From list@netscape.com  Tue Feb  1 21:41:09 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA12965
	for <ldapext-archive@odin.ietf.org>; Tue, 1 Feb 2000 21:41:08 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id SAA26356;
	Tue, 1 Feb 2000 18:36:36 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id SAA15488; Tue, 1 Feb 2000 18:39:51 -0800 (PST)
Resent-Date: Tue, 1 Feb 2000 18:39:51 -0800 (PST)
Message-ID: <3897C2D9.2B1680F8@software.com>
Date: Tue, 01 Feb 2000 21:38:33 -0800
From: sanjay jain <sanjay.jain@software.com>
Organization: Software.Com
X-Mailer: Mozilla 4.5 [en] (WinNT; I)
X-Accept-Language: en
MIME-Version: 1.0
To: ietf-ldapext <ietf-ldapext@netscape.com>
Subject: 'mail' attribute syntax
Content-Type: text/html; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"Vf1T0C.A.uxD.1j5l4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

<!doctype html public "-//w3c//dtd html 4.0 transitional//en">
<html>
could somebody please point me to the description
<br>of 0.9.2342.19200300.100.3.5{256} attribute syntax.
<br>It is 'mail' attribute syntax referred in <A HREF="http://www.alternic.com/drafts/drafts-s-t/draft-smith-ldap-inetorgperson-01.txt">http://www.alternic.com/drafts/drafts-s-t/draft-smith-ldap-inetorgperson-01.txt</A>
<p>thanks
<br>sanjay</html>



From list@netscape.com  Wed Feb  2 02:16:37 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA29212
	for <ldapext-archive@odin.ietf.org>; Wed, 2 Feb 2000 02:16:36 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id XAA13703;
	Tue, 1 Feb 2000 23:11:01 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id XAA14316; Tue, 1 Feb 2000 23:14:16 -0800 (PST)
Resent-Date: Tue, 1 Feb 2000 23:14:16 -0800 (PST)
Message-Id: <3.0.5.32.20000201231834.00926770@pop.walltech.com>
X-Sender: bgreenblatt@pop.walltech.com
X-Mailer: QUALCOMM Windows Eudora Light Version 3.0.5 (32)
Date: Tue, 01 Feb 2000 23:18:34 -0800
To: sanjay jain <sanjay.jain@software.com>,
        ietf-ldapext <ietf-ldapext@netscape.com>
From: Bruce Greenblatt <bgreenblatt@directory-applications.com>
Subject: Re: 'mail' attribute syntax
In-Reply-To: <3897C2D9.2B1680F8@software.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"F2E0H.A.afD.Hl9l4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Whenever you want to find out what an OID is, please check out Harald
Alvestrand's OID Registry.  I notice that it has moved since the last time
I looked anything up there to:

http://www.alvestrand.no/objectid

It indicates that 0.9.2342.19200300 is used in RFC 1274 to define OIDs for
the "Pilot" schema used in the X.500 directory pilot. 

Bruce

At 09:38 PM 2/1/00 -0800, sanjay jain wrote:
>  could somebody please point me to the description 
>of 0.9.2342.19200300.1
>
>
>
>00.3{256attribute ntax. 
> is 'mail'
>attribute
>syntax
>referred
>in
>http://www.alternic.com/drafts/drafts-s-t/draft-smith-ldap-inetorgperson-01
.txt thanks 
>sanjay   
==============================================
Bruce Greenblatt, Ph. D.
Directory Tools and Application Services, Inc.
http://www.directory-applications.com



From list@netscape.com  Wed Feb  2 12:29:25 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA15986
	for <ldapext-archive@odin.ietf.org>; Wed, 2 Feb 2000 12:29:24 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id JAA13674;
	Wed, 2 Feb 2000 09:26:40 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id JAA05720; Wed, 2 Feb 2000 09:28:16 -0800 (PST)
Resent-Date: Wed, 2 Feb 2000 09:28:16 -0800 (PST)
Message-Id: <s89806b9.081@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.2.1
Date: Wed, 02 Feb 2000 10:27:53 -0700
From: "Mark Meredith" <MMEREDIT@novell.com>
To: <paulle@Exchange.Microsoft.com>, <Helmut.Volpers@icn.siemens.de>
Cc: <kurt@boolean.net>, <ietf-ldapext@netscape.com>, <mcs@netscape.com>,
        <pestrong@nortelnetworks.com>
Subject: Re: I-D ACTION:draft-mmeredit-rootdse-vendor-info-00.txt
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="=_98C13539.35546CA5"
Resent-Message-ID: <"QVbryB.A.GZB.vkGm4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

This is a MIME message. If you are reading this text, you may want to 
consider changing to a mail reader or gateway that understands how to 
properly handle MIME multipart messages.

--=_98C13539.35546CA5
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: quoted-printable

I am getting ready to do the second draft for vendor info.

In going over all of the responses I have some questions about the =
supportedFeature, and whether or not I should include it in this draft?

The examples that Helmut asks about at the end: "Supported features: TLS, =
Cram-MD5, schema-publishing, LDAP-ACL, Ldap-replication , etc ??"

I think that these should be specified in their own specific attributes. I =
am afraid that if something like supportedFeatures were present, it could =
become a catch all for every new proposal, it may even get to the point =
that it would be very hard to sift through the information to find what =
you are looking for?

So what does everyone think?  Should I just go forward with the vendorName =
and vendorVersion and let the supportedFeatures be a separate draft if at =
all? Or have all three in this draft?

-Mark


Mark Meredith
Novell Inc
122 E. 1700 S. Provo UT 84606
mark_meredith@novell.com
801-861-2645
---------------------
A boat in the harbor is safe,=20
but that is not what boats are for.
--John A. Shed
---------------------

>>> Helmut Volpers <Helmut.Volpers@icn.siemens.de> 11/21/99 02:47AM >>>
Hi,

> "Paul Leach (Exchange)" schrieb:
>=20
> > -----Original Message-----
> > From: Kurt D. Zeilenga [mailto:kurt@boolean.net]
> > Sent: Friday, November 19, 1999 7:27 AM
> > To: Mark Smith
> > Cc: Peter Strong; Paul Leach (Exchange); Mark Meredith; ietf-ldapext
>=20
> > Subject: Re: I-D ACTION:draft-mmeredit-rootdse-vendor-info-00.txt
> >
> >
> > I'm thinking we just need to define an operational attribute for the
>=20
> > root DSE:
> >
> > supportedFeature
> >
> >    The values of this attribute are OBJECT IDENTIFIERs identifying
> the
> >    supported optional or vendor-defined features which the
> > server supports.
> >
> >     ( supportedFeatureOID NAME 'supportedFeature'
> >      SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 USAGE dSAOperation )
> >
> > The key is that it lists features directly and eliminates the
> > need to maintain out of band feature lists for each vendor version.
>=20
> This sounds fine to me. Having vendor name and version is fine, too,
> as long as it is _explicitly_ declared that it isn't to be used to
> discover features.

