Generic Security Service Application Program Interface (GSS-API) Authentication and Key Exchange for the Secure Shell (SSH) Protocol
draft-ietf-secsh-gsskeyex-10
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
10 | (System) | post-migration administrative database adjustment to the Yes position for Sam Hartman |
2005-09-11
|
10 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2005-09-06
|
10 | Amy Vezza | IESG state changed to Approved-announcement sent |
2005-09-06
|
10 | Amy Vezza | IESG has approved the document |
2005-09-06
|
10 | Amy Vezza | Closed "Approve" ballot |
2005-09-02
|
10 | (System) | Removed from agenda for telechat - 2005-09-01 |
2005-09-01
|
10 | Amy Vezza | State Changes to Approved-announcement to be sent from IESG Evaluation by Amy Vezza |
2005-09-01
|
10 | Sam Hartman | [Ballot Position Update] Position for Sam Hartman has been changed to Yes from No Objection by Sam Hartman |
2005-09-01
|
10 | Sam Hartman | [Ballot Position Update] Position for Sam Hartman has been changed to No Objection from Discuss by Sam Hartman |
2005-09-01
|
10 | Michelle Cotton | IANA Comments: Upon approval of this document the IANA will proceed with the following actions: REGISTER 2 Key Exchange Method Names RESERVE 1 Key Exchange … IANA Comments: Upon approval of this document the IANA will proceed with the following actions: REGISTER 2 Key Exchange Method Names RESERVE 1 Key Exchange Method Name REGSITER 1 Public Key Algorithm Name REGSITER 2 Authentication Method Names RESERVE 2 Authentication Method Names These registrations will all go in the registries found at the following: http://www.iana.org/assignments/ssh-parameters |
2005-09-01
|
10 | Sam Hartman | [Ballot discuss] Holding a discuss for IANA. |
2005-09-01
|
10 | Sam Hartman | [Ballot Position Update] Position for Sam Hartman has been changed to Discuss from Yes by Sam Hartman |
2005-09-01
|
10 | (System) | [Ballot Position Update] New position, No Objection, has been recorded for Jon Peterson by IESG Secretary |
2005-09-01
|
10 | (System) | [Ballot Position Update] New position, No Objection, has been recorded for Allison Mankin by IESG Secretary |
2005-09-01
|
10 | (System) | [Ballot Position Update] New position, No Objection, has been recorded for Bill Fenner by IESG Secretary |
2005-09-01
|
10 | Alex Zinin | [Ballot Position Update] New position, No Objection, has been recorded for Alex Zinin by Alex Zinin |
2005-09-01
|
10 | Mark Townsley | [Ballot Position Update] New position, No Objection, has been recorded for Mark Townsley by Mark Townsley |
2005-09-01
|
10 | Bert Wijnen | [Ballot Position Update] New position, No Objection, has been recorded for Bert Wijnen by Bert Wijnen |
2005-09-01
|
10 | David Kessens | [Ballot Position Update] New position, No Objection, has been recorded for David Kessens by David Kessens |
2005-08-31
|
10 | Ted Hardie | [Ballot Position Update] New position, No Objection, has been recorded for Ted Hardie by Ted Hardie |
2005-08-31
|
10 | Brian Carpenter | [Ballot Position Update] Position for Brian Carpenter has been changed to No Objection from Undefined by Brian Carpenter |
2005-08-31
|
10 | Brian Carpenter | [Ballot comment] Needs a sentence added in section 3.2 indicating that UTF-8 normalization of names occurs at the authorizing server and outside the scope of … [Ballot comment] Needs a sentence added in section 3.2 indicating that UTF-8 normalization of names occurs at the authorizing server and outside the scope of SSH. Original comment from review by David Black: I found one nit that needs attention. Section 3.2 of the draft uses UTF-8 for a "user name" string but doesn't say what the applicable Unicode character usage and normalization (stringprep) requirements are. I believe that this problem is already addressed via use of the SASL stringprep profile in the SSH-USERAUTH draft, so a sentence pointing out the (obvious) fact that "user name" is an SSH user name, and hence is subject to the SSH-USERAUTH draft's requirements on SSH user names, including appropriate use of stringprep should suffice. Clarification by Bill Sommerfeld: The client prepares the username in UTF-8 format without need for any normalization. The server (which is a client of the notional user account database) applies the stringprep or other canonicalization required to match the encoding conventions of that database. Comment by Jeff Hutzleman after dialogue with Sam: My main concern is that we not encourage ssh server implementations to normalize usernames passed to the OS in a way that is incompatible with how the OS treats usernames. |
2005-08-31
|
10 | Brian Carpenter | [Ballot Position Update] New position, Undefined, has been recorded for Brian Carpenter by Brian Carpenter |
2005-08-30
|
10 | Margaret Cullen | [Ballot Position Update] New position, No Objection, has been recorded for Margaret Wasserman by Margaret Wasserman |
2005-08-29
|
10 | Russ Housley | [Ballot comment] Since Base64 Encoding is used, but all of MIME is not used, it is probably better to replace [MIME] with a reference … [Ballot comment] Since Base64 Encoding is used, but all of MIME is not used, it is probably better to replace [MIME] with a reference to RFC 3548. Please delete section 11 prior to publication as an RFC. |
2005-08-29
|
10 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded for Russ Housley by Russ Housley |
2005-08-29
|
10 | Scott Hollenbeck | [Ballot Position Update] New position, No Objection, has been recorded for Scott Hollenbeck by Scott Hollenbeck |
