Re: [kitten] Review of draft-ietf-kitten-krb-service-discovery-00

Jeffrey Altman <jaltman@secure-endpoints.com> Wed, 22 March 2017 02:04 UTC

Return-Path: <prvs=1254fc8628=jaltman@secure-endpoints.com>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A4600130133 for <kitten@ietfa.amsl.com>; Tue, 21 Mar 2017 19:04:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=secure-endpoints.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RspxXhsLN8Y1 for <kitten@ietfa.amsl.com>; Tue, 21 Mar 2017 19:04:41 -0700 (PDT)
Received: from sequoia-grove.secure-endpoints.com (sequoia-grove.ad.secure-endpoints.com [208.125.0.235]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8213112942F for <kitten@ietf.org>; Tue, 21 Mar 2017 19:04:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=secure-endpoints.com; s=MDaemon; t=1490148258; x=1490753058; i=jaltman@secure-endpoints.com; q=dns/txt; h=VBR-Info:Subject:To: References:From:Openpgp:Organization:Message-ID:Date:User-Agent: MIME-Version:In-Reply-To:Content-Type; bh=TAA32qkQo1UgWnRsgimklk TwW/zn2BOOKNbVNvDhQ50=; b=tNgvfR0UClC4n8+/VKQrsGBSb97GDUywsjI8hJ YqpIJ0982IfoQcneyFsyv5K+Hg1pBObC3zyiRKWGm1ISjT1MZ+x/7r5bawX11zFS Tffksc6Boz9C3ZjauJE6DZxbEPIc7qa5nFISP2AktZd48cU8JapCX8QHrC7RxJkN 6ldAE=
X-MDAV-Result: clean
X-MDAV-Processed: sequoia-grove.secure-endpoints.com, Tue, 21 Mar 2017 22:04:18 -0400
X-Spam-Processed: sequoia-grove.secure-endpoints.com, Tue, 21 Mar 2017 22:04:18 -0400
Received: from [IPv6:2001:470:1f07:f77:71aa:981e:ca22:7768] by secure-endpoints.com (Cipher TLSv1:AES-SHA:256) (MDaemon PRO v16.5.2) with ESMTPSA id md50001298125.msg for <kitten@ietf.org>; Tue, 21 Mar 2017 22:04:17 -0400
VBR-Info: md=secure-endpoints.com; mc=all; mv=vbr.emailcertification.org;
X-MDRemoteIP: 2001:470:1f07:f77:71aa:981e:ca22:7768
X-MDHelo: [IPv6:2001:470:1f07:f77:71aa:981e:ca22:7768]
X-MDArrival-Date: Tue, 21 Mar 2017 22:04:17 -0400
X-Authenticated-Sender: jaltman@secure-endpoints.com
X-Return-Path: prvs=1254fc8628=jaltman@secure-endpoints.com
X-Envelope-From: jaltman@secure-endpoints.com
X-MDaemon-Deliver-To: kitten@ietf.org
X-CAV-Result: clean
To: kitten@ietf.org
References: <x7dzige39sj.fsf@equal-rites.mit.edu> <3FD27BFF-5090-4505-852C-E8766BBAA93B@oxy.edu>
From: Jeffrey Altman <jaltman@secure-endpoints.com>
Openpgp: id=FA444AF197F449B24CF3E699F77A735592B69A04; url=https://pgp.mit.edu
Organization: Secure Endpoints Inc.
Message-ID: <80806829-87b9-5945-24ca-b96144947476@secure-endpoints.com>
Date: Tue, 21 Mar 2017 22:04:13 -0400
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0
MIME-Version: 1.0
In-Reply-To: <3FD27BFF-5090-4505-852C-E8766BBAA93B@oxy.edu>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary="------------ms000106000106080601080301"
Archived-At: <https://mailarchive.ietf.org/arch/msg/kitten/6BIvSJwwhgrON9FGVGCYTMH5a8c>
Subject: Re: [kitten] Review of draft-ietf-kitten-krb-service-discovery-00
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Mar 2017 02:04:44 -0000

On 3/21/2017 4:16 PM, Henry B (Hank) Hotz, CISSP wrote:
> 
>> On Mar 21, 2017, at 8:54 AM, Greg Hudson <ghudson@MIT.EDU> wrote:
>>
>> Section 7 (Kerberos Admin Service Discovery):
>>
>> * There is no standard admin protocol, even a de facto one (well,
>>  Heimdal has some interoperability with MIT krb5).  It doesn't make a
>>  lot of sense to specify a standard discovery protocol when there is no
>>  standard for what is being discovered.  I think we want to leave this
>>  as an implementation-specific aside.
> 
> Mildly disagree. 
> 
> Mainly because there is RFC 6860.

Hi Hank,

I'm confused, what does RFC 6860 "Hiding Transit-Only Networks in OSPF"
have to do with this draft?  Is there a different RFC you are thinking
about?

Jeffrey Altman