in order to use it 
 also as  web ads (IAB standards).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-169) Adding a default identity in memory identity backend

2015-03-11 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-169?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14358014#comment-14358014
 ] 

Kai Zheng commented on DIRKRB-169:
--

I thought we need to remove the test account once when we have relevant tool 
like kadmin to create principals for the KDC server.

 Adding a default identity in memory identity backend
 

 Key: DIRKRB-169
 URL: https://issues.apache.org/jira/browse/DIRKRB-169
 Project: Directory Kerberos
  Issue Type: Improvement
Reporter: Lin Chen

 Adding a default identity in memory identity backend for test. In future, it 
 will be improved in DIRKRB-168.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-165) Bypass AES256 test cases on platform doesn't have AES256 enabled

2015-03-08 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-165?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14351998#comment-14351998
 ] 

Kai Zheng commented on DIRKRB-165:
--

Thanks [~yiliqi] for contributing this ! I looked at the patch, it looks great. 
A mistake was noted for Camillia256, not AES256. Please correct, thanks !
{code}
 @Test
 public void testCamellia256() throws IOException, KrbException {
+if(!EncryptionHandler.isAES256Enabled()) {
+return;
+}
+
 testEncWith(camellia256-cts-cmac.cc);
 }
{code}

 Bypass AES256 test cases on platform doesn't have AES256 enabled
 

 Key: DIRKRB-165
 URL: https://issues.apache.org/jira/browse/DIRKRB-165
 Project: Directory Kerberos
  Issue Type: Test
 Environment: centos 6.6, oracle jdk 1.7 u60
Reporter: Liqi Yi
 Attachments: DIRKRB-165.001.patch

   Original Estimate: 24h
  Remaining Estimate: 24h

 On platforms that do not have AES256 enabled, the AES256 test cases would 
 fail with illegal key size exception.  It would be nice to bypass these tests 
 when AES256 is not supported.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Resolved] (DIRKRB-164) Refactor and split KeyDeriveTest

2015-03-07 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-164?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng resolved DIRKRB-164.
--
Resolution: Fixed

Reviewed and committed. Thanks Liqi for the contribution !

commit c04f55323f3874055854f0d6e6ca9ee517885432
Author: Drankye dran...@gmail.com
Date:   Sun Mar 8 02:04:58 2015 +0800

DIRKRB-164 Refactor and split KeyDeriveTest. Contributed by Liqi

 Refactor and split KeyDeriveTest
 

 Key: DIRKRB-164
 URL: https://issues.apache.org/jira/browse/DIRKRB-164
 Project: Directory Kerberos
  Issue Type: Test
Reporter: Liqi Yi
 Attachments: DIRKRB-164.001.patch

   Original Estimate: 24h
  Remaining Estimate: 24h





--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (DIRKRB-127) Implementing the TokenPreauth Access Token profile

2015-03-07 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-127?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng updated DIRKRB-127:
-
Summary: Implementing the TokenPreauth Access Token profile  (was: 
Implementing the token-preauth Access Token profile)

 Implementing the TokenPreauth Access Token profile
 --

 Key: DIRKRB-127
 URL: https://issues.apache.org/jira/browse/DIRKRB-127
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Kai Zheng

 This is to implement the Access Token profile based on the token-preauth 
 mechanism defined in the draft. Ref. docs/accesstoken-profile.pdf. The 
 resultant work is only for experimental usage can only be promoted for 
 production when the draft is finally passed. Currently we're collaborating 
 with MIT Kerberos team discussing thru the spec but due to the low priority 
 it's running very slow. By this implementation and possible POCs good 
 experience can be obtained as feedback to refine the draft.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Assigned] (DIRKRB-128) KrbClient supports both TCP and UDP, trying TCP first

2015-03-07 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-128?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng reassigned DIRKRB-128:


Assignee: Kai Zheng

 KrbClient supports both TCP and UDP, trying TCP first
 -

 Key: DIRKRB-128
 URL: https://issues.apache.org/jira/browse/DIRKRB-128
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Kai Zheng

 With the mixing support of TCP and UDP provided by haox-event, this is to 
 allow KrbClient to support the both protocols with TCP being tried first 
 according to latest Kerberos spec.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-161) Packing related jars as Kerberos server library for applications

2015-03-07 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-161?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14351832#comment-14351832
 ] 

Kai Zheng commented on DIRKRB-161:
--

Hi [~HazelC],

Thanks for working on this. Is it possible to get this in master first ? Note 
it's only for library level, on server side, not necessarily related to 
standalone service. Maybe we can have a new module for this in kerby-kerb 
module.

 Packing related jars as Kerberos server library for applications
 

 Key: DIRKRB-161
 URL: https://issues.apache.org/jira/browse/DIRKRB-161
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Lin Chen

 To ease applications to use the Kerberos server library, it's good to provide 
 one or two jars by incorporating related jars together, since we have quite a 
 few of modules and they're hard for normal users to select from.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Resolved] (DIRKRB-128) KrbClient supports both TCP and UDP, trying TCP first

2015-03-07 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-128?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng resolved DIRKRB-128.
--
Resolution: Fixed

commit daa4ba59ca62f840880d6f4de46bcdb270a44d67
Author: Drankye dran...@gmail.com
Date:   Sun Mar 8 09:00:39 2015 +0800

DIRKRB-128 KrbClient supports both TCP and UDP, trying TCP first

 KrbClient supports both TCP and UDP, trying TCP first
 -

 Key: DIRKRB-128
 URL: https://issues.apache.org/jira/browse/DIRKRB-128
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Kai Zheng

 With the mixing support of TCP and UDP provided by haox-event, this is to 
 allow KrbClient to support the both protocols with TCP being tried first 
 according to latest Kerberos spec.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-163) align package declearation and real path for Kinit.java

2015-02-28 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-163?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14341782#comment-14341782
 ] 

Kai Zheng commented on DIRKRB-163:
--

Reviewed and committed. Thanks Liqi !

commit 3c5179ad58e703707eead08798bd93461453
Author: Drankye dran...@gmail.com
Date:   Sun Mar 1 13:06:46 2015 +0800

DIRKRB-163 align package declearation and real path for Kinit.java. 
Contributed by Liqi


 align package declearation and real path for Kinit.java
 ---

 Key: DIRKRB-163
 URL: https://issues.apache.org/jira/browse/DIRKRB-163
 Project: Directory Kerberos
  Issue Type: Improvement
Affects Versions: 2.0.0-M16
Reporter: Liqi Yi
Priority: Trivial
  Labels: newbie
 Attachments: DIRKRB-163.patch