I agree that the vendor name (or product name) and version is fine to
find
out with which product and which version I interwork etc. We for example
support=20
RFC 1565 (Network Services Monitoring MIB) where all this information
is already availible and it will not be a problem to make this
information
availible to a ldap-client when it retrieves the Root.
But I hope we will not encourage client implementors to build there
clients
that they derive special features of the product from this information.
For example: we support schema publishing over ldap but if an
administrator
set the access control that  only special users (administrators) can
read
the ldapsubschema-subentry then a client have to live without exploring
the
schema.
>=20
> In addition to the above, shouldn't one look at supported controls,
> and what classes exist, rather than try to categorize everything as a
> "feature"?

Can somebody give me a real example for this feature list ? Is it
something
like:

Supported features: TLS, Cram-MD5, schema-publishing, LDAP-ACL,
Ldap-replication , etc ??

Bye

Helmut

--=_98C13539.35546CA5
Content-Type: text/html; charset=US-ASCII
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD W3 HTML//EN">
<HTML>
<HEAD>

<META content="text/html; charset=iso-8859-1" http-equiv=Content-Type>
<META content='"MSHTML 4.72.3110.7"' name=GENERATOR>
</HEAD>
<BODY bgColor=#ffffff 
style="FONT: 10pt Arial; MARGIN-LEFT: 2px; MARGIN-TOP: 2px">
<DIV>I am getting ready to do the second draft for vendor info.</DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT style="BACKGROUND-COLOR: #ffffff">In going over all of the responses 
I have some questions about the supportedFeature, and whether or not I should 
include it in this draft?</FONT></DIV>
<DIV><FONT style="BACKGROUND-COLOR: #ffffff"></FONT>&nbsp;</DIV>
<DIV><FONT style="BACKGROUND-COLOR: #ffffff">The examples that Helmut asks about 
at the end: &quot;Supported features: TLS, Cram-MD5, schema-publishing, 
LDAP-ACL, Ldap-replication , etc ??&quot;</FONT></DIV>
<DIV><FONT style="BACKGROUND-COLOR: #ffffff"></FONT>&nbsp;</DIV>
<DIV><FONT style="BACKGROUND-COLOR: #ffffff">I think that these should be 
specified in their own specific attributes. I am afraid that if something like 
supportedFeatures were present, it could become a catch all for every new 
proposal, it may even get to the point that it would be very hard to sift 
through the information to find what you are looking for?</FONT></DIV>
<DIV><FONT style="BACKGROUND-COLOR: #ffffff"></FONT>&nbsp;</DIV>
<DIV><FONT style="BACKGROUND-COLOR: #ffffff">So what does everyone think?&nbsp; 
Should I just go forward with the vendorName and vendorVersion and let the 
supportedFeatures be a separate draft if at all? Or have all three in this 
draft?</FONT></DIV>
<DIV><FONT style="BACKGROUND-COLOR: #ffffff"></FONT>&nbsp;</DIV>
<DIV><FONT style="BACKGROUND-COLOR: #ffffff">-Mark<BR></FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV>Mark Meredith<BR>Novell Inc<BR>122 E. 1700 S. Provo UT 84606<BR><A 
href="mailto:mark_meredith@novell.com">mark_meredith@novell.com</A><BR>801-861-2645<BR>---------------------<BR>A 
boat in the harbor is safe, <BR>but that is not what boats are for.<BR>--John A. 
Shed<BR>---------------------<BR><BR>&gt;&gt;&gt; Helmut Volpers 
&lt;Helmut.Volpers@icn.siemens.de&gt; 11/21/99 02:47AM 
&gt;&gt;&gt;<BR>Hi,<BR><BR>&gt; &quot;Paul Leach (Exchange)&quot; 
schrieb:<BR>&gt; <BR>&gt; &gt; -----Original Message-----<BR>&gt; &gt; From: 
Kurt D. Zeilenga [mailto:kurt@boolean.net]<BR>&gt; &gt; Sent: Friday, November 
19, 1999 7:27 AM<BR>&gt; &gt; To: Mark Smith<BR>&gt; &gt; Cc: Peter Strong; Paul 
Leach (Exchange); Mark Meredith; ietf-ldapext<BR>&gt; <BR>&gt; &gt; Subject: Re: 
I-D ACTION:draft-mmeredit-rootdse-vendor-info-00.txt<BR>&gt; &gt;<BR>&gt; 
&gt;<BR>&gt; &gt; I'm thinking we just need to define an operational attribute 
for the<BR>&gt; <BR>&gt; &gt; root DSE:<BR>&gt; &gt;<BR>&gt; &gt; 
supportedFeature<BR>&gt; &gt;<BR>&gt; &gt;&nbsp;&nbsp;&nbsp; The values of this 
attribute are OBJECT IDENTIFIERs identifying<BR>&gt; the<BR>&gt; 
&gt;&nbsp;&nbsp;&nbsp; supported optional or vendor-defined features which 
the<BR>&gt; &gt; server supports.<BR>&gt; &gt;<BR>&gt; 
&gt;&nbsp;&nbsp;&nbsp;&nbsp; ( supportedFeatureOID NAME 
'supportedFeature'<BR>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SYNTAX 
1.3.6.1.4.1.1466.115.121.1.38 USAGE dSAOperation )<BR>&gt; &gt;<BR>&gt; &gt; The 
key is that it lists features directly and eliminates the<BR>&gt; &gt; need to 
maintain out of band feature lists for each vendor version.<BR>&gt; <BR>&gt; 
This sounds fine to me. Having vendor name and version is fine, too,<BR>&gt; as 
long as it is _explicitly_ declared that it isn't to be used to<BR>&gt; discover 
features.<BR><BR>I agree that the vendor name (or product name) and version is 
fine to<BR>find<BR>out with which product and which version I interwork etc. We 
for example<BR>support <BR>RFC 1565 (Network Services Monitoring MIB) where all 
this information<BR>is already availible and it will not be a problem to make 
this<BR>information<BR>availible to a ldap-client when it retrieves the 
Root.<BR>But I hope we will not encourage client implementors to build 
there<BR>clients<BR>that they derive special features of the product from this 
information.<BR>For example: we support schema publishing over ldap but if 
an<BR>administrator<BR>set the access control that&nbsp; only special users 
(administrators) can<BR>read<BR>the ldapsubschema-subentry then a client have to 
live without exploring<BR>the<BR>schema.<BR>&gt; <BR>&gt; In addition to the 
above, shouldn't one look at supported controls,<BR>&gt; and what classes exist, 
rather than try to categorize everything as a<BR>&gt; 
&quot;feature&quot;?<BR><BR>Can somebody give me a real example for this feature 
list ? Is it<BR>something<BR>like:<BR><BR>Supported features: TLS, Cram-MD5, 
schema-publishing, LDAP-ACL,<BR>Ldap-replication , etc 
??<BR><BR>Bye<BR><BR>Helmut</DIV></BODY></HTML>

