The Kerberos V5 ("GSSAPI") Simple Authentication and Security Layer (SASL) Mechanism
draft-ietf-sasl-gssapi-08
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2006-11-08
|
08 | (System) | Request for Early review by SECDIR Completed. Reviewer: Catherine Meadows. |
2006-09-24
|
08 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2006-09-18
|
08 | Amy Vezza | IESG state changed to Approved-announcement sent |
2006-09-18
|
08 | Amy Vezza | IESG has approved the document |
2006-09-18
|
08 | Amy Vezza | Closed "Approve" ballot |
2006-09-15
|
08 | Yoshiko Fong | IANA Evaluation Comments: Upon approval of this document, the IANA will make the following changes in the "SIMPLE AUTHENTICATION AND SECURITY LAYER (SASL) MECHANISMS" registry … IANA Evaluation Comments: Upon approval of this document, the IANA will make the following changes in the "SIMPLE AUTHENTICATION AND SECURITY LAYER (SASL) MECHANISMS" registry located at http://www.iana.org/assignments/sasl-mechanisms Old: MECHANISMS USAGE REFERENCE OWNER ---------- ----- --------- ----- GSSAPI COMMON [RFC2222] IESG New: MECHANISMS USAGE REFERENCE OWNER ---------- ----- --------- ----- GSSAPI COMMON [RFC-sasl-gssapi] IESG We understand the above to be the only IANA Actions for this document. |
2006-09-15
|
08 | (System) | Removed from agenda for telechat - 2006-09-14 |
2006-09-14
|
08 | Amy Vezza | State Changes to Approved-announcement to be sent from IESG Evaluation by Amy Vezza |
2006-09-14
|
08 | Lisa Dusseault | [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault |
2006-09-14
|
08 | Amy Vezza | State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Amy Vezza |
2006-09-14
|
08 | Jon Peterson | [Ballot Position Update] New position, No Objection, has been recorded by Jon Peterson |
2006-09-14
|
08 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko |
2006-09-13
|
08 | David Kessens | [Ballot Position Update] New position, No Objection, has been recorded by David Kessens |
2006-09-13
|
08 | Ross Callon | [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon |
2006-09-13
|
08 | Bill Fenner | [Ballot Position Update] New position, No Objection, has been recorded by Bill Fenner |
2006-09-13
|
08 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley |
2006-09-13
|
08 | Mark Townsley | [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley |
2006-09-12
|
08 | Ted Hardie | [Ballot Position Update] New position, No Objection, has been recorded by Ted Hardie |
2006-09-12
|
08 | Magnus Westerlund | [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund |
2006-09-12
|
08 | Cullen Jennings | [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings |
2006-09-12
|
08 | Lars Eggert | [Ballot comment] Section 1., paragraph 1: > The key words "MUST", "MUST NOT", "SHOULD", "SHOULD NOT", and "MAY" > in this document are … [Ballot comment] Section 1., paragraph 1: > The key words "MUST", "MUST NOT", "SHOULD", "SHOULD NOT", and "MAY" > in this document are to be interpreted as defined in "Key words for > use in RFCs to Indicate Requirement Levels" [KEYWORDS]. Nit: is not the required boilerplate. |
2006-09-12
|
08 | Lars Eggert | [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert |
2006-09-11
|
08 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2006-09-11
|
08 | Brian Carpenter | [Ballot Position Update] New position, No Objection, has been recorded by Brian Carpenter |
2006-09-10
|
08 | Dan Romascanu | |
2006-09-10
|
08 | Sam Hartman | [Ballot Position Update] New position, Yes, has been recorded for Sam Hartman |
2006-09-10
|
08 | Sam Hartman | Ballot has been issued by Sam Hartman |
2006-09-10
|
08 | Dan Romascanu | [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu |
2006-09-10
|
08 | Dan Romascanu | [Ballot comment] As yhis document replaces section 7.2 of RFC 2222, the definition of the "GSSAPI" SASL mechanism, the header of the document should … |
2006-09-10
|
08 | Dan Romascanu | Created "Approve" ballot |
2006-09-07
|
08 | Sam Hartman | Placed on agenda for telechat - 2006-09-14 by Sam Hartman |
2006-09-05
|
08 | (System) | New version available: draft-ietf-sasl-gssapi-08.txt |
2006-08-28
|
08 | Amy Vezza | Last call sent |
2006-08-28
|
08 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2006-08-28
|
08 | Sam Hartman | Last Call was requested by Sam Hartman |
2006-08-28
|
08 | Sam Hartman | State Changes to Last Call Requested from AD Evaluation::AD Followup by Sam Hartman |
2006-08-28
|
08 | (System) | Ballot writeup text was added |
2006-08-28
|
08 | (System) | Last call text was added |
2006-08-28
|
08 | (System) | Ballot approval text was added |
2006-08-25
|
08 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2006-08-25
|
07 | (System) | New version available: draft-ietf-sasl-gssapi-07.txt |
2006-07-29
|
08 | Sam Hartman | State Changes to AD Evaluation::Revised ID Needed from Publication Requested by Sam Hartman |