   Original Estimate: 1m
  Remaining Estimate: 1m

 package declearation for 
 tool/src/main/java/org/apache/kerberos/tool/Kinit.java is 
 org.apache.kerby.kerberos.tool
 which two do not match, reported by eclipse.
 moving Kinit.java to  
 tool/src/main/java/org/apache/kerby/kerberos/tool/
 would solve the confliction.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Resolved] (DIRKRB-163) align package declearation and real path for Kinit.java

2015-02-28 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-163?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng resolved DIRKRB-163.
--
Resolution: Fixed

 align package declearation and real path for Kinit.java
 ---

 Key: DIRKRB-163
 URL: https://issues.apache.org/jira/browse/DIRKRB-163
 Project: Directory Kerberos
  Issue Type: Improvement
Affects Versions: 2.0.0-M16
Reporter: Liqi Yi
Priority: Trivial
  Labels: newbie
 Attachments: DIRKRB-163.patch

   Original Estimate: 1m
  Remaining Estimate: 1m

 package declearation for 
 tool/src/main/java/org/apache/kerberos/tool/Kinit.java is 
 org.apache.kerby.kerberos.tool
 which two do not match, reported by eclipse.
 moving Kinit.java to  
 tool/src/main/java/org/apache/kerby/kerberos/tool/
 would solve the confliction.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Comment Edited] (DIRKRB-163) align package declearation and real path for Kinit.java

2015-02-27 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-163?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14339950#comment-14339950
 ] 

Kai Zheng edited comment on DIRKRB-163 at 2/27/15 8:22 PM:
---

Good catch, [~yiliqi]. Thanks !


was (Author: drankye):
Good catch, [~liqi6510]. Thanks !

 align package declearation and real path for Kinit.java
 ---

 Key: DIRKRB-163
 URL: https://issues.apache.org/jira/browse/DIRKRB-163
 Project: Directory Kerberos
  Issue Type: Improvement
Affects Versions: 2.0.0-M16
Reporter: Liqi Yi
Priority: Trivial
  Labels: newbie
   Original Estimate: 1m
  Remaining Estimate: 1m

 package declearation for 
 tool/src/main/java/org/apache/kerberos/tool/Kinit.java is 
 org.apache.kerby.kerberos.tool
 which two do not match, reported by eclipse.
 moving Kinit.java to  
 tool/src/main/java/org/apache/kerby/kerberos/tool/
 would solve the confliction.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (DIRKRB-163) align package declearation and real path for Kinit.java

2015-02-27 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-163?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng updated DIRKRB-163:
-
Component/s: (was: changepw)

 align package declearation and real path for Kinit.java
 ---

 Key: DIRKRB-163
 URL: https://issues.apache.org/jira/browse/DIRKRB-163
 Project: Directory Kerberos
  Issue Type: Improvement
Affects Versions: 2.0.0-M16
Reporter: Liqi Yi
Priority: Trivial
  Labels: newbie
   Original Estimate: 1m
  Remaining Estimate: 1m

 package declearation for 
 tool/src/main/java/org/apache/kerberos/tool/Kinit.java is 
 org.apache.kerby.kerberos.tool
 which two do not match, reported by eclipse.
 moving Kinit.java to  
 tool/src/main/java/org/apache/kerby/kerberos/tool/
 would solve the confliction.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-163) align package declearation and real path for Kinit.java

2015-02-27 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-163?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14339950#comment-14339950
 ] 

Kai Zheng commented on DIRKRB-163:
--

Good catch, [~liqi6510]. Thanks !

 align package declearation and real path for Kinit.java
 ---

 Key: DIRKRB-163
 URL: https://issues.apache.org/jira/browse/DIRKRB-163
 Project: Directory Kerberos
  Issue Type: Improvement
Affects Versions: 2.0.0-M16
Reporter: Liqi Yi
Priority: Trivial
  Labels: newbie
   Original Estimate: 1m
  Remaining Estimate: 1m

 package declearation for 
 tool/src/main/java/org/apache/kerberos/tool/Kinit.java is 
 org.apache.kerby.kerberos.tool
 which two do not match, reported by eclipse.
 moving Kinit.java to  
 tool/src/main/java/org/apache/kerby/kerberos/tool/
 would solve the confliction.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (DIRKRB-160) Packing related jars as Kerberos client library for applications

2015-02-11 Thread Kai Zheng (JIRA)
Kai Zheng created DIRKRB-160:


 Summary: Packing related jars as Kerberos client library for 
applications
 Key: DIRKRB-160
 URL: https://issues.apache.org/jira/browse/DIRKRB-160
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng


To ease applications to use the Kerberos client library, it's good to provide 
one or two single jars by incorporating related jars together, since we have 
quite a few of modules and they're hard for normal users to select from.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (DIRKRB-161) Packing related jars as Kerberos server library for applications

2015-02-11 Thread Kai Zheng (JIRA)
Kai Zheng created DIRKRB-161:


 Summary: Packing related jars as Kerberos server library for 
applications
 Key: DIRKRB-161
 URL: https://issues.apache.org/jira/browse/DIRKRB-161
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng


To ease applications to use the Kerberos server library, it's good to provide 
one or two jars by incorporating related jars together, since we have quite a 
few of modules and they're hard for normal users to select from.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-134) Installation packaging and service wrapper

2015-02-11 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-134?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14317688#comment-14317688
 ] 

Kai Zheng commented on DIRKRB-134:
--

Hi [~HazelC],

bq.Do you think which way is better?
I would prefer to your approach, by selecting one by one. This is obvious 
because once we get DIRKRB-160 and DIRKRB-161 done, only very limited jars are 
to be collected for the installation package. 
bq.then change the working dir path in configuration file.
It looks to me not good to have to change the working directory after installed 
but before launching. Let me think about this later.

Thanks.


