Skip to main content

Kerberos Service Discovery using DNS
draft-mccallum-kitten-krb-service-discovery-03

Document Type Replaced Internet-Draft (individual)
Expired & archived
Authors Nathaniel McCallum , Matt Rogers
Last updated 2016-09-23
Replaced by draft-ietf-kitten-krb-service-discovery
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Replaced by draft-ietf-kitten-krb-service-discovery
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This document proposes defines a new mechanism for discovering Kerberos services using DNS. This new mechanism extends the mechanism already defined in Kerberos V5 [RFC4120] and has four goals. First, reduce the number of DNS queries required to discover a Kerberos KDC. Second, provide DNS administrators more control over client behavior. Third, provide support for discovery of the MS- KKDCP transport. Fourth, define a discovery procedure for Kerberos password services.

Authors

Nathaniel McCallum
Matt Rogers

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)