Skip to main content

Kerberos Service Discovery using DNS
draft-ietf-kitten-krb-service-discovery-00

Document Type Expired Internet-Draft (kitten WG)
Expired & archived
Authors Nathaniel McCallum , Matt Rogers
Last updated 2017-08-13 (Latest revision 2017-02-09)
Replaces draft-mccallum-kitten-krb-service-discovery
RFC stream Internet Engineering Task Force (IETF)
Intended RFC status (None)
Formats
Additional resources Mailing list discussion
Stream WG state WG Document
Document shepherd (None)
IESG IESG state Expired
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This document proposes defines a new mechanism for discovering Kerberos services using DNS. This new mechanism extends the mechanism already defined in Kerberos V5 [RFC4120] and has four goals. First, reduce the number of DNS queries required to discover a Kerberos KDC. Second, provide DNS administrators more control over client behavior. Third, provide support for discovery of the MS- KKDCP transport. Fourth, define a discovery procedure for Kerberos password services.

Authors

Nathaniel McCallum
Matt Rogers

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)