--=_98C13539.35546CA5--



From list@netscape.com  Wed Feb  2 12:40:32 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA16374
	for <ldapext-archive@odin.ietf.org>; Wed, 2 Feb 2000 12:40:28 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id JAA01553;
	Wed, 2 Feb 2000 09:35:49 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id JAA12709; Wed, 2 Feb 2000 09:39:05 -0800 (PST)
Resent-Date: Wed, 2 Feb 2000 09:39:05 -0800 (PST)
Message-ID: <38986CE9.87FC48F0@us.oracle.com>
Date: Wed, 02 Feb 2000 09:44:09 -0800
From: Lok Sheung <lsheung@us.oracle.com>
Organization: Oracle
X-Mailer: Mozilla 4.06 [en] (WinNT; U)
MIME-Version: 1.0
To: ietf-ldapext@netscape.com
Subject: 'mailGroup' object class
Content-Type: text/html; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"CdSE2C.A.TGD.4uGm4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML>
'mailGroup' is referenced in&nbsp; <A HREF="ftp://playground.sun.com/pub/laser/laser-1999-02-02.txt">ftp://playground.sun.com/pub/laser/laser-1999-02-02.txt</A>.&nbsp;
Can someone point me where I can find the specification for 'mailGroup'?
<P>Thanks
<P>Lok</HTML>



From list@netscape.com  Wed Feb  2 15:13:43 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA20093
	for <ldapext-archive@odin.ietf.org>; Wed, 2 Feb 2000 15:13:42 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id MAA28369;
	Wed, 2 Feb 2000 12:09:06 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id MAA20962; Wed, 2 Feb 2000 12:12:23 -0800 (PST)
Resent-Date: Wed, 2 Feb 2000 12:12:23 -0800 (PST)
Message-ID: <E9BC216C06E3D2118F1A00105AC75B6A9D5493@mail.netpro.com>
From: Gil Kirkpatrick <gilk@netpro.com>
To: "'Mark Meredith'" <MMEREDIT@novell.com>, paulle@Exchange.Microsoft.com,
        Helmut.Volpers@icn.siemens.de
Cc: kurt@boolean.net, ietf-ldapext@netscape.com, mcs@netscape.com,
        pestrong@nortelnetworks.com
Subject: RE: I-D ACTION:draft-mmeredit-rootdse-vendor-info-00.txt
Date: Wed, 2 Feb 2000 13:09:46 -0700 
X-Mailer: Internet Mail Service (5.5.2650.21)
Resent-Message-ID: <"CO_CQC.A.QHF.m-Im4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Mark, I think you're right. The supportedFeature attribute can be a separate
draft. I recommend getting the vendor info stuff done and consider the
supportedFeature attr separately.

-g

Gil Kirkpatrick
Director of Engineering
NetPro

> -----Original Message-----
> From:	Mark Meredith [SMTP:MMEREDIT@novell.com]
> Sent:	Wednesday, February 02, 2000 10:28 AM
> To:	paulle@Exchange.Microsoft.com; Helmut.Volpers@icn.siemens.de
> Cc:	kurt@boolean.net; ietf-ldapext@netscape.com; mcs@netscape.com;
> pestrong@nortelnetworks.com
> Subject:	Re: I-D ACTION:draft-mmeredit-rootdse-vendor-info-00.txt
> 
> I am getting ready to do the second draft for vendor info.
>  
> In going over all of the responses I have some questions about the
> supportedFeature, and whether or not I should include it in this draft?
>  
> The examples that Helmut asks about at the end: "Supported features: TLS,
> Cram-MD5, schema-publishing, LDAP-ACL, Ldap-replication , etc ??"
>  
> I think that these should be specified in their own specific attributes. I
> am afraid that if something like supportedFeatures were present, it could
> become a catch all for every new proposal, it may even get to the point
> that it would be very hard to sift through the information to find what
> you are looking for?
>  
> So what does everyone think?  Should I just go forward with the vendorName
> and vendorVersion and let the supportedFeatures be a separate draft if at
> all? Or have all three in this draft?
>  
> -Mark
> 
>  
> Mark Meredith
> Novell Inc
> 122 E. 1700 S. Provo UT 84606
> mark_meredith@novell.com <mailto:mark_meredith@novell.com>
> 801-861-2645
> ---------------------
> A boat in the harbor is safe, 
> but that is not what boats are for.
> --John A. Shed
> ---------------------
> 
> >>> Helmut Volpers <Helmut.Volpers@icn.siemens.de> 11/21/99 02:47AM >>>
> Hi,
> 
> > "Paul Leach (Exchange)" schrieb:
> > 
> > > -----Original Message-----
> > > From: Kurt D. Zeilenga [mailto:kurt@boolean.net]
> > > Sent: Friday, November 19, 1999 7:27 AM
> > > To: Mark Smith
> > > Cc: Peter Strong; Paul Leach (Exchange); Mark Meredith; ietf-ldapext
> > 
> > > Subject: Re: I-D ACTION:draft-mmeredit-rootdse-vendor-info-00.txt
> > >
> > >
> > > I'm thinking we just need to define an operational attribute for the
> > 
> > > root DSE:
> > >
> > > supportedFeature
> > >
> > >    The values of this attribute are OBJECT IDENTIFIERs identifying
> > the
> > >    supported optional or vendor-defined features which the
> > > server supports.
> > >
> > >     ( supportedFeatureOID NAME 'supportedFeature'
> > >      SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 USAGE dSAOperation )
> > >
> > > The key is that it lists features directly and eliminates the
> > > need to maintain out of band feature lists for each vendor version.
> > 
> > This sounds fine to me. Having vendor name and version is fine, too,
> > as long as it is _explicitly_ declared that it isn't to be used to
> > discover features.
> 
> I agree that the vendor name (or product name) and version is fine to
> find
> out with which product and which version I interwork etc. We for example
> support 
> RFC 1565 (Network Services Monitoring MIB) where all this information
> is already availible and it will not be a problem to make this
> information
> availible to a ldap-client when it retrieves the Root.
> But I hope we will not encourage client implementors to build there
> clients
> that they derive special features of the product from this information.
> For example: we support schema publishing over ldap but if an
> administrator
> set the access control that  only special users (administrators) can
> read
> the ldapsubschema-subentry then a client have to live without exploring
> the
> schema.
> > 
> > In addition to the above, shouldn't one look at supported controls,
> > and what classes exist, rather than try to categorize everything as a
> > "feature"?
> 
> Can somebody give me a real example for this feature list ? Is it
> something
> like:
> 
> Supported features: TLS, Cram-MD5, schema-publishing, LDAP-ACL,
> Ldap-replication , etc ??
> 
> Bye
> 
> Helmut



