<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://k5wiki.test.kerberos.org/wiki?action=history&amp;feed=atom&amp;title=Release_Meeting_Minutes%2F2014-08-19</id>
		<title>Release Meeting Minutes/2014-08-19 - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://k5wiki.test.kerberos.org/wiki?action=history&amp;feed=atom&amp;title=Release_Meeting_Minutes%2F2014-08-19"/>
		<link rel="alternate" type="text/html" href="https://k5wiki.test.kerberos.org/wiki?title=Release_Meeting_Minutes/2014-08-19&amp;action=history"/>
		<updated>2026-05-14T17:25:41Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.4</generator>

	<entry>
		<id>https://k5wiki.test.kerberos.org/wiki?title=Release_Meeting_Minutes/2014-08-19&amp;diff=5378&amp;oldid=prev</id>
		<title>TomYu: New page: {{minutes|2014}}  Will Fiveash, Thomas Hardjono, Ken Hornstein, Greg Hudson, Ben Kaduk, Simo Sorce, Zhanna Tsitkov, Tom Yu  ==Kerberos Day== Kerberos Day 9/17 as part of MIT-KIT conference...</title>
		<link rel="alternate" type="text/html" href="https://k5wiki.test.kerberos.org/wiki?title=Release_Meeting_Minutes/2014-08-19&amp;diff=5378&amp;oldid=prev"/>
				<updated>2014-08-19T20:14:04Z</updated>
		
		<summary type="html">&lt;p&gt;New page: {{minutes|2014}}  Will Fiveash, Thomas Hardjono, Ken Hornstein, Greg Hudson, Ben Kaduk, Simo Sorce, Zhanna Tsitkov, Tom Yu  ==Kerberos Day== Kerberos Day 9/17 as part of MIT-KIT conference...&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{minutes|2014}}&lt;br /&gt;
&lt;br /&gt;
Will Fiveash, Thomas Hardjono, Ken Hornstein, Greg Hudson, Ben Kaduk, Simo Sorce, Zhanna Tsitkov, Tom Yu&lt;br /&gt;
&lt;br /&gt;
==Kerberos Day==&lt;br /&gt;
Kerberos Day 9/17 as part of MIT-KIT conference.  Kerberos ops forum in afternoon.&lt;br /&gt;
&lt;br /&gt;
==PKINIT==&lt;br /&gt;
&lt;br /&gt;
Ken describes three main classes of local changes he's made:&lt;br /&gt;
&lt;br /&gt;
# Specify mapping from cert to principal.  Was matching string inside TL-data, now using string attributes.&lt;br /&gt;
# OCSP checking&lt;br /&gt;
# Setting HW-PREAUTH on some tickets based on cert policy OIDs (e.g. DOD policy OID for smart card or other hardware token)&lt;br /&gt;
&lt;br /&gt;
Servers can check the HW-PREAUTH flag (via local GSSAPI extensions).  Greg mentions that we have talked about split client/server semantics for preauth flags in the KDB.  Ken would like a standard interface for applications to look at ticket flags using GSSAPI.&lt;br /&gt;
&lt;br /&gt;
Ken's KDC principal matching rules are a generalization of existing matching rules in the PKINIT client code.&lt;br /&gt;
&lt;br /&gt;
;Greg: Deny if OCSP unreachable?&lt;br /&gt;
&lt;br /&gt;
;Ken: Local OCSP daemon on KDC host, so not a problem in practice.  (later) Yes, we deny if OCSP server is unreachable.&lt;br /&gt;
&lt;br /&gt;
Greg wonders why not a CRL file.  Ken says it's better for performance to use an OCSP server, due to size and quantity of CRL files.&lt;br /&gt;
&lt;br /&gt;
Greg says a sub-plugin for PKINIT cert-to-principal mappings is a possibility.  Synchronous OCSP check could be OK if the server is local.&lt;br /&gt;
&lt;br /&gt;
==Dynamic client principals==&lt;br /&gt;
&lt;br /&gt;
There is interest in being able to issue tickets based on preauth from an external identity system (e.g. X.509 PKI) without a corresponding client principal name in the database.  This can decrease complications with synchronizing multiple identity stores.  Greg also suggests self-service bootstrapping of client principal entries in the KDC starting from a X.509 cert and PKINIT to talk to kadmind.  We should get more feedback from operators about this idea.&lt;br /&gt;
&lt;br /&gt;
==krb5-1.13==&lt;br /&gt;
&lt;br /&gt;
krb5-1.13-alpha1 probably later this week.  Final release probably second week of October.&lt;/div&gt;</summary>
		<author><name>TomYu</name></author>	</entry>

	</feed>