logo_kerberos.gif

Difference between revisions of "Release Meeting Minutes/2014-10-21"

From K5Wiki
Jump to: navigation, search
(New page: {{minutes|2014}} Will Fiveash, Thomas Hardjono, Greg Hudson, Ben Kaduk, Simo Sorce, Tom Yu ==GSS-python== Some discussion about how to handle failure conditions in accept_sec_context th...)
 
(No difference)

Latest revision as of 16:28, 24 October 2014


Will Fiveash, Thomas Hardjono, Greg Hudson, Ben Kaduk, Simo Sorce, Tom Yu

GSS-python

Some discussion about how to handle failure conditions in accept_sec_context that have an error token as output. Exception or error code? Greg doesn't like having two different code paths for dealing with sending output tokens. Tom suggests to check the Java bindings for comparison.

Forward secrecy

Agility? Should we make the AP-REQ protocol multiple round trips? There are concerns with compatibility with existing applications and protocols. Maybe we can make the multiple round trip extension for GSS only? That might also have problems.

How do we configure fallbacks? Opportunistic DH public value sent first by client? Maybe this is too wasteful in some deployments where most of the servers don't support forward secrecy.

Tom would like to promote a design principle to make the defaults produce the most secure configuration reasonably possible in a completely new deployment. There are of course issues with compatibility in existing deployments. Maybe we can resolve some of these by sufficient communication well in advance.

Release

Next release is krb5-1.14, Oct. 2015. We should communicate contribution, etc. deadlines well before... maybe in November this year. Also add this info to roadmap page.