Kerberos Service Discovery using DNS
draft-mccallum-kitten-krb-service-discovery-03

Document Type Replaced Internet-Draft (individual)
Last updated 2016-09-23
Replaced by draft-ietf-kitten-krb-service-discovery
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
plain text pdf html bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Replaced by draft-ietf-kitten-krb-service-discovery
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-mccallum-kitten-krb-service-discovery-03.txt

Abstract

This document proposes defines a new mechanism for discovering Kerberos services using DNS. This new mechanism extends the mechanism already defined in Kerberos V5 [RFC4120] and has four goals. First, reduce the number of DNS queries required to discover a Kerberos KDC. Second, provide DNS administrators more control over client behavior. Third, provide support for discovery of the MS- KKDCP transport. Fourth, define a discovery procedure for Kerberos password services.

Authors

Nathaniel McCallum (npmccallum@redhat.com)
Matt Rogers (mrogers@redhat.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)