Skip to main content

The Kerberos V5 ("GSSAPI") Simple Authentication and Security Layer (SASL) Mechanism
draft-ietf-sasl-gssapi-08

Revision differences

Document history

Date Rev. By Action
2006-11-08
08 (System) Request for Early review by SECDIR Completed. Reviewer: Catherine Meadows.
2006-09-24
08 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2006-09-18
08 Amy Vezza IESG state changed to Approved-announcement sent
2006-09-18
08 Amy Vezza IESG has approved the document
2006-09-18
08 Amy Vezza Closed "Approve" ballot
2006-09-15
08 Yoshiko Fong
IANA Evaluation Comments:

Upon approval of this document, the IANA will make the following changes
in the "SIMPLE AUTHENTICATION AND SECURITY LAYER (SASL) MECHANISMS"
registry …
IANA Evaluation Comments:

Upon approval of this document, the IANA will make the following changes
in the "SIMPLE AUTHENTICATION AND SECURITY LAYER (SASL) MECHANISMS"
registry located at
http://www.iana.org/assignments/sasl-mechanisms

Old:
MECHANISMS USAGE REFERENCE OWNER
---------- ----- --------- -----
GSSAPI COMMON [RFC2222] IESG


New:
MECHANISMS USAGE REFERENCE OWNER
---------- ----- --------- -----
GSSAPI COMMON [RFC-sasl-gssapi] IESG

We understand the above to be the only IANA Actions for this document.
2006-09-15
08 (System) Removed from agenda for telechat - 2006-09-14
2006-09-14
08 Amy Vezza State Changes to Approved-announcement to be sent from IESG Evaluation by Amy Vezza
2006-09-14
08 Lisa Dusseault [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault
2006-09-14
08 Amy Vezza State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Amy Vezza
2006-09-14
08 Jon Peterson [Ballot Position Update] New position, No Objection, has been recorded by Jon Peterson
2006-09-14
08 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko
2006-09-13
08 David Kessens [Ballot Position Update] New position, No Objection, has been recorded by David Kessens
2006-09-13
08 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2006-09-13
08 Bill Fenner [Ballot Position Update] New position, No Objection, has been recorded by Bill Fenner
2006-09-13
08 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley
2006-09-13
08 Mark Townsley [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley
2006-09-12
08 Ted Hardie [Ballot Position Update] New position, No Objection, has been recorded by Ted Hardie
2006-09-12
08 Magnus Westerlund [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund
2006-09-12
08 Cullen Jennings [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings
2006-09-12
08 Lars Eggert
[Ballot comment]
Section 1., paragraph 1:
>    The key words "MUST", "MUST NOT", "SHOULD", "SHOULD NOT", and "MAY"
>    in this document are …
[Ballot comment]
Section 1., paragraph 1:
>    The key words "MUST", "MUST NOT", "SHOULD", "SHOULD NOT", and "MAY"
>    in this document are to be interpreted as defined in "Key words for
>    use in RFCs to Indicate Requirement Levels" [KEYWORDS].

  Nit: is not the required boilerplate.
2006-09-12
08 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert
2006-09-11
08 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2006-09-11
08 Brian Carpenter [Ballot Position Update] New position, No Objection, has been recorded by Brian Carpenter
2006-09-10
08 Dan Romascanu
[Ballot comment]
As this document replaces section 7.2 of RFC 2222, and together with RFC 4422, obsoletes RFC 2222 in its entirety, the …
[Ballot comment]
As this document replaces section 7.2 of RFC 2222, and together with RFC 4422, obsoletes RFC 2222 in its entirety, the header of the document should mention 'Obsoletes RFC 2222' when approved.
2006-09-10
08 Sam Hartman [Ballot Position Update] New position, Yes, has been recorded for Sam Hartman
2006-09-10
08 Sam Hartman Ballot has been issued by Sam Hartman
2006-09-10
08 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu
2006-09-10
08 Dan Romascanu
[Ballot comment]
As yhis document replaces section 7.2 of RFC 2222, the definition of the "GSSAPI" SASL mechanism, the header of the document should …
[Ballot comment]
As yhis document replaces section 7.2 of RFC 2222, the definition of the "GSSAPI" SASL mechanism, the header of the document should mention 'Updates RFC 2222' when approved.
2006-09-10
08 Dan Romascanu Created "Approve" ballot
2006-09-07
08 Sam Hartman Placed on agenda for telechat - 2006-09-14 by Sam Hartman
2006-09-05
08 (System) New version available: draft-ietf-sasl-gssapi-08.txt
2006-08-28
08 Amy Vezza Last call sent
2006-08-28
08 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2006-08-28
08 Sam Hartman Last Call was requested by Sam Hartman
2006-08-28
08 Sam Hartman State Changes to Last Call Requested from AD Evaluation::AD Followup by Sam Hartman
2006-08-28
08 (System) Ballot writeup text was added
2006-08-28
08 (System) Last call text was added
2006-08-28
08 (System) Ballot approval text was added
2006-08-25
08 (System) Sub state has been changed to AD Follow up from New Id Needed
2006-08-25
07 (System) New version available: draft-ietf-sasl-gssapi-07.txt
2006-07-29
08 Sam Hartman State Changes to AD Evaluation::Revised ID Needed from Publication Requested by Sam Hartman
2006-06-30
08 Dinara Suleymanova
PROTO Write-up