From list@netscape.com  Wed Feb  2 15:41:16 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA20845
	for <ldapext-archive@odin.ietf.org>; Wed, 2 Feb 2000 15:41:15 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id MAA01989;
	Wed, 2 Feb 2000 12:36:54 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id MAA29429; Wed, 2 Feb 2000 12:40:11 -0800 (PST)
Resent-Date: Wed, 2 Feb 2000 12:40:11 -0800 (PST)
Message-ID: <389895D5.1E86A581@netscape.com>
Date: Wed, 02 Feb 2000 15:38:45 -0500
From: mcs@netscape.com (Mark C Smith)
Organization: Netscape Communications
X-Mailer: Mozilla 4.7 [en] (WinNT; U)
X-Accept-Language: en
MIME-Version: 1.0
To: Gil Kirkpatrick <gilk@netpro.com>
CC: "'Mark Meredith'" <MMEREDIT@novell.com>, paulle@Exchange.Microsoft.com,
        Helmut.Volpers@icn.siemens.de, kurt@boolean.net,
        ietf-ldapext@netscape.com, pestrong@nortelnetworks.com
Subject: Re: I-D ACTION:draft-mmeredit-rootdse-vendor-info-00.txt
References: <E9BC216C06E3D2118F1A00105AC75B6A9D5493@mail.netpro.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"UIQo0.A.jLH.qYJm4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

I agree -- keep your draft focused on the vendor info. stuff.  It will
be easier to make progress if you limit the scope of your document as
much as possible.

For the record, I don't like the idea of a general supportedFeature
attribute (for the reasons Mark M. mentioned).  We already have
supportedExtension, supportedControl, supportedSASLMechanisms and so on,
which are fairly specific and line up clearly with LDAP protocol
extensions.  I'd rather see us add additional specific attributes like
those (if someone can demonstrate a clear need).

-- 
Mark Smith
iPlanet Directory Architect / Sun-Netscape Alliance
My words are my own, not my employer's.   Got LDAP?


Gil Kirkpatrick wrote:
> 
> Mark, I think you're right. The supportedFeature attribute can be a separate
> draft. I recommend getting the vendor info stuff done and consider the
> supportedFeature attr separately.
> 
> -g
> 
> Gil Kirkpatrick
> Director of Engineering
> NetPro
> 
> > -----Original Message-----
> > From: Mark Meredith [SMTP:MMEREDIT@novell.com]
> > Sent: Wednesday, February 02, 2000 10:28 AM
> > To:   paulle@Exchange.Microsoft.com; Helmut.Volpers@icn.siemens.de
> > Cc:   kurt@boolean.net; ietf-ldapext@netscape.com; mcs@netscape.com;
> > pestrong@nortelnetworks.com
> > Subject:      Re: I-D ACTION:draft-mmeredit-rootdse-vendor-info-00.txt
> >
> > I am getting ready to do the second draft for vendor info.
> >
> > In going over all of the responses I have some questions about the
> > supportedFeature, and whether or not I should include it in this draft?
> >
> > The examples that Helmut asks about at the end: "Supported features: TLS,
> > Cram-MD5, schema-publishing, LDAP-ACL, Ldap-replication , etc ??"
> >
> > I think that these should be specified in their own specific attributes. I
> > am afraid that if something like supportedFeatures were present, it could
> > become a catch all for every new proposal, it may even get to the point
> > that it would be very hard to sift through the information to find what
> > you are looking for?
> >
> > So what does everyone think?  Should I just go forward with the vendorName
> > and vendorVersion and let the supportedFeatures be a separate draft if at
> > all? Or have all three in this draft?
> >
> > -Mark
> >
> >
> > Mark Meredith
> > Novell Inc
> > 122 E. 1700 S. Provo UT 84606
> > mark_meredith@novell.com <mailto:mark_meredith@novell.com>
> > 801-861-2645
> > ---------------------
> > A boat in the harbor is safe,
> > but that is not what boats are for.
> > --John A. Shed
> > ---------------------
> >
> > >>> Helmut Volpers <Helmut.Volpers@icn.siemens.de> 11/21/99 02:47AM >>>
> > Hi,
> >
> > > "Paul Leach (Exchange)" schrieb:
> > >
> > > > -----Original Message-----
> > > > From: Kurt D. Zeilenga [mailto:kurt@boolean.net]
> > > > Sent: Friday, November 19, 1999 7:27 AM
> > > > To: Mark Smith
> > > > Cc: Peter Strong; Paul Leach (Exchange); Mark Meredith; ietf-ldapext
> > >
> > > > Subject: Re: I-D ACTION:draft-mmeredit-rootdse-vendor-info-00.txt
> > > >
> > > >
> > > > I'm thinking we just need to define an operational attribute for the
> > >
> > > > root DSE:
> > > >
> > > > supportedFeature
> > > >
> > > >    The values of this attribute are OBJECT IDENTIFIERs identifying
> > > the
> > > >    supported optional or vendor-defined features which the
> > > > server supports.
> > > >
> > > >     ( supportedFeatureOID NAME 'supportedFeature'
> > > >      SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 USAGE dSAOperation )
> > > >
> > > > The key is that it lists features directly and eliminates the
> > > > need to maintain out of band feature lists for each vendor version.
> > >
> > > This sounds fine to me. Having vendor name and version is fine, too,
> > > as long as it is _explicitly_ declared that it isn't to be used to
> > > discover features.
> >
> > I agree that the vendor name (or product name) and version is fine to
> > find
> > out with which product and which version I interwork etc. We for example
> > support
> > RFC 1565 (Network Services Monitoring MIB) where all this information
> > is already availible and it will not be a problem to make this
> > information
> > availible to a ldap-client when it retrieves the Root.
> > But I hope we will not encourage client implementors to build there
> > clients
> > that they derive special features of the product from this information.
> > For example: we support schema publishing over ldap but if an
> > administrator
> > set the access control that  only special users (administrators) can
> > read
> > the ldapsubschema-subentry then a client have to live without exploring
> > the
> > schema.
> > >
> > > In addition to the above, shouldn't one look at supported controls,
> > > and what classes exist, rather than try to categorize everything as a
> > > "feature"?
> >
> > Can somebody give me a real example for this feature list ? Is it
> > something
> > like:
> >
> > Supported features: TLS, Cram-MD5, schema-publishing, LDAP-ACL,
> > Ldap-replication , etc ??
> >
> > Bye
> >
> > Helmut



