Return-Path: Delivered-To: apmail-directory-dev-archive@www.apache.org Received: (qmail 56268 invoked from network); 23 Sep 2007 04:12:22 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.2) by minotaur.apache.org with SMTP; 23 Sep 2007 04:12:22 -0000 Received: (qmail 88039 invoked by uid 500); 23 Sep 2007 04:12:13 -0000 Delivered-To: apmail-directory-dev-archive@directory.apache.org Received: (qmail 88005 invoked by uid 500); 23 Sep 2007 04:12:13 -0000 Mailing-List: contact dev-help@directory.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: "Apache Directory Developers List" Delivered-To: mailing list dev@directory.apache.org Received: (qmail 87990 invoked by uid 99); 23 Sep 2007 04:12:13 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Sat, 22 Sep 2007 21:12:13 -0700 X-ASF-Spam-Status: No, hits=2.0 required=10.0 tests=HTML_MESSAGE,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (athena.apache.org: domain of akarasulu@gmail.com designates 209.85.146.180 as permitted sender) Received: from [209.85.146.180] (HELO wa-out-1112.google.com) (209.85.146.180) by apache.org (qpsmtpd/0.29) with ESMTP; Sun, 23 Sep 2007 04:12:14 +0000 Received: by wa-out-1112.google.com with SMTP id m38so1778713waf for ; Sat, 22 Sep 2007 21:11:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:message-id:date:from:sender:to:subject:in-reply-to:mime-version:content-type:references:x-google-sender-auth; bh=ttlBat2U2SHli6ym+qFntxe5snxzH0CjBtFm+RV5ITc=; b=WmkW83VfjkLlPskvHHBL3d5Ew/iyd7rzrPoPFhHzRrXb+ZKPt+hxC/LMStFgukVA/LBnSWGBQLZy7dj7j2Nfqx84KSstkGmzu3rzxmgdQkZl0DT7EiBJpf/99heEB4qup8oXgaavi3LNYyPSHeZxvq6b1Q3hUvK+kDksxpYJrVQ= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:message-id:date:from:sender:to:subject:in-reply-to:mime-version:content-type:references:x-google-sender-auth; b=jFncvyDtleQw2OzILBR7Ou/14+ovGb6nJH2sZHtN3B2fEpfb9l7oamor19F3ZX4AqBqz65cbPvJLyAfAbQTNI7nHfOG6xzOI105mdYOOeA0M6A38TdrQwj9QEftYHhuyuhLwAqivGm6f6zdI0/2Ggbdr4VXZ+/Fwh4d375FilJE= Received: by 10.115.32.1 with SMTP id k1mr1748502waj.1190520713405; Sat, 22 Sep 2007 21:11:53 -0700 (PDT) Received: by 10.115.76.8 with HTTP; Sat, 22 Sep 2007 21:11:53 -0700 (PDT) Message-ID: Date: Sun, 23 Sep 2007 00:11:53 -0400 From: "Alex Karasulu" Sender: akarasulu@gmail.com To: "Apache Directory Developers List" , erodriguez@apache.org Subject: Re: [Kerberos] PKINIT support In-Reply-To: <568753d90709221747l57bf206g73b15a298d94376@mail.gmail.com> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_Part_35915_2942075.1190520713400" References: <568753d90709221747l57bf206g73b15a298d94376@mail.gmail.com> X-Google-Sender-Auth: c61a64d2b4cf037b X-Virus-Checked: Checked by ClamAV on apache.org ------=_Part_35915_2942075.1190520713400 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Content-Disposition: inline IMO if you have some time you might want to start work on some developer documentation on DNS as well as a user's guide so we can attract more committers while answering user questions around DNS. Just this week someone asked about this on the users list and all they heard were crickets. Emmanuel had to sit there and tell the guy that we cannot support him and its an embarrassment for us. He had to apologize for your actions. That's not cool. Although I want to see you make strides on adding new features to Kerberos I think it's a bit irresponsible for you to get back into new features without documenting others that you added in the past. You just can't do that while you leave the DNS situation in a poor state. Do you understand the point I'm trying to make here? Do you see some merit in what I am saying from a community perspective? I'm trying to get you to understand where we're coming from and not think this is at all any means to lessen your value. We really like the technical things you do but a community is not just about the code. It's antithetical to OS culture to just drop code or features into some project and leave. You have to take care of the users, the developers that come after you so the project is alive rather than being an inanimate piece of code. By suggesting this new feature addition before taking care of your inherent responsibilities to the community clearly shows that you're not thinking about these aspects. This is why I'm going to just say no for now. Secondly with respect to technical matters how does this impact what we have in Triplesec with HOTP? Is this another SAM type for the kerberos server which uses the class loading scheme we already have in place for verifiers? Alex On 9/22/07, Enrique Rodriguez wrote: > > Hi, Directory developers, > > I have a window with no major deadlines for the next few weeks, so I > looked into adding 1 new Kerberos feature for the next release. After > doing some "due diligence," ie reading the relevant specs and > reviewing what support I need from the JDK and various libraries, I am > highly confident I can add PKINIT support for 1.5.2. > > PKINIT is a pre-authentication type for Kerberos (detailed in RFC > 4556). For those not familiar, PKINIT can be quickly summarized as > "smartcard authentication for Kerberos, replacing the > username/password." PKINIT can also work with a local keypair, so > there isn't a requirement for hardware like an actual smartcard, > though that is the intended deployment scenario. > > Since this is only a new pre-authentication verifier, I would rather > not branch and instead develop this, at first, in my sandbox. I have > time starting this weekend, so I'd like to start to get code > committed, to back the code up. > > Enrique > ------=_Part_35915_2942075.1190520713400 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Content-Disposition: inline IMO if you have some time you might want to start work on some developer documentation
on DNS as well as a user's guide so we can attract more committers while answering user
questions around DNS. 