2006-06-30
|
08 | Dinara Suleymanova | PROTO Write-up 1.a) Have the chairs personally reviewed this version of the Internet Draft (ID), and in particular, do they believe this ID is ready … PROTO Write-up 1.a) Have the chairs personally reviewed this version of the Internet Draft (ID), and in particular, do they believe this ID is ready to forward to the IESG for publication? Which chair is the WG Chair Shepherd for this document? Yes and yes. Kurt. 1.b) Has the document had adequate review from both key WG members and key non-WG members? Do you have any concerns about the depth or breadth of the reviews that have been performed? Key members of the WG did review this draft. The depth and breadth of the WG review to met the minimal level necessary for progression, and hence have some concerns in this area. Additional review, especially from the GSS-API and Kerberos communities, is desirable. Recommend the draft be submitted to the Security Directorate for review and that review be assigned to individuals who are detailed understanding of GSS-API and Kerberos. 1.c) Do you have concerns that the document needs more review from a particular (broader) perspective (e.g., security, operational complexity, someone familiar with AAA, internationalization, XML, etc.)? In addition to the reviews recommended in 1.b, a gen-art review is recommended. 1.d) Do you have any specific concerns/issues with this document that you believe the ADs and/or IESG should be aware of? For example, perhaps you are uncomfortable with certain parts of the document, or have concerns whether there really is a need for it. In any event, if your issues have been discussed in the WG and the WG has indicated it that it still wishes to advance the document, detail those concerns in the write-up. No. 1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The WG consensus behind this document represents a strong concurrence of a minority of WG. The majority of this WG runs away and hides when they hear the terms GSS-API and Kerberos. Approximate half of the reviewers would not claim to be GSS-API and/or Kerberos experts (including myself), but were able to provide useful review. As noted above, the degree of consensus for progression on the standards track. 1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email to the Responsible Area Director. (It should be separate email because this questionnaire will be entered into the tracker). No. 1.g) Have the chairs verified that the document checks out against all the ID nits? (see http://www.ietf.org/ID-Checklist.html). Boilerplate checks are not enough; this check needs to be thorough. Yes. 1.h) Has the document split its references into normative and informative? Are there normative references to IDs, where the IDs are not also ready for advancement or are otherwise in an unclear state? The RFC Editor will not publish an RFC with normative references to IDs (will delay the publication until all such IDs are also ready for RFC publicatioin). If the normative references are behind, what is the strategy for their completion? On a related matter, are there normative references that are downward references, as described in BCP 97, RFC 3967 RFC 3967 [RFC3967]? Listing these supports the Area Director in the Last Call downref procedure specified in RFC 3967. Yes, No, N/A, No. 1.i) For Standards Track and BCP documents, the IESG approval announcement includes a write-up section with the following sections: Technical Summary This document provides a revised technical specification for the the Simple Authentication and Security Layer (SASL) "GSSAPI" mechanism. It uses the Generic Security Service Application Program Interface (GSS-API) Kerberos V5 mechanism for authentication and data security services. This document replaces section 7.2 of RFC 2222, the previous "GSSAPI" technical specification. Working Group Summary This document is a work item of the SASL working group. The working group came to consensus on this document. There were comments received during WG Last Call, and these have been addressed in this revision. Protocol Quality The document was reviewed for the IESG by Sam Hartman. |
2006-06-14
|
08 | Dinara Suleymanova | Draft Added by Dinara Suleymanova in state Publication Requested |
2006-06-12
|
06 | (System) | New version available: draft-ietf-sasl-gssapi-06.txt |
2006-05-31
|
05 | (System) | New version available: draft-ietf-sasl-gssapi-05.txt |
2006-02-13
|
04 | (System) | New version available: draft-ietf-sasl-gssapi-04.txt |
2005-09-06
|
03 | (System) | New version available: draft-ietf-sasl-gssapi-03.txt |
2005-03-30
|
02 | (System) | New version available: draft-ietf-sasl-gssapi-02.txt |
2004-06-28
|
01 | (System) | New version available: draft-ietf-sasl-gssapi-01.txt |
2003-11-25
|
00 | (System) | New version available: draft-ietf-sasl-gssapi-00.txt |