From list@netscape.com  Fri Feb  4 06:35:26 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA21903
	for <ldapext-archive@odin.ietf.org>; Fri, 4 Feb 2000 06:35:25 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id DAA03149;
	Fri, 4 Feb 2000 03:32:38 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id DAA27352; Fri, 4 Feb 2000 03:34:16 -0800 (PST)
Resent-Date: Fri, 4 Feb 2000 03:34:16 -0800 (PST)
From: zq2qOi7e5@werner.exp-math.uni-essen.de
DATE: 04 Feb 00 6:34:14 AM
Message-ID: <ZF4c1q7Qcp7H2zbI3D>
SUBJECT: ==>=>=> FREE PCS Cell Phone! <=<=<==                                                 lsdkjd3
Apparently-To: <cars@selectmotors.com>
Apparently-To: <jansbolt@aol.com>
Apparently-To: <elitepi@usa.net>
Apparently-To: <penjar@msn.com>
Apparently-To: <steph@gekkonet.com>
Apparently-To: <ietf-nntp-request@academ.com>
Apparently-To: <cars@sai.com>
Apparently-To: <ietf-ldapext@netscape.com>
Apparently-To: <lisl@earthlink.com>
Apparently-To: <jansassie@aol.com>
Apparently-To: <jed842jed@aol.com>
Apparently-To: <ietf-ldapext-request@netscape.com>
Apparently-To: <elitephysq@yahoo.com>
Apparently-To: <penjani@msol.net>
Apparently-To: <steph@exofficio.com>
Apparently-To: <jansantiq@aol.com>
Apparently-To: <cars@myhost.com>
Apparently-To: <bbbacres@mssl.uswest.net>
Apparently-To: <peniza@laker.net>
Apparently-To: <cars@investingsecrets.com>
Apparently-To: <cars@idirect.com>
Apparently-To: <cars@eurosprt.com>
Apparently-To: <liskat@msn.com>
Apparently-To: <jansad@aol.com>
Resent-Message-ID: <"ovUaED.A.1qG.2krm4"@glacier>
To: ietf-ldapext@netscape.com
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

How to get the 1st and ONLY Free PCS Digital Cell Phone with 
NO Long Distance and NO Roaming ANYTIME MINUTES. 
Now Available on the Net! 

Bad credit... No problem. 
You will be notified if you need to make a deposit to activate 
service. 

   That's right! You get a *FREE* PCS Digital Cell Phone. 

   Unprecedented Nationwide, Limited Time Offer!!! 

Your Free Digital Phone includes the following: 
     * Choice of a Samsung model # SCH-2000 or Qualcomm Thin Phone 
       [These phones would cost you over $200.00 at any retail Cellular 
        store - we have no store overhead so you Save money.] 
     * All NEW phones. 
     * No Activation Fee. 
     * No Up-Front Cost. The first bill is within 30 days from date
       received. [ All you pay is sales tax on the phone.] 
     * FREE Long Distance and Roaming. 
     * FREE Caller ID. 
     * FREE Call Waiting. 
     * FREE VoiceMail. 
     * FREE Paging. [Get rid of your pager bill] 
     * FREE First Incoming Minute. 
     * FREE Home Charger. 
     * Lightweight -- 6 oz. 
     * Crystal Clear digital NATIONWIDE* PCS service [USA Only] 
        [Nations BEST Digital Carrier] 
     * Choice of Voice Activation on Samsung model only. 
     * FREE Delivery by UPS within 10-15 working days of approval. 
     * 30 day return policy [restrictions may apply]. 
     * There is no better cell phone Deal on the planet! 

Hi Folks: 

Want or need  a free cell phone? Sure everyone does. 

Nice to have for emergencies. 

Easy to qualify. Just fill out the form below & fax it to us. 
[If you are not approved, you will be notified as to your need for a
deposit] 

TO ORDER and receive your FREE CELL PHONE just print this message 
and fill out the simple application form. Then fax only the 
application to the number below. You should have your new cell phone
within 10-15 business days of "approval." [Not from the time you fax
it.] Sorry, no email orders. 

Is there any question that this is an incredible opportunity?  Apply now
for the best wireless phone service for the new millennium and get your
new, FREE PCS digital cell phone.  You can't lose!!!

Don't pass up this incredible offer! 
Go Ahead And Order Now!

If due to the response to this offer the fax lines are busy please try
again. 

Thanks, 

Bob Waterman
Free Cell Phone Agent


                                     ------- CUT HERE -------

Fax Order Center:  (775) 522-0741

(The fax number IS ACTIVATED...call back immediately!)

PLEASE PRINT or TYPE  CLEARLY & FAX  O N L Y  this application page 
APPLICATION MUST BE COMPLETED OR IT WILL NOT BE PROCESSED. 
No blank fields. 

"VERY CLEARLY" TYPE or WRITE 
YOUR EMAIL ADDRESS HERE:_________________________________ 

NAME 
First:__________________ M.I. ____  Last:__________________________ 

USA 
Address:______________________________________Apt#.___________ 

City:_______________________________ST:________  Zip:_________ 

County:_______________________[NEEDED TO FIND YOUR COVERAGE AREA]

(*No coverage in MT, MS, NC, SC, AK) 

SS#________________________  Date Of Birth:______/_____/___________ 

DL#:__________________________  Exp. Date:_____/_____/_______ 

Home Ph#:(___)_______________[NO PAGER NUMBERS] 

Work Ph#:(____)_____________Ext#:______[NO PAGER NUMBERS] 

Best Time To Call:_________________________ Time Zone:_____________ 

YOUR Business or EMPLOYER Information: 

Check one: ____Self employed  ____Employee 

If Self Employed your business license # ______________ or 
Sales Tax ID #_____________ 

COMPANY NAME:________________________________________________ 

ADDRESS:______________________________________ 

City:_______________________________ST:________  Zip:_________ 

Phone #:______________________ 

Check phone model you want: 

___Samsung model # SCH-2000 ___ Qualcomm Thin Phone 

Calling Plans: Check the one you want.  You can upgrade or downgrade at
any time. 

_____$ 29.99/month for 120 ANYTIME MIN.[over plan per min charge $.35
cents]

_____$ 49.99/month for 400 ANYTIME MIN.[over plan per min charge $.30
cents] 

_____$ 69.99/month for 600 ANYTIME MIN.[over plan per min charge $.25
cents] 

_____$ 99.99/month for 1,000 ANYTIME MIN.[over plan per min charge $.25
cents] 

_____$ 149.99/month for 1,500 ANYTIME MIN.[over plan per min charge $.25
cents] 

Signature: (BW) __________________________________
Date:_____/_____/___________ 

NO UPFRONT MONEY - your first bill within 30 days from receipt of phone.
[2 year Air Time contract]  BW

Authorization for credit check and contract approved by my signature. 