Just this week someone asked about this on the users list and all they heard were crickets.
Emmanuel had to sit there and tell the guy that we cannot support him and its an embarrassment
for us.  He had to apologize for your actions. That's not cool.

Although I want to see you make strides on adding new features to Kerberos I think it's a bit irresponsible
for you to get back into new features without documenting others that you added in the past.
You just can't do that while you leave the DNS situation in a poor state.  Do you understand
the point I'm trying to make here?  Do you see some merit in what I am saying from a community
perspective? I'm trying to get you to understand where we're coming from and not think this is
at all any means to lessen your value.  We really like the technical things you do but a community
is not just about the code.

It's antithetical to OS culture to just drop code or features into some project and leave.  You have
to take care of the users, the developers that come after you so the project is alive rather than being
an inanimate piece of code.  By suggesting this new feature addition before taking care of your
inherent responsibilities to the community clearly shows that you're not thinking about these aspects.
This is why I'm going to just say no for now.

Secondly with respect to technical matters how does this impact what we have in Triplesec
with HOTP?  Is this another SAM type for the kerberos server which uses the class loading
scheme we already have in place for verifiers?

Alex


On 9/22/07, Enrique Rodriguez <enriquer9@gmail.com> wrote:
Hi, Directory developers,

I have a window with no major deadlines for the next few weeks, so I
looked into adding 1 new Kerberos feature for the next release.  After
doing some "due diligence," ie reading the relevant specs and
reviewing what support I need from the JDK and various libraries, I am
highly confident I can add PKINIT support for 1.5.2.

PKINIT is a pre-authentication type for Kerberos (detailed in RFC
4556).  For those not familiar, PKINIT can be quickly summarized as
"smartcard authentication for Kerberos, replacing the
username/password."  PKINIT can also work with a local keypair, so
there isn't a requirement for hardware like an actual smartcard,
though that is the intended deployment scenario.

Since this is only a new pre-authentication verifier, I would rather
not branch and instead develop this, at first, in my sandbox.  I have
time starting this weekend, so I'd like to start to get code
committed, to back the code up.

Enrique

------=_Part_35915_2942075.1190520713400--