 Installation packaging and service wrapper
 --

 Key: DIRKRB-134
 URL: https://issues.apache.org/jira/browse/DIRKRB-134
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Lin Chen
 Attachments: DIRKRB-134_v1.patch, wrapper.conf, wrapper.stop.conf


 This is for having installation packaging and service wrapper for the KDC 
 server. We can borrow the existing artifacts from Directory Server.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (DIRKRB-102) [Apache Kerby] A dedicated Kerberos project

2015-02-10 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-102?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng updated DIRKRB-102:
-
Summary: [Apache Kerby] A dedicated Kerberos project   (was: A dedicated 
Kerberos project )

 [Apache Kerby] A dedicated Kerberos project 
 

 Key: DIRKRB-102
 URL: https://issues.apache.org/jira/browse/DIRKRB-102
 Project: Directory Kerberos
  Issue Type: New Feature
Reporter: Kai Zheng
  Labels: Kerberos

 As discussed in the community, we're going to create a dedicated Kerberos 
 project based on Haox project codebase (https://github.com/drankye/haox) 
 incorporating and consolidating the existing Kerberos functionalities in 
 ApacheDS. The long term goal is to establish a first class Kerberos 
 implementation in Java for the Apache world targeting today's environments in 
 cloud, Hadoop and mobile. It will provides rich, intuitive and interoperable 
 library and facilities that integrate multiple authentication mechanisms 
 including PKI, OTP and token (OAuth) as desired in above mentioned modern 
 environments.It will also implement a KDC server that can integrate various 
 identity back ends including simple memory database, SQL database and LDAP 
 server by dynamic plugin and loading approach, which allows it to be utilized 
 in various contexts and scenarios. 
 This serves as the master JIRA to track all the related tasks for the new sub 
 project. With the fundamental aspects and tasks resolved, we would go to next 
 phase targeting an Apache TLP project, as we agreed in the discussion. 



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Resolved] (DIRKRB-149) Re-organize the project layout with the new name 'Apache Kerby'

2015-02-09 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-149?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng resolved DIRKRB-149.
--
Resolution: Fixed

Let's resolve this as no further feedback so far.

 Re-organize the project layout with the new name 'Apache Kerby'
 ---

 Key: DIRKRB-149
 URL: https://issues.apache.org/jira/browse/DIRKRB-149
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Kai Zheng

 We just decided to use the new name 'Apache Kerby', which requires to rename 
 the modules, generally like replacing 'Haox' with 'Kerby'.
 Kiran also proposed many great ideas about how to layout the whole project.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-134) Installation packaging and service wrapper

2015-02-09 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-134?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14313188#comment-14313188
 ] 

Kai Zheng commented on DIRKRB-134:
--

Hi [~HazelC],

I played some while with it. It's a great starting step. Thanks ! Let's improve 
this based on the branch, when it works perfectly, we'll merge this to master.


 Installation packaging and service wrapper
 --

 Key: DIRKRB-134
 URL: https://issues.apache.org/jira/browse/DIRKRB-134
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Lin Chen
 Attachments: DIRKRB-134_v1.patch, wrapper.conf, wrapper.stop.conf


 This is for having installation packaging and service wrapper for the KDC 
 server. We can borrow the existing artifacts from Directory Server.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-134) Installation packaging and service wrapper

2015-02-09 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-134?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14313191#comment-14313191
 ] 

Kai Zheng commented on DIRKRB-134:
--

I noticed test related jars are also copied there. Could you improve and avoid 
that ? If not possible, we may have a post step when packaging to remove those 
jars.

 Installation packaging and service wrapper
 --

 Key: DIRKRB-134
 URL: https://issues.apache.org/jira/browse/DIRKRB-134
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Lin Chen
 Attachments: DIRKRB-134_v1.patch, wrapper.conf, wrapper.stop.conf


 This is for having installation packaging and service wrapper for the KDC 
 server. We can borrow the existing artifacts from Directory Server.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-134) Installation packaging and service wrapper

2015-02-09 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-134?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14313192#comment-14313192
 ] 

Kai Zheng commented on DIRKRB-134:
--

Another point is, could we have an installation package like a tar ball 
(*.tgz), with something like HowToInstall.txt included without any relying on 
the building  developing working folder ?

 Installation packaging and service wrapper
 --

 Key: DIRKRB-134
 URL: https://issues.apache.org/jira/browse/DIRKRB-134
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Lin Chen
 Attachments: DIRKRB-134_v1.patch, wrapper.conf, wrapper.stop.conf


 This is for having installation packaging and service wrapper for the KDC 
 server. We can borrow the existing artifacts from Directory Server.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-146) Test for encrypted data in Kerberos message

2015-02-09 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-146?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14313150#comment-14313150
 ] 

Kai Zheng commented on DIRKRB-146:
--

Yes [~HazelC], I will look at this. Thanks for finding the issue !

 Test for encrypted data in Kerberos message
 ---

 Key: DIRKRB-146
 URL: https://issues.apache.org/jira/browse/DIRKRB-146
 Project: Directory Kerberos
  Issue Type: Test
Reporter: Lin Chen
Assignee: Lin Chen

 Test for encrypted data in Kerberos message.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-145) Add tests for Asn1GeneralizedTime type

2015-02-08 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-145?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14311831#comment-14311831
 ] 

Kai Zheng commented on DIRKRB-145:
--

[~zhouwei] would help with this one. Thanks.

 Add tests for Asn1GeneralizedTime type
 --

 Key: DIRKRB-145
 URL: https://issues.apache.org/jira/browse/DIRKRB-145
 Project: Directory Kerberos
  Issue Type: Test
Reporter: Lin Chen
Assignee: Kai Zheng

 Add tests for Asn1GeneralizedTime type.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Assigned] (DIRKRB-145) Add tests for Asn1GeneralizedTime type

2015-02-08 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-145?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng reassigned DIRKRB-145:


Assignee: Kai Zheng

 Add tests for Asn1GeneralizedTime type
 --

 Key: DIRKRB-145
 URL: https://issues.apache.org/jira/browse/DIRKRB-145
 Project: Directory Kerberos
  Issue Type: Test
Reporter: Lin Chen
Assignee: Kai Zheng

 Add tests for Asn1GeneralizedTime type.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Resolved] (DIRKRB-158) Decouple the mixed aspects in EncodingOption in kerby-asn1

2015-02-08 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-158?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng resolved DIRKRB-158.
--
Resolution: Fixed

 Decouple the mixed aspects in EncodingOption in kerby-asn1
 --

 Key: DIRKRB-158
 URL: https://issues.apache.org/jira/browse/DIRKRB-158
 Project: Directory Kerberos
  Issue Type: Improvement
Reporter: Kai Zheng

