Kerberos Service Discovery using DNS
draft-ietf-kitten-krb-service-discovery-00

Document Type Expired Internet-Draft (kitten WG)
Last updated 2017-08-13 (latest revision 2017-02-09)
Replaces draft-mccallum-kitten-krb-service-discovery
Stream IETF
Intended RFC status (None)
Formats
Expired & archived
plain text pdf html bibtex
Stream WG state WG Document
Document shepherd No shepherd assigned
IESG IESG state Expired
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-ietf-kitten-krb-service-discovery-00.txt

Abstract

This document proposes defines a new mechanism for discovering Kerberos services using DNS. This new mechanism extends the mechanism already defined in Kerberos V5 [RFC4120] and has four goals. First, reduce the number of DNS queries required to discover a Kerberos KDC. Second, provide DNS administrators more control over client behavior. Third, provide support for discovery of the MS- KKDCP transport. Fourth, define a discovery procedure for Kerberos password services.

Authors

Nathaniel McCallum (npmccallum@redhat.com)
Matt Rogers (mrogers@redhat.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)