1.a) Have the chairs personally reviewed this version of the Internet
Draft (ID), and in particular, do they believe this ID is ready …
PROTO Write-up

1.a) Have the chairs personally reviewed this version of the Internet
Draft (ID), and in particular, do they believe this ID is ready
to forward to the IESG for publication? Which chair is the WG
Chair Shepherd for this document?

Yes and yes. Kurt.

1.b) Has the document had adequate review from both key WG members
and key non-WG members? Do you have any concerns about the
depth or breadth of the reviews that have been performed?

Key members of the WG did review this draft.

The depth and breadth of the WG review to met the minimal level
necessary for progression, and hence have some concerns in this
area. Additional review, especially from the GSS-API and Kerberos
communities, is desirable. Recommend the draft be submitted to
the Security Directorate for review and that review be assigned to
individuals who are detailed understanding of GSS-API and Kerberos.

1.c) Do you have concerns that the document needs more review from a
particular (broader) perspective (e.g., security, operational
complexity, someone familiar with AAA, internationalization,
XML, etc.)?

In addition to the reviews recommended in 1.b, a gen-art review is
recommended.

1.d) Do you have any specific concerns/issues with this document that
you believe the ADs and/or IESG should be aware of? For
example, perhaps you are uncomfortable with certain parts of the
document, or have concerns whether there really is a need for
it. In any event, if your issues have been discussed in the WG
and the WG has indicated it that it still wishes to advance the
document, detail those concerns in the write-up.

No.

1.e) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with
others being silent, or does the WG as a whole understand and
agree with it?

The WG consensus behind this document represents a strong concurrence
of a minority of WG. The majority of this WG runs away and hides
when they hear the terms GSS-API and Kerberos. Approximate half of
the reviewers would not claim to be GSS-API and/or Kerberos experts
(including myself), but were able to provide useful review. As
noted above, the degree of consensus for progression on the
standards track.

1.f) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in
separate email to the Responsible Area Director. (It should be
separate email because this questionnaire will be entered into
the tracker).

No.

1.g) Have the chairs verified that the document checks out against
all the ID nits? (see http://www.ietf.org/ID-Checklist.html).
Boilerplate checks are not enough; this check needs to be
thorough.

Yes.

1.h) Has the document split its references into normative and
informative? Are there normative references to IDs, where the
IDs are not also ready for advancement or are otherwise in an
unclear state? The RFC Editor will not publish an RFC with
normative references to IDs (will delay the publication until
all such IDs are also ready for RFC publicatioin). If the
normative references are behind, what is the strategy for their
completion? On a related matter, are there normative references
that are downward references, as described in BCP 97, RFC 3967
RFC 3967 [RFC3967]? Listing these supports the Area Director in
the Last Call downref procedure specified in RFC 3967.

Yes, No, N/A, No.


1.i) For Standards Track and BCP documents, the IESG approval
announcement includes a write-up section with the following
sections:

Technical Summary

This document provides a revised technical specification for the
the Simple Authentication and Security Layer (SASL) "GSSAPI" mechanism.
It uses the Generic Security Service Application Program Interface
(GSS-API) Kerberos V5 mechanism for authentication and data
security services.

This document replaces section 7.2 of RFC 2222, the previous
"GSSAPI" technical specification.


Working Group Summary

This document is a work item of the SASL working group. The working
group came to consensus on this document. There were comments
received during WG Last Call, and these have been addressed in this
revision.


Protocol Quality

The document was reviewed for the IESG by Sam Hartman.
2006-06-14
08 Dinara Suleymanova Draft Added by Dinara Suleymanova in state Publication Requested
2006-06-12
06 (System) New version available: draft-ietf-sasl-gssapi-06.txt
2006-05-31
05 (System) New version available: draft-ietf-sasl-gssapi-05.txt
2006-02-13
04 (System) New version available: draft-ietf-sasl-gssapi-04.txt
2005-09-06
03 (System) New version available: draft-ietf-sasl-gssapi-03.txt
2005-03-30
02 (System) New version available: draft-ietf-sasl-gssapi-02.txt
2004-06-28
01 (System) New version available: draft-ietf-sasl-gssapi-01.txt
2003-11-25
00 (System) New version available: draft-ietf-sasl-gssapi-00.txt