 Below is from [~elecharny]'s email, proposing his thoughts:
 {noformat}
 just looking at the EncodingOption enum, and I wonder if there is not a 
 mixture of things in it.
 Typically, we have some encoding type like BER/CER/DER, mixed with other 
 unrelated values 
 (CONSTRUCTED/PRIMITIVE/IMPLICIT/EXPLICIT).
 I understand that it's used to gather multiple flags into one enum, but
 - it's not clear from a programmer POV
 - you can't tranlate that easily without adding many explicit methods in the 
 enum (isConstructed(), etc...)
 I wonder if using a specifig field for each of those flags would not be 
 better ?
 Something like :
 public abstract class AbstractAsn1TypeT implements Asn1Type {
 private boolean pc// Primitive/constructed
 private boolean lengthType;  // Definite/Undefinite
 private EncodingType encoding; // BER/CER/DER/XER/PER
 ...
 {noformat}
 And [~drankye]'s email response:
 {noformat}
 I agree. EncodingOption is a dirty work and mixes too many aspects. We should 
 divide them. 
 It's good to have specific field for each of the aspects as you listed, 
 marked as 'private', 
 and providing 'public' get methods to them, and in codes we use the methods 
 instead of those fields. 
 In some future we can optimize these fields out using a bit vector or an int 
 to flag them.
 {noformat}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Assigned] (DIRKRB-158) Decouple the mixed aspects in EncodingOption in kerby-asn1

2015-02-08 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-158?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng reassigned DIRKRB-158:


Assignee: Kai Zheng

 Decouple the mixed aspects in EncodingOption in kerby-asn1
 --

 Key: DIRKRB-158
 URL: https://issues.apache.org/jira/browse/DIRKRB-158
 Project: Directory Kerberos
  Issue Type: Improvement
Reporter: Kai Zheng
Assignee: Kai Zheng

 Below is from [~elecharny]'s email, proposing his thoughts:
 {noformat}
 just looking at the EncodingOption enum, and I wonder if there is not a 
 mixture of things in it.
 Typically, we have some encoding type like BER/CER/DER, mixed with other 
 unrelated values 
 (CONSTRUCTED/PRIMITIVE/IMPLICIT/EXPLICIT).
 I understand that it's used to gather multiple flags into one enum, but
 - it's not clear from a programmer POV
 - you can't tranlate that easily without adding many explicit methods in the 
 enum (isConstructed(), etc...)
 I wonder if using a specifig field for each of those flags would not be 
 better ?
 Something like :
 public abstract class AbstractAsn1TypeT implements Asn1Type {
 private boolean pc// Primitive/constructed
 private boolean lengthType;  // Definite/Undefinite
 private EncodingType encoding; // BER/CER/DER/XER/PER
 ...
 {noformat}
 And [~drankye]'s email response:
 {noformat}
 I agree. EncodingOption is a dirty work and mixes too many aspects. We should 
 divide them. 
 It's good to have specific field for each of the aspects as you listed, 
 marked as 'private', 
 and providing 'public' get methods to them, and in codes we use the methods 
 instead of those fields. 
 In some future we can optimize these fields out using a bit vector or an int 
 to flag them.
 {noformat}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-158) Decouple the mixed aspects in EncodingOption in kerby-asn1

2015-02-08 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-158?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14311795#comment-14311795
 ] 

Kai Zheng commented on DIRKRB-158:
--

commit 57e75f088d489b37f8480924cbb83d58ccdc24a4
Author: Drankye dran...@gmail.com
Date:   Mon Feb 9 11:13:08 2015 +0800

DIRKRB-158. Decouple the mixed aspects in EncodingOption in kerby-asn1

 Decouple the mixed aspects in EncodingOption in kerby-asn1
 --

 Key: DIRKRB-158
 URL: https://issues.apache.org/jira/browse/DIRKRB-158
 Project: Directory Kerberos
  Issue Type: Improvement
Reporter: Kai Zheng

 Below is from [~elecharny]'s email, proposing his thoughts:
 {noformat}
 just looking at the EncodingOption enum, and I wonder if there is not a 
 mixture of things in it.
 Typically, we have some encoding type like BER/CER/DER, mixed with other 
 unrelated values 
 (CONSTRUCTED/PRIMITIVE/IMPLICIT/EXPLICIT).
 I understand that it's used to gather multiple flags into one enum, but
 - it's not clear from a programmer POV
 - you can't tranlate that easily without adding many explicit methods in the 
 enum (isConstructed(), etc...)
 I wonder if using a specifig field for each of those flags would not be 
 better ?
 Something like :
 public abstract class AbstractAsn1TypeT implements Asn1Type {
 private boolean pc// Primitive/constructed
 private boolean lengthType;  // Definite/Undefinite
 private EncodingType encoding; // BER/CER/DER/XER/PER
 ...
 {noformat}
 And [~drankye]'s email response:
 {noformat}
 I agree. EncodingOption is a dirty work and mixes too many aspects. We should 
 divide them. 
 It's good to have specific field for each of the aspects as you listed, 
 marked as 'private', 
 and providing 'public' get methods to them, and in codes we use the methods 
 instead of those fields. 
 In some future we can optimize these fields out using a bit vector or an int 
 to flag them.
 {noformat}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-108) Building the web site

2015-02-05 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-108?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14308691#comment-14308691
 ] 

Kai Zheng commented on DIRKRB-108:
--

I'm sorry for delaying on this, crazy busy with other projects, but will have 
to get my part done the weekend. 

 Building the web site
 -

 Key: DIRKRB-108
 URL: https://issues.apache.org/jira/browse/DIRKRB-108
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Kai Zheng

 We need to build the new website for this new Kerberos project, as we did for 
 other sub projects.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-159) Having a decoartor for each type of encoding, like BER/CER/DER

2015-02-05 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-159?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14308722#comment-14308722
 ] 

Kai Zheng commented on DIRKRB-159:
--

Logging this in case it's forgotten. We should consider this in the future when 
have the bandwidth.