Check your application status by calling 435-508-1156 

Fax Order Center:  (775) 522-0741


                                     ------- CUT HERE -------






=-=-=-=-=-=-=-=-=-=-REMOVE INSTRUCTIONS-=-=-=-=-=-=-=-=
Please follow the instructions below to be removed from our in-house
mailing list.  We will immediately take action to remove you from future
mailings.  Access the website below.  If this service page has been shut
down, it is because someone actually complained about this service!!! If
this is the case, sorry for the inconvenience.
http://sede.aecoc.es%647key=removeremoveindex=ixbtl730iq%403522794361/~joe
b/remove/21268.htm



From list@netscape.com  Fri Feb  4 09:24:58 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA27818
	for <ldapext-archive@odin.ietf.org>; Fri, 4 Feb 2000 09:24:57 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id GAA13988;
	Fri, 4 Feb 2000 06:20:54 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id GAA28558; Fri, 4 Feb 2000 06:22:32 -0800 (PST)
Resent-Date: Fri, 4 Feb 2000 06:22:32 -0800 (PST)
Message-Id: <3.0.3.32.20000204142450.006fb394@mailhome.rdg.opengroup.org>
X-Sender: cjh@mailhome.rdg.opengroup.org
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.3 (32)
Date: Fri, 04 Feb 2000 14:24:50 +0000
To: directory@opengroup.org, ietf-ldapext@netscape.com
From: Chris Harding <c.harding@opengroup.org>
Subject: (c.harding 38467) bug in blits
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"jWigS.A.89G.nCum4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Hi -

It seems a bit surprising that this hasn't come up before. Should we change
BLITS as suggested?

>From: Christopher Oliva <Chris.Oliva@entrust.com>
>To: "'capple@att.com'" <capple@att.com>,
>        "'c.harding@opengroup.org'"
>	 <c.harding@opengroup.org>,
>        "'ludovic.poitou@france.sun.com'"
>	 <ludovic.poitou@france.sun.com>
>Subject: (c.harding 38467) bug in blits
>Date: Thu, 3 Feb 2000 14:26:36 -0500 
>X-Mailer: Internet Mail Service (5.5.2650.21)
>Comments: (c.harding 38467)
>
>Hi,
>
>I have a bug report for the following tests in the BLITS suite:
>
>3.3.2.9.2
>3.3.2.9.3
>3.3.2.9.4
>
>They are testing the ldap server response to a search where no entries match
>the search filter. They require the "noSuchObject" error to be returned. In
>reality, this is not correct. I can tell you that from working with many
>(commercial release) directory products that none of them return this error.
>The correct response from the server is a "success" code with no matching
>search result entries i.e. there will be no matches and the search completes
>successfully.
>
>The reason is in X.500. Clause 10.2.3 of X.511 (1997) says this:
>
>The search request succeeds if the baseObject is located, regardless of
>whether there are any subordinates to return.
>
>Furthermore, noSuchObject is defined as follows in clause 12 of X.511:
>
>noSuchObject - The name supplied does not match the name of any object
>
>Applied to the search operation, this means the base object parameter of the
>search (if it cannot be located) will result in this error.
>
>This is substantiated by the description of how an LDAPResult is constructed
>in RFC 2251 4.1.10.
>
>As a result of this, I think the BLITS test should be changed. I think some
>directory implementations may code the incorrect behaviour into their
>products unless this is changed.
>
>Please let me know what you think.
>
>Chris.
>
>
>

Regards,

Chris
+++++

-------------------------------------------------------------------------
           Chris Harding
  T H E    Directory Program Manager
 O P E N   Apex Plaza, Forbury Road, Reading RG1 1AX, UK
G R O U P  Mailto:c.harding@opengroup.org   Ph: +44 118 950 8311 x2262
           WWW: http://www.opengroup.org    Fx: +44 118 950 0110  

OSF/1, Motif, UNIX and the "X" device are registered trademarks in
the US and other countries, and IT DialTone and The Open Group are
trademarks of The Open Group.
-------------------------------------------------------------------------



From list@netscape.com  Fri Feb  4 10:03:34 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA29293
	for <ldapext-archive@odin.ietf.org>; Fri, 4 Feb 2000 10:03:34 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id HAA18982;
	Fri, 4 Feb 2000 07:00:51 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id HAA12016; Fri, 4 Feb 2000 07:02:29 -0800 (PST)
Resent-Date: Fri, 4 Feb 2000 07:02:29 -0800 (PST)
Message-ID: <389AE9BE.ACF64678@netscape.com>
Date: Fri, 04 Feb 2000 10:01:18 -0500
From: mcs@netscape.com (Mark C Smith)
Organization: iPlanet E-Commerce Solutions
X-Mailer: Mozilla 4.7 [en] (WinNT; U)
X-Accept-Language: en
MIME-Version: 1.0
To: Chris Harding <c.harding@opengroup.org>
CC: directory@opengroup.org, ietf-ldapext@netscape.com
Subject: Re: (c.harding 38467) bug in blits
References: <3.0.3.32.20000204142450.006fb394@mailhome.rdg.opengroup.org>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"jConCB.A.e7C.Eoum4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Yes, it sounds to me like BLITS should be changed as Chris O. suggests.

-- 
Mark Smith
Directory & Security Group / iPlanet E-Commerce Solutions
My words are my own, not my employer's.         Got LDAP?


Chris Harding wrote:
> 
> Hi -
> 
> It seems a bit surprising that this hasn't come up before. Should we change
> BLITS as suggested?
> 
> >From: Christopher Oliva <Chris.Oliva@entrust.com>
> >To: "'capple@att.com'" <capple@att.com>,
> >        "'c.harding@opengroup.org'"
> >        <c.harding@opengroup.org>,
> >        "'ludovic.poitou@france.sun.com'"
> >        <ludovic.poitou@france.sun.com>
> >Subject: (c.harding 38467) bug in blits
> >Date: Thu, 3 Feb 2000 14:26:36 -0500
> >X-Mailer: Internet Mail Service (5.5.2650.21)
> >Comments: (c.harding 38467)
> >
> >Hi,
> >
> >I have a bug report for the following tests in the BLITS suite:
> >
> >3.3.2.9.2
> >3.3.2.9.3
> >3.3.2.9.4
> >
> >They are testing the ldap server response to a search where no entries match
> >the search filter. They require the "noSuchObject" error to be returned. In
> >reality, this is not correct. I can tell you that from working with many
> >(commercial release) directory products that none of them return this error.
> >The correct response from the server is a "success" code with no matching
> >search result entries i.e. there will be no matches and the search completes
> >successfully.
> >
> >The reason is in X.500. Clause 10.2.3 of X.511 (1997) says this:
> >
> >The search request succeeds if the baseObject is located, regardless of
> >whether there are any subordinates to return.
> >
> >Furthermore, noSuchObject is defined as follows in clause 12 of X.511:
> >
> >noSuchObject - The name supplied does not match the name of any object
> >
> >Applied to the search operation, this means the base object parameter of the
> >search (if it cannot be located) will result in this error.
> >
> >This is substantiated by the description of how an LDAPResult is constructed
> >in RFC 2251 4.1.10.
> >
> >As a result of this, I think the BLITS test should be changed. I think some
> >directory implementations may code the incorrect behaviour into their
> >products unless this is changed.
> >
> >Please let me know what you think.
> >
> >Chris.
> >
> >
>