2005-08-27
|
10 | Sam Hartman | During last call, one significant issue was raised. There was a concern that the spec is silent on what to do if the hostname is … During last call, one significant issue was raised. There was a concern that the spec is silent on what to do if the hostname is unknown or cannot be determined. After discussion on the working group list, this issue is addressed with the included rfc-editor note. |
2005-08-27
|
10 | Sam Hartman | State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Sam Hartman |
2005-08-27
|
10 | Sam Hartman | [Ballot Position Update] New position, Yes, has been recorded for Sam Hartman |
2005-08-27
|
10 | Sam Hartman | Ballot has been issued by Sam Hartman |
2005-08-27
|
10 | Sam Hartman | Created "Approve" ballot |
2005-08-27
|
10 | Sam Hartman | [Note]: 'Proto Shepherd: sommerfeld@sun.com' added by Sam Hartman |
2005-08-27
|
10 | Sam Hartman | State Changes to Waiting for AD Go-Ahead from Waiting for Writeup by Sam Hartman |
2005-08-24
|
10 | Sam Hartman | Placed on agenda for telechat - 2005-09-01 by Sam Hartman |
2005-08-23
|
10 | (System) | State has been changed to Waiting for Writeup from In Last Call by system |
2005-08-23
|
10 | (System) | New version available: draft-ietf-secsh-gsskeyex-10.txt |
2005-08-09
|
10 | Amy Vezza | Last call sent |
2005-08-09
|
10 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2005-08-08
|
10 | Sam Hartman | Last Call was requested by Sam Hartman |
2005-08-08
|
10 | Sam Hartman | State Changes to Last Call Requested from AD Evaluation by Sam Hartman |
2005-08-08
|
10 | (System) | Ballot writeup text was added |
2005-08-08
|
10 | (System) | Last call text was added |
2005-08-08
|
10 | (System) | Ballot approval text was added |
2005-08-08
|
10 | Sam Hartman | 1.a) Have the chairs personally reviewed this version of the Internet Draft (ID), and in particular, do they believe this … 1.a) Have the chairs personally reviewed this version of the Internet Draft (ID), and in particular, do they believe this ID is ready to forward to the IESG for publication? Yes. 1.b) Has the document had adequate review from both key WG members and key non-WG members? Do you have any concerns about the depth or breadth of the reviews that have been performed? The document has been reviewed by implementors in the WG; members of the IETF GSSAPI community have come to this WG to review the work. 1.c) Do you have concerns that the document needs more review from a particular (broader) perspective (e.g., security, operational complexity, someone familiar with AAA, etc.)? No. 1.d) Do you have any specific concerns/issues with this document that you believe the ADs and/or IESG should be aware of? For example, perhaps you are uncomfortable with certain parts of the document, or have concerns whether there really is a need for it. In any event, if your issues have been discussed in the WG and the WG has indicated it that it still wishes to advance the document, detail those concerns in the write-up. No. 1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The document is of interest to a subset of the WG and the ssh-using community but that subset is solidly behind it. 1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email to the Responsible Area Director. No. 1.g) Have the chairs verified that the document adheres to all of the ID nits? (see http://www.ietf.org/ID-Checklist.html). Some nits were discovered (references in the abstract and a typo); a -10 version should surface shortly to address them. 1.h) Is the document split into normative and informative references? Are there normative references to IDs, where the IDs are not also ready for advancement or are otherwise in an unclear state? (note here that the RFC editor will not publish an RFC with normative references to IDs, it will delay publication until all such IDs are also ready for publication as RFCs.) References are split. All referenced ID's are either in the RFC Editor Queue or before the IESG already. 1.ijk) For Standards Track and BCP documents, the IESG approval announcement includes a write-up section with the following sections: * Technical Summary This document describes an extension to the Secure Shell protocol allowing the use of GSSAPI security services for authentication and key exchange. * Working Group Summary There was smooth consensus in the working group to publish this as a Proposed Standard * Protocol Quality The WG chair is aware of multiple interoperable implementations. |
2005-08-08
|
10 | Sam Hartman | Draft Added by Sam Hartman in state AD Evaluation |
2005-05-09
|
09 | (System) | New version available: draft-ietf-secsh-gsskeyex-09.txt |
2004-07-20
|
08 | (System) | New version available: draft-ietf-secsh-gsskeyex-08.txt |
2003-09-23
|
07 | (System) | New version available: draft-ietf-secsh-gsskeyex-07.txt |
2003-03-06
|
06 | (System) | New version available: draft-ietf-secsh-gsskeyex-06.txt |
2002-11-06
|
05 | (System) | New version available: draft-ietf-secsh-gsskeyex-05.txt |
2002-07-23
|
04 | (System) | New version available: draft-ietf-secsh-gsskeyex-04.txt |
2002-01-15
|
03 | (System) | New version available: draft-ietf-secsh-gsskeyex-03.txt |
2001-07-25
|
02 | (System) | New version available: draft-ietf-secsh-gsskeyex-02.txt |
2001-03-06
|
01 | (System) | New version available: draft-ietf-secsh-gsskeyex-01.txt |
2001-01-18
|
00 | (System) | New version available: draft-ietf-secsh-gsskeyex-00.txt |