 Having a decoartor for each type of encoding, like BER/CER/DER
 --

 Key: DIRKRB-159
 URL: https://issues.apache.org/jira/browse/DIRKRB-159
 Project: Directory Kerberos
  Issue Type: Improvement
Reporter: Kai Zheng

 Below is from [~elecharny]'s email, giving the thoughts:
 {noformat}
 we do the encoding/decoding in the ASN1 type instances.
 That's ok, but as soon as we have to deal with various type of encoding
 (BER/CER...) this cipple the code with if/else/then. 
 What about having a decoartor for each type of encoding ?
 {noformat}
 Below is [~drankye]'s response in email:
 {noformat}
 I agree. If we're going to support BER and DER both well or new schemes,
 then we need such. It won't introduce API change for the types and is only
 for internal encoding/decoding implementation, right ?
 Could you have a simple illustration or example, 
 say how to do that for the simple Asn1Boolean type ? Thanks.
 {noformat}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (DIRKRB-158) Decouple the mixed aspects in EncodingOption in kerby-asn1

2015-02-05 Thread Kai Zheng (JIRA)
Kai Zheng created DIRKRB-158:


 Summary: Decouple the mixed aspects in EncodingOption in kerby-asn1
 Key: DIRKRB-158
 URL: https://issues.apache.org/jira/browse/DIRKRB-158
 Project: Directory Kerberos
  Issue Type: Improvement
Reporter: Kai Zheng


Below is from [~elecharny]'s email, proposing his thoughts:
{noformat}
just looking at the EncodingOption enum, and I wonder if there is not a mixture 
of things in it.

Typically, we have some encoding type like BER/CER/DER, mixed with other 
unrelated values (CONSTRUCTED/PRIMITIVE/IMPLICIT/EXPLICIT).

I understand that it's used to gather multiple flags into one enum, but
- it's not clear from a programmer POV
- you can't tranlate that easily without adding many explicit methods in the 
enum (isConstructed(), etc...)

I wonder if using a specifig field for each of those flags would not be better ?

Something like :

public abstract class AbstractAsn1TypeT implements Asn1Type {
private boolean pc// Primitive/constructed
private boolean lengthType;  // Definite/Undefinite
private EncodingType encoding; // BER/CER/DER/XER/PER
...
{noformat}
And [~drankye]'s email response:
{noformat}
I agree. EncodingOption is a dirty work and mixes too many aspects. 
We should divide them. It's good to have specific field for each of the aspects 
as you listed, 
marked as 'private', and providing 'public' get methods to them, 
and in codes we use the methods instead of those fields. 
In some future we can optimize these fields out using a bit vector or 
an int to flag them.
{noformat}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (DIRKRB-159) Having a decoartor for each type (like BER/CER/DER) of encoding

2015-02-05 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-159?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng updated DIRKRB-159:
-
Summary: Having a decoartor for each type (like BER/CER/DER) of encoding  
(was: Having a decoartor for each type of encoding, like BER/CER/DER)

 Having a decoartor for each type (like BER/CER/DER) of encoding
 ---

 Key: DIRKRB-159
 URL: https://issues.apache.org/jira/browse/DIRKRB-159
 Project: Directory Kerberos
  Issue Type: Improvement
Reporter: Kai Zheng

 Below is from [~elecharny]'s email, giving the thoughts:
 {noformat}
 we do the encoding/decoding in the ASN1 type instances.
 That's ok, but as soon as we have to deal with various type of encoding
 (BER/CER...) this cipple the code with if/else/then. 
 What about having a decoartor for each type of encoding ?
 {noformat}
 Below is [~drankye]'s response in email:
 {noformat}
 I agree. If we're going to support BER and DER both well or new schemes,
 then we need such. It won't introduce API change for the types and is only
 for internal encoding/decoding implementation, right ?
 Could you have a simple illustration or example, 
 say how to do that for the simple Asn1Boolean type ? Thanks.
 {noformat}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (DIRKRB-158) Decouple the mixed aspects in EncodingOption in kerby-asn1

2015-02-05 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-158?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng updated DIRKRB-158:
-
Description: 
Below is from [~elecharny]'s email, proposing his thoughts:
{noformat}
just looking at the EncodingOption enum, and I wonder if there is not a mixture 
of things in it.

Typically, we have some encoding type like BER/CER/DER, mixed with other 
unrelated values (CONSTRUCTED/PRIMITIVE/IMPLICIT/EXPLICIT).

I understand that it's used to gather multiple flags into one enum, but
- it's not clear from a programmer POV
- you can't tranlate that easily without adding many explicit methods in the 
enum (isConstructed(), etc...)

I wonder if using a specifig field for each of those flags would not be better ?

Something like :

public abstract class AbstractAsn1TypeT implements Asn1Type {
private boolean pc// Primitive/constructed
private boolean lengthType;  // Definite/Undefinite
private EncodingType encoding; // BER/CER/DER/XER/PER
...
{noformat}
And [~drankye]'s email response:
{noformat}
I agree. EncodingOption is a dirty work and mixes too many aspects. We should 
divide them. It's good to have specific field for each of the aspects as you 
listed, marked as 'private', and providing 'public' get methods to them, and in 
codes we use the methods instead of those fields. In some future we can 
optimize these fields out using a bit vector or an int to flag them.
{noformat}

  was:
Below is from [~elecharny]'s email, proposing his thoughts:
{noformat}
just looking at the EncodingOption enum, and I wonder if there is not a mixture 
of things in it.

Typically, we have some encoding type like BER/CER/DER, mixed with other 
unrelated values (CONSTRUCTED/PRIMITIVE/IMPLICIT/EXPLICIT).

I understand that it's used to gather multiple flags into one enum, but
- it's not clear from a programmer POV
- you can't tranlate that easily without adding many explicit methods in the 
enum (isConstructed(), etc...)

I wonder if using a specifig field for each of those flags would not be better ?

Something like :

public abstract class AbstractAsn1TypeT implements Asn1Type {
private boolean pc// Primitive/constructed
private boolean lengthType;  // Definite/Undefinite
private EncodingType encoding; // BER/CER/DER/XER/PER
...
{noformat}
And [~drankye]'s email response:
{noformat}
I agree. EncodingOption is a dirty work and mixes too many aspects. 
We should divide them. It's good to have specific field for each of the aspects 
as you listed, 
marked as 'private', and providing 'public' get methods to them, 
and in codes we use the methods instead of those fields. 
In some future we can optimize these fields out using a bit vector or 
an int to flag them.
{noformat}


 Decouple the mixed aspects in EncodingOption in kerby-asn1
 --

 Key: DIRKRB-158
 URL: https://issues.apache.org/jira/browse/DIRKRB-158
 Project: Directory Kerberos
  Issue Type: Improvement
Reporter: Kai Zheng