From list@netscape.com  Fri Feb  4 10:27:12 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA00037
	for <ldapext-archive@odin.ietf.org>; Fri, 4 Feb 2000 10:27:05 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id HAA21460;
	Fri, 4 Feb 2000 07:24:11 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id HAA19652; Fri, 4 Feb 2000 07:25:50 -0800 (PST)
Resent-Date: Fri, 4 Feb 2000 07:25:50 -0800 (PST)
Sender: vinnie@oasis.ireland.Sun.COM
Message-ID: <389AEE8D.2E4A19C6@Ireland.Sun.COM>
Date: Fri, 04 Feb 2000 15:21:49 +0000
From: Vincent Ryan <Vincent.Ryan@Ireland.Sun.COM>
Organization: Sun Microsystems
X-Mailer: Mozilla 4.7 [en] (X11; I; SunOS 5.7 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Chris Harding <c.harding@opengroup.org>
CC: directory@opengroup.org, ietf-ldapext@netscape.com
Subject: Re: (c.harding 38467) bug in blits
References: <3.0.3.32.20000204142450.006fb394@mailhome.rdg.opengroup.org>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"IJ8ALB.A.yyE.99um4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit


The tests listed below all attempt to perform a search at a
non-existent entry. It is correct to expect a noSuchObject
error to be returned.

Admittedly, the Procedure clause in each of the test specifications
is a little misleading and could be replaced with:

    Submit a {subtree | single-level | base-level} search request
    where the base object does not exist.


Chris Harding wrote:
> 
> Hi -
> 
> It seems a bit surprising that this hasn't come up before. Should we change
> BLITS as suggested?
> 
> >From: Christopher Oliva <Chris.Oliva@entrust.com>
> >To: "'capple@att.com'" <capple@att.com>,
> >        "'c.harding@opengroup.org'"
> >        <c.harding@opengroup.org>,
> >        "'ludovic.poitou@france.sun.com'"
> >        <ludovic.poitou@france.sun.com>
> >Subject: (c.harding 38467) bug in blits
> >Date: Thu, 3 Feb 2000 14:26:36 -0500
> >X-Mailer: Internet Mail Service (5.5.2650.21)
> >Comments: (c.harding 38467)
> >
> >Hi,
> >
> >I have a bug report for the following tests in the BLITS suite:
> >
> >3.3.2.9.2
> >3.3.2.9.3
> >3.3.2.9.4
> >
> >They are testing the ldap server response to a search where no entries match
> >the search filter. They require the "noSuchObject" error to be returned. In
> >reality, this is not correct. I can tell you that from working with many
> >(commercial release) directory products that none of them return this error.
> >The correct response from the server is a "success" code with no matching
> >search result entries i.e. there will be no matches and the search completes
> >successfully.
> >
> >The reason is in X.500. Clause 10.2.3 of X.511 (1997) says this:
> >
> >The search request succeeds if the baseObject is located, regardless of
> >whether there are any subordinates to return.
> >
> >Furthermore, noSuchObject is defined as follows in clause 12 of X.511:
> >
> >noSuchObject - The name supplied does not match the name of any object
> >
> >Applied to the search operation, this means the base object parameter of the
> >search (if it cannot be located) will result in this error.
> >
> >This is substantiated by the description of how an LDAPResult is constructed
> >in RFC 2251 4.1.10.
> >
> >As a result of this, I think the BLITS test should be changed. I think some
> >directory implementations may code the incorrect behaviour into their
> >products unless this is changed.
> >
> >Please let me know what you think.
> >
> >Chris.
> >
> >
> >
> 
> Regards,
> 
> Chris
> +++++
> 
> -------------------------------------------------------------------------
>            Chris Harding
>   T H E    Directory Program Manager
>  O P E N   Apex Plaza, Forbury Road, Reading RG1 1AX, UK
> G R O U P  Mailto:c.harding@opengroup.org   Ph: +44 118 950 8311 x2262
>            WWW: http://www.opengroup.org    Fx: +44 118 950 0110
> 
> OSF/1, Motif, UNIX and the "X" device are registered trademarks in
> the US and other countries, and IT DialTone and The Open Group are
> trademarks of The Open Group.
> -------------------------------------------------------------------------



From list@netscape.com  Sun Feb  6 13:53:12 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA11390
	for <ldapext-archive@odin.ietf.org>; Sun, 6 Feb 2000 13:53:12 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id KAA11111;
	Sun, 6 Feb 2000 10:50:22 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id KAA22224; Sun, 6 Feb 2000 10:51:56 -0800 (PST)
Resent-Date: Sun, 6 Feb 2000 10:51:56 -0800 (PST)
Message-Id: <4.2.2.20000206124644.00a4b580@popmail2.austin.ibm.com>
X-Sender: stokes@popmail2.austin.ibm.com
X-Mailer: QUALCOMM Windows Eudora Pro Version 4.2.2 
Date: Sun, 06 Feb 2000 12:52:26 -0600
To: internet-drafts@ietf.org,
        Patrik =?iso-8859-1?Q?F=E4ltstr=F6m?=
  <paf@swip.net>,
        Steve Coya <scoya@ietf.org>
From: Ellen Stokes <stokes@austin.ibm.com>
Subject: please publish - draft-ietf-ldapext-acl-reqts-03.txt
Cc: Keith Moore <moore@cs.utk.edu>, Ned Freed <Ned.Freed@innosoft.com>,
        ietf-ldapext@netscape.com
In-Reply-To: <234079.3158829413@[192.168.111.25]>
References: <Pine.WNT.3.96.1000204122559.-314771A-100000@scoya.cnri.reston.va.us>
Mime-Version: 1.0
Content-Type: multipart/mixed;
	boundary="=====================_7255096==_"
Resent-Message-ID: <"n8FwDC.A.-aF.KLcn4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

--=====================_7255096==_
Content-Type: text/plain; charset="iso-8859-1"; format=flowed
Content-Transfer-Encoding: quoted-printable

Please publish - it reflects the changes requested per IESG comments:

1. RFC2119 references:
- used RFC 2696 as a model
- modified the abstract to reflect the accepted wording
- added a reference to RFC 2119 in the reference section ([bradner97]

2. Renamed reference [2] to [ecma] and reworded its reference in the
glossary section. And yes, we used some of the definitions from the
ECMA glossary, but only those pertinent to this requirements document.

