Kerberos Service Discovery using DNS

Document Type Expired Internet-Draft (kitten WG)
Authors Nathaniel McCallum  , Matt Rogers 
Last updated 2017-08-13 (latest revision 2017-02-09)
Replaces draft-mccallum-kitten-krb-service-discovery
Stream Internet Engineering Task Force (IETF)
Intended RFC status (None)
Expired & archived
plain text xml htmlized pdfized bibtex
Stream WG state WG Document
Document shepherd No shepherd assigned
IESG IESG state Expired
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


This document proposes defines a new mechanism for discovering Kerberos services using DNS. This new mechanism extends the mechanism already defined in Kerberos V5 [RFC4120] and has four goals. First, reduce the number of DNS queries required to discover a Kerberos KDC. Second, provide DNS administrators more control over client behavior. Third, provide support for discovery of the MS- KKDCP transport. Fourth, define a discovery procedure for Kerberos password services.


Nathaniel McCallum (
Matt Rogers (

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)