 Below is from [~elecharny]'s email, proposing his thoughts:
 {noformat}
 just looking at the EncodingOption enum, and I wonder if there is not a 
 mixture of things in it.
 Typically, we have some encoding type like BER/CER/DER, mixed with other 
 unrelated values (CONSTRUCTED/PRIMITIVE/IMPLICIT/EXPLICIT).
 I understand that it's used to gather multiple flags into one enum, but
 - it's not clear from a programmer POV
 - you can't tranlate that easily without adding many explicit methods in the 
 enum (isConstructed(), etc...)
 I wonder if using a specifig field for each of those flags would not be 
 better ?
 Something like :
 public abstract class AbstractAsn1TypeT implements Asn1Type {
 private boolean pc// Primitive/constructed
 private boolean lengthType;  // Definite/Undefinite
 private EncodingType encoding; // BER/CER/DER/XER/PER
 ...
 {noformat}
 And [~drankye]'s email response:
 {noformat}
 I agree. EncodingOption is a dirty work and mixes too many aspects. We should 
 divide them. It's good to have specific field for each of the aspects as you 
 listed, marked as 'private', and providing 'public' get methods to them, and 
 in codes we use the methods instead of those fields. In some future we can 
 optimize these fields out using a bit vector or an int to flag them.
 {noformat}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (DIRKRB-159) Having a decoartor for each type of encoding, like BER/CER/DER

2015-02-05 Thread Kai Zheng (JIRA)
Kai Zheng created DIRKRB-159:


 Summary: Having a decoartor for each type of encoding, like 
BER/CER/DER
 Key: DIRKRB-159
 URL: https://issues.apache.org/jira/browse/DIRKRB-159
 Project: Directory Kerberos
  Issue Type: Improvement
Reporter: Kai Zheng


Below is from [~elecharny]'s email, giving the thoughts:
{noformat}
we do the encoding/decoding in the ASN1 type instances.
That's ok, but as soon as we have to deal with various type of encoding
(BER/CER...) this cipple the code with if/else/then. 
What about having a decoartor for each type of encoding ?
{noformat}
Below is [~drankye]'s response in email:
{noformat}
I agree. If we're going to support BER and DER both well or new schemes,
then we need such. It won't introduce API change for the types and is only
for internal encoding/decoding implementation, right ?
Could you have a simple illustration or example, 
say how to do that for the simple Asn1Boolean type ? Thanks.
{noformat}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-108) Building the web site

2015-02-05 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-108?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14308735#comment-14308735
 ] 

Kai Zheng commented on DIRKRB-108:
--

bq.The web site is entirely stored in 
http://svn.apache.org/viewvc/directory/site/
When check it out using svn, should use this url: 
https://svn.apache.org/repos/asf/directory/site/trunk/

 Building the web site
 -

 Key: DIRKRB-108
 URL: https://issues.apache.org/jira/browse/DIRKRB-108
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Kai Zheng

 We need to build the new website for this new Kerberos project, as we did for 
 other sub projects.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-158) Decouple the mixed aspects in EncodingOption in kerby-asn1

2015-02-05 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-158?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14308713#comment-14308713
 ] 

Kai Zheng commented on DIRKRB-158:
--

Logging this great idea for future's consideration when having the time.

 Decouple the mixed aspects in EncodingOption in kerby-asn1
 --

 Key: DIRKRB-158
 URL: https://issues.apache.org/jira/browse/DIRKRB-158
 Project: Directory Kerberos
  Issue Type: Improvement
Reporter: Kai Zheng

 Below is from [~elecharny]'s email, proposing his thoughts:
 {noformat}
 just looking at the EncodingOption enum, and I wonder if there is not a 
 mixture of things in it.
 Typically, we have some encoding type like BER/CER/DER, mixed with other 
 unrelated values 
 (CONSTRUCTED/PRIMITIVE/IMPLICIT/EXPLICIT).
 I understand that it's used to gather multiple flags into one enum, but
 - it's not clear from a programmer POV
 - you can't tranlate that easily without adding many explicit methods in the 
 enum (isConstructed(), etc...)
 I wonder if using a specifig field for each of those flags would not be 
 better ?
 Something like :
 public abstract class AbstractAsn1TypeT implements Asn1Type {
 private boolean pc// Primitive/constructed
 private boolean lengthType;  // Definite/Undefinite
 private EncodingType encoding; // BER/CER/DER/XER/PER
 ...
 {noformat}
 And [~drankye]'s email response:
 {noformat}
 I agree. EncodingOption is a dirty work and mixes too many aspects. We should 
 divide them. 
 It's good to have specific field for each of the aspects as you listed, 
 marked as 'private', 
 and providing 'public' get methods to them, and in codes we use the methods 
 instead of those fields. 
 In some future we can optimize these fields out using a bit vector or an int 
 to flag them.
 {noformat}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (DIRKRB-158) Decouple the mixed aspects in EncodingOption in kerby-asn1

2015-02-05 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-158?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng updated DIRKRB-158:
-
Description: 
Below is from [~elecharny]'s email, proposing his thoughts:
{noformat}
just looking at the EncodingOption enum, and I wonder if there is not a mixture 
of things in it.

Typically, we have some encoding type like BER/CER/DER, mixed with other 
unrelated values 
(CONSTRUCTED/PRIMITIVE/IMPLICIT/EXPLICIT).

I understand that it's used to gather multiple flags into one enum, but
- it's not clear from a programmer POV
- you can't tranlate that easily without adding many explicit methods in the 
enum (isConstructed(), etc...)

I wonder if using a specifig field for each of those flags would not be better ?

Something like :

public abstract class AbstractAsn1TypeT implements Asn1Type {
private boolean pc// Primitive/constructed
private boolean lengthType;  // Definite/Undefinite
private EncodingType encoding; // BER/CER/DER/XER/PER
...
{noformat}
And [~drankye]'s email response:
{noformat}
I agree. EncodingOption is a dirty work and mixes too many aspects. We should 
divide them. 
It's good to have specific field for each of the aspects as you listed, marked 
as 'private', 
and providing 'public' get methods to them, and in codes we use the methods 
instead of those fields. 
In some future we can optimize these fields out using a bit vector or an int to 
flag them.
{noformat}

  was:
Below is from [~elecharny]'s email, proposing his thoughts:
{noformat}
just looking at the EncodingOption enum, and I wonder if there is not a mixture 
of things in it.

Typically, we have some encoding type like BER/CER/DER, mixed with other 
unrelated values (CONSTRUCTED/PRIMITIVE/IMPLICIT/EXPLICIT).

