Skip to main content

SPNEGO-based Kerberos and NTLM HTTP Authentication in Microsoft Windows
draft-jaganathan-kerberos-http-01

Revision differences

Document history

Date Rev. By Action
2012-08-22
01 (System) post-migration administrative database adjustment to the No Objection position for Brian Carpenter
2005-12-23
01 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2005-12-20
01 Amy Vezza IESG state changed to Approved-announcement sent
2005-12-20
01 Amy Vezza IESG has approved the document
2005-12-20
01 Amy Vezza Closed "Approve" ballot
2005-12-16
01 (System) Removed from agenda for telechat - 2005-12-15
2005-12-15
01 Amy Vezza State Changes to Approved-announcement to be sent from IESG Evaluation by Amy Vezza
2005-12-15
01 Brian Carpenter [Ballot Position Update] Position for Brian Carpenter has been changed to No Objection from Discuss by Brian Carpenter
2005-12-15
01 Michelle Cotton IANA Comments:
No IANA Considerations section.
We understand this document to have NO IANA Actions.
2005-12-15
01 Allison Mankin
[Ballot comment]
Are HTTP Auth extensions something that should be done in an RFC Ed document?
No objection to this document, but we've done them …
[Ballot comment]
Are HTTP Auth extensions something that should be done in an RFC Ed document?
No objection to this document, but we've done them in the past with significant
review and I thought we might have some policy about such a major HTTP header
2005-12-15
01 Allison Mankin [Ballot Position Update] New position, Undefined, has been recorded for Allison Mankin by Allison Mankin
2005-12-15
01 David Kessens [Ballot Position Update] New position, No Objection, has been recorded for David Kessens by David Kessens
2005-12-14
01 Ted Hardie [Ballot Position Update] New position, No Objection, has been recorded for Ted Hardie by Ted Hardie
2005-12-14
01 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded for Russ Housley by Russ Housley
2005-12-13
01 Sam Hartman [Ballot Position Update] New position, No Objection, has been recorded for Sam Hartman by Sam Hartman
2005-12-13
01 Scott Hollenbeck [Ballot comment]
Shepherding AD evaluation comments are noted in the tracker.
2005-12-13
01 Brian Carpenter [Ballot discuss]
I'd like the word "Microsoft" inserted before the word
"Windows" in the title.
2005-12-13
01 Brian Carpenter [Ballot Position Update] New position, Discuss, has been recorded for Brian Carpenter by Brian Carpenter
2005-11-30
01 Scott Hollenbeck [Ballot Position Update] New position, Yes, has been recorded for Scott Hollenbeck
2005-11-30
01 Scott Hollenbeck Ballot has been issued by Scott Hollenbeck
2005-11-30
01 Scott Hollenbeck Created "Approve" ballot
2005-11-30
01 (System) Ballot writeup text was added
2005-11-30
01 (System) Last call text was added
2005-11-30
01 (System) Ballot approval text was added
2005-11-30
01 Scott Hollenbeck Placed on agenda for telechat - 2005-12-15 by Scott Hollenbeck
2005-11-30
01 Scott Hollenbeck State Changes to IESG Evaluation from AD Evaluation by Scott Hollenbeck
2005-11-29
01 Scott Hollenbeck
Checked with Sam.  His concerns were related to the way this works (or doesn't work well) with proxies.  There's text in the Security Considerations section …
Checked with Sam.  His concerns were related to the way this works (or doesn't work well) with proxies.  There's text in the Security Considerations section that describes the issues, though, so I think the topic is covered well enough for an Informational document.
2005-11-29
01 Scott Hollenbeck
AD evaluation comments:

The title should probably include "Microsoft" before "Windows": "Kerberos-based HTTP Authentication in Microsoft Windows".

The method described appears to be mechanically consistent …
AD evaluation comments:

The title should probably include "Microsoft" before "Windows": "Kerberos-based HTTP Authentication in Microsoft Windows".

The method described appears to be mechanically consistent with the authentication schemes and models described in RFCs 2616 and 2617.

Sam Hartman has also looked at the document.  His analysis: "There are no dragons on the Kerberos side.  It's well understood there and everyone is familiar with how it works."

He did have some concerns about how this fits with the http authentication model, though.  I'm checking with him on that.
2005-11-29
01 Scott Hollenbeck State Changes to AD Evaluation from Publication Requested by Scott Hollenbeck
2005-11-22
01 Scott Hollenbeck [Note]: 'RFC-Editor submission.' added by Scott Hollenbeck
2005-11-22
01 Scott Hollenbeck Draft Added by Scott Hollenbeck in state Publication Requested
2005-07-20
01 (System) New version available: draft-jaganathan-kerberos-http-01.txt
2005-06-24
00 (System) New version available: draft-jaganathan-kerberos-http-00.txt