I understand that it's used to gather multiple flags into one enum, but
- it's not clear from a programmer POV
- you can't tranlate that easily without adding many explicit methods in the 
enum (isConstructed(), etc...)

I wonder if using a specifig field for each of those flags would not be better ?

Something like :

public abstract class AbstractAsn1TypeT implements Asn1Type {
private boolean pc// Primitive/constructed
private boolean lengthType;  // Definite/Undefinite
private EncodingType encoding; // BER/CER/DER/XER/PER
...
{noformat}
And [~drankye]'s email response:
{noformat}
I agree. EncodingOption is a dirty work and mixes too many aspects. We should 
divide them. It's good to have specific field for each of the aspects as you 
listed, marked as 'private', and providing 'public' get methods to them, and in 
codes we use the methods instead of those fields. In some future we can 
optimize these fields out using a bit vector or an int to flag them.
{noformat}


 Decouple the mixed aspects in EncodingOption in kerby-asn1
 --

 Key: DIRKRB-158
 URL: https://issues.apache.org/jira/browse/DIRKRB-158
 Project: Directory Kerberos
  Issue Type: Improvement
Reporter: Kai Zheng

 Below is from [~elecharny]'s email, proposing his thoughts:
 {noformat}
 just looking at the EncodingOption enum, and I wonder if there is not a 
 mixture of things in it.
 Typically, we have some encoding type like BER/CER/DER, mixed with other 
 unrelated values 
 (CONSTRUCTED/PRIMITIVE/IMPLICIT/EXPLICIT).
 I understand that it's used to gather multiple flags into one enum, but
 - it's not clear from a programmer POV
 - you can't tranlate that easily without adding many explicit methods in the 
 enum (isConstructed(), etc...)
 I wonder if using a specifig field for each of those flags would not be 
 better ?
 Something like :
 public abstract class AbstractAsn1TypeT implements Asn1Type {
 private boolean pc// Primitive/constructed
 private boolean lengthType;  // Definite/Undefinite
 private EncodingType encoding; // BER/CER/DER/XER/PER
 ...
 {noformat}
 And [~drankye]'s email response:
 {noformat}
 I agree. EncodingOption is a dirty work and mixes too many aspects. We should 
 divide them. 
 It's good to have specific field for each of the aspects as you listed, 
 marked as 'private', 
 and providing 'public' get methods to them, and in codes we use the methods 
 instead of those fields. 
 In some future we can optimize these fields out using a bit vector or an int 
 to flag them.
 {noformat}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-104) Clean up and clear the codes, clarifying any IP concerned codes

2015-02-01 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-104?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14300757#comment-14300757
 ] 

Kai Zheng commented on DIRKRB-104:
--

I have gone through the codes and performed quit much clean up:
1. In kerb-crypto module, reimplemented some codes like des keymaker;
2. In not-commons-ssl library, getting rid of much redundant codes like ASN1 
parsers;
3. In kerb-core-test, removed most of the codes from jaaslounge, and Lin has 
added some codec tests;
4. Also checked some codes in other modules.

 Clean up and clear the codes, clarifying any IP concerned codes
 ---

 Key: DIRKRB-104
 URL: https://issues.apache.org/jira/browse/DIRKRB-104
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Kai Zheng

 This is going to clean up and clear any IP and license related or concerned 
 codes imported from Haox project.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Resolved] (DIRKRB-104) Clean up and clear the codes, clarifying any IP concerned codes

2015-02-01 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-104?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng resolved DIRKRB-104.
--
Resolution: Fixed

 Clean up and clear the codes, clarifying any IP concerned codes
 ---

 Key: DIRKRB-104
 URL: https://issues.apache.org/jira/browse/DIRKRB-104
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Kai Zheng

 This is going to clean up and clear any IP and license related or concerned 
 codes imported from Haox project.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Assigned] (DIRKRB-108) Building the web site

2015-02-01 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-108?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng reassigned DIRKRB-108:


Assignee: Kai Zheng  (was: Emmanuel Lecharny)

 Building the web site
 -

 Key: DIRKRB-108
 URL: https://issues.apache.org/jira/browse/DIRKRB-108
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Kai Zheng

 We need to build the new website for this new Kerberos project, as we did for 
 other sub projects.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-108) Building the web site

2015-02-01 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-108?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14300760#comment-14300760
 ] 

Kai Zheng commented on DIRKRB-108:
--

I was frequently asked by some questions like can you tell me the web site ? 
when I introduce Apache Kerby. OK, let me address this.

Is there any guide regarding how to add the web pages for a new sub-project in 
ApacheDS ? Thanks.

 Building the web site
 -

 Key: DIRKRB-108
 URL: https://issues.apache.org/jira/browse/DIRKRB-108
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Kai Zheng

 We need to build the new website for this new Kerberos project, as we did for 
 other sub projects.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-108) Building the web site

2015-02-01 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-108?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14300978#comment-14300978
 ] 

Kai Zheng commented on DIRKRB-108:
--

Thank you Emmanuel for your help and the bootstrap !

 Building the web site
 -

 Key: DIRKRB-108
 URL: https://issues.apache.org/jira/browse/DIRKRB-108
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Kai Zheng

 We need to build the new website for this new Kerberos project, as we did for 
 other sub projects.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Resolved] (DIRKRB-157) Value like 0x01 01 7F should not be decoded as TRUE with DER

2015-01-31 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-157?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng resolved DIRKRB-157.
--
Resolution: Fixed

commit 377814b2dcfda1192d77cab8705fe7c750384810
Author: Drankye dran...@gmail.com
Date:   Sun Feb 1 10:19:05 2015 +0800

DIRKRB-157 Value like 0x01 01 7F should not be decoded as TRUE with DER

 Value like 0x01 01 7F should not be decoded as TRUE with DER
 

 Key: DIRKRB-157
 URL: https://issues.apache.org/jira/browse/DIRKRB-157
 Project: Directory Kerberos
  Issue Type: Bug
Reporter: Emmanuel Lecharny
Assignee: Kai Zheng
Priority: Minor

 In BER, any value different from 0x00 is decoded as TRUE for boolean.
 DER impose a restriction, 0xFF is the only acceptable value for TRUE, per 
 X.690, 11.1



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (DIRKRB-157) Value like 0x01 01 7F should not be decoded as TRUE with DER

2015-01-31 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-157?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng updated DIRKRB-157:
-
Summary: Value like 0x01 01 7F should not be decoded as TRUE with DER  
(was: Value like 0x01 01 7F should not be decoded as Boolean with DER)

 Value like 0x01 01 7F should not be decoded as TRUE with DER
 

 Key: DIRKRB-157
 URL: https://issues.apache.org/jira/browse/DIRKRB-157
 Project: Directory Kerberos
  Issue Type: Bug
Reporter: Emmanuel Lecharny
Priority: Minor

 In BER, any value different from 0x00 is decoded as TRUE for boolean.
 DER impose a restriction, 0xFF is the only acceptable value for TRUE, per 
 X.690, 11.1



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-157) Value like 0x01 01 7F should not be decoded as Boolean with DER

2015-01-31 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-157?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14300046#comment-14300046
 ] 

Kai Zheng commented on DIRKRB-157:
--

Did you mean this in kerby-asn1 module ? Will look at it. Thanks for reporting 
this.

 Value like 0x01 01 7F should not be decoded as Boolean with DER
 ---

 Key: DIRKRB-157
 URL: https://issues.apache.org/jira/browse/DIRKRB-157
 Project: Directory Kerberos
  Issue Type: Bug
Reporter: Emmanuel Lecharny
Priority: Minor

 In BER, any value different from 0x00 is decoded as TRUE for boolean.
 DER impose a restriction, 0xFF is the only acceptable value for TRUE, per 
 X.690, 11.1



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Assigned] (DIRKRB-157) Value like 0x01 01 7F should not be decoded as TRUE with DER

2015-01-31 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-157?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng reassigned DIRKRB-157:


Assignee: Kai Zheng

 Value like 0x01 01 7F should not be decoded as TRUE with DER
 

 Key: DIRKRB-157
 URL: https://issues.apache.org/jira/browse/DIRKRB-157
 Project: Directory Kerberos
  Issue Type: Bug
Reporter: Emmanuel Lecharny
Assignee: Kai Zheng
Priority: Minor

 In BER, any value different from 0x00 is decoded as TRUE for boolean.
 DER impose a restriction, 0xFF is the only acceptable value for TRUE, per 
 X.690, 11.1



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-134) Installation packaging and service wrapper

2015-01-29 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-134?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14298150#comment-14298150
 ] 

Kai Zheng commented on DIRKRB-134:
--

If possible, I mean, if we we can avoid corrupting and affecting the 
functionality, we should add the header.

 Installation packaging and service wrapper
 --

 Key: DIRKRB-134
 URL: https://issues.apache.org/jira/browse/DIRKRB-134
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Lin Chen
 Attachments: DIRKRB-134_v1.patch, wrapper.conf, wrapper.stop.conf


 This is for having installation packaging and service wrapper for the KDC 
 server. We can borrow the existing artifacts from Directory Server.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-134) Installation packaging and service wrapper

2015-01-28 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-134?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14296481#comment-14296481
 ] 

Kai Zheng commented on DIRKRB-134:
--

It's great Lin could commit. Thanks.

Lin, would you commit this in a new branch so anybody like me can have a try 
with it easily ?

 Installation packaging and service wrapper
 --

 Key: DIRKRB-134
 URL: https://issues.apache.org/jira/browse/DIRKRB-134
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Lin Chen
 Attachments: DIRKRB-134_v1.patch, wrapper.conf, wrapper.stop.conf


 This is for having installation packaging and service wrapper for the KDC 
 server. We can borrow the existing artifacts from Directory Server.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-134) Installation packaging and service wrapper

2015-01-27 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-134?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14293202#comment-14293202
 ] 

Kai Zheng commented on DIRKRB-134:
--

Sounds great !

 Installation packaging and service wrapper
 --

 Key: DIRKRB-134
 URL: https://issues.apache.org/jira/browse/DIRKRB-134
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Lin Chen

 This is for having installation packaging and service wrapper for the KDC 
 server. We can borrow the existing artifacts from Directory Server.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (DIRKRB-155) Add the missing Javadoc for kerby-asn1 module

2015-01-26 Thread Kai Zheng (JIRA)
Kai Zheng created DIRKRB-155:


 Summary: Add the missing Javadoc for kerby-asn1 module
 Key: DIRKRB-155
 URL: https://issues.apache.org/jira/browse/DIRKRB-155
 Project: Directory Kerberos
  Issue Type: Task
Reporter: Kai Zheng
Assignee: Kai Zheng


Let me add the missing Javadocs for kerby-asn1 module when have some trivial 
time.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (DIRKRB-118) Get rid of the external dependency to not-so-commons-ssl library

2015-01-25 Thread Kai Zheng (JIRA)

[ 
https://issues.apache.org/jira/browse/DIRKRB-118?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14291020#comment-14291020
 ] 

Kai Zheng commented on DIRKRB-118:
--

commit 0e835cdcaf717cc881c1920543272c38efbe75fe
Author: Drankye dran...@gmail.com
Date:   Sun Jan 25 16:53:32 2015 +0800

Removed http related from not-commons-ssl library

commit bc5c276eec622e36c3a0dc340692834ff13da8fe
Author: Drankye dran...@gmail.com
Date:   Mon Jan 26 00:43:39 2015 +0800

Clean up not-commons-ssl library, removing many unwanted and not much 
relevant


 Get rid of the external dependency to not-so-commons-ssl library
 

 Key: DIRKRB-118
 URL: https://issues.apache.org/jira/browse/DIRKRB-118
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Kai Zheng

 We need to remove the external dependency to not-so-commons-library in order 
 to avoid better maintain and any license concerns.
 Currently the library was used to load private keys from related openSSL 
 keystores or formats.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Resolved] (DIRKRB-118) Get rid of the external dependency to not-so-commons-ssl library

2015-01-25 Thread Kai Zheng (JIRA)

 [ 
https://issues.apache.org/jira/browse/DIRKRB-118?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai Zheng resolved DIRKRB-118.
--
Resolution: Fixed

 Get rid of the external dependency to not-so-commons-ssl library
 

 Key: DIRKRB-118
 URL: https://issues.apache.org/jira/browse/DIRKRB-118
 Project: Directory Kerberos
  Issue Type: Sub-task
Reporter: Kai Zheng
Assignee: Kai Zheng

 We need to remove the external dependency to not-so-commons-library in order 
 to avoid better maintain and any license concerns.
 Currently the library was used to load private keys from related openSSL 
 keystores or formats.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


<    1   2   3   4   5   6   7   8   >