3. Put in the correct 'Status of Memo' and 'Copyright' stuff and in the=20
same order
as RFC 2696.

Ellen


At 12:36 PM 2/6/00 +0100, Patrik F=E4ltstr=F6m wrote:
>--On 2000-02-04 12.27 -0500, Steve Coya <scoya@ietf.org> wrote:
>
> > Ellen,
> >
> > You'll be submitting the update as an new I-D, right?
>
>Ellen, can you please see that you send in the new version of the document
>to internet-drafts@ietf.org, and let me know when you see the announcement?
>
>    Patrik
>

--=====================_7255096==_
Content-Type: text/plain; charset="iso-8859-1"
Content-Disposition: attachment; filename="draft-ietf-ldapext-acl-reqts-03.txt"
Content-Transfer-Encoding: quoted-printable








          LDAP Extensions Working Group                      E. Stokes
          Internet Draft                                      D. Byrne
          Intended Category: Informational                         IBM
          Expires: 6 August 2000                            B. Blakley
                                                                Dascom
                                                             P. Behera
                                                              Netscape
                                                       6 February 2000

                      Access Control Requirements for LDAP
                     <draft-ietf-ldapext-acl-reqts-03.txt>

          STATUS OF THIS MEMO

             This document is an Internet-Draft and is in full
             conformance with all provisions of Section 10 of RFC2026.

             Internet-Drafts are working documents of the Internet
             Engineering Task Force (IETF), its areas, and its working
             groups. Note that other groups may also distribute
             working documents as Internet-Drafts. Internet-Drafts are
             draft documents valid for a maximum of six months and may
             be updated, replaced, or obsoleted by other documents at
             any time. It is inappropriate to use Internet- Drafts as
             reference material or to cite them other than as "work in
             progress."

             The list of current Internet-Drafts can be accessed at
             http://www.ietf.org/ietf/1id-abstracts.txt

             The list of Internet-Draft Shadow Directories can be
             accessed at http://www.ietf.org/shadow.html.

             Comments and suggestions on this document are encouraged.
             Comments on this document should be sent to the  LDAPEXT
             working group discussion list:

                    ietf-ldapext@netscape.com

          COPYRIGHT NOTICE
             Copyright (C) The Internet Society (1997).  All Rights
             Reserved.






          Stokes, et al.     Expires 6 August 2000            [Page 1]
=0C




          Internet Draft        ACI Requirements         February 2000



          ABSTRACT

             This document describes the fundamental requirements of
             an access control list (ACL) model for the Lightweight
             Directory Application Protocol (LDAP) directory service.
             It is intended to be a gathering place for access control
             requirements needed to provide authorized access to and
             interoperability between directories.

             The keywords "MUST", "SHOULD", and "MAY" used in this
             document are to be interpreted as described in
             [bradner97].



          1.  Introduction

             The ability to securely access (replicate and distribute)
             directory information throughout the network is necessary
             for successful deployment.  LDAP's acceptance as an
             access protocol for directory information is driving the
             need to provide an access control model definition for
             LDAP directory content among servers within an enterprise
             and the Internet.  Currently LDAP does not define an
             access control model, but is needed to ensure consistent
             secure access across heterogeneous LDAP implementations.
             The requirements for access control are critical to the
             successful deployment and acceptance of  LDAP in the
             market place.

             The RFC 2119 terminology is used in this document.


          2.  Objectives

             The major objective is to provide a simple, but secure,
             highly efficient access control model for LDAP while also
             providing the appropriate flexibility to meet the needs
             of both the Internet and enterprise environments and
             policies.

             This generally leads to several general requirements that
             are discussed below.





          Stokes, et al.     Expires 6 August 2000            [Page 2]
=0C




          Internet Draft        ACI Requirements         February 2000



          3.  Requirements

             This section is divided into several areas of
             requirements: general, semantics/policy, usability, and
             nested groups (an unresolved issue).  The requirements
             are not in any priority order.  Examples and explanatory
             text is provided where deemed necessary.  Usability is
             perhaps the one set of requirements that is generally
             overlooked, but must be addressed to provide a secure
             system. Usability is a security issue, not just a nice
             design goal and requirement. If it is impossible to set
             and manage a policy for a secure situation that a human
             can understand, then what was set up will probably be
             non-secure. We all need to think of usability as a
             functional security requirement.

          3.1  General

             G1.  Model SHOULD be general enough to support
             extensibility to add desirable features in the future.

             G2.  When in doubt, safer is better, especially when
             establishing defaults.

             G3.  ACL administration SHOULD be part of the LDAP
             protocol.  Access control information MUST be an LDAP
             attribute.

             G4.  Object reuse protection SHOULD be provided and MUST
             NOT inhibit implementation of object reuse. The directory
             SHOULD support policy controlling the re-creation of
             deleted DNs, particularly in cases where they are re-
             created for the purpose of assigning them to a subject
             other than the owner of the deleted DN.

          3.2  Semantics / Policy

             S1.  Omitted as redundant; see U8.

             S2.  More specific policies must override less specific
             ones (e.g. individual user entry in ACL SHOULD take
             precedence over group entry) for the evaluation of an
             ACL.

             S3.  Multiple policies of equal specificity SHOULD be



          Stokes, et al.     Expires 6 August 2000            [Page 3]
=0C




          Internet Draft        ACI Requirements         February 2000



             combined in some easily-understood way (e.g. union or
             intersection).  This is best understood by example.
             Suppose user A belongs to 3 groups and those 3 groups are
             listed on the ACL. Also suppose that the permissions for
             each of those groups are not identical. Each group is of
             equal specificity (e.g. each group is listed on the ACL)
             and the policy for granting user A access (given the
             example) SHOULD be combined in some easily understood
             way, such as by intersection or union.  For example, an
             intersection policy here may yield a more limited access
             for user A than a union policy.

             S4.  Newly created directory entries SHOULD be subject to
             a secure default policy.

             S5.  Access policy SHOULD NOT be expressed in terms of
             attributes which the directory administrator or his
             organization cannot administer (e.g. groups whose
             membership is administered by another organization).

             S6.  Access policy SHOULD NOT be expressed in terms of
             attributes which are easily forged (e.g. IP addresses).
             There may be valid reasons for enabling access based on
             attributes that are easily forged and the
             behavior/implications of doing that should be documented.

             S7.  Humans (including administrators) SHOULD NOT be
             required to manage access policy on the basis of
             attributes which are not "human-readable" (e.g. IP
             addresses).

             S8.  It MUST be possible to deny a subject the right to
             invoke a directory operation.  The system SHOULD NOT
             require a specific implementation of denial (e.g.
             explicit denial, implicit denial).

             S9.  The system MUST be able (semantically) to support
             either default-grant or default-deny semantics (not
             simultaneously).

             S10.  The system MUST be able to support either union
             semantics or intersection semantics for aggregate
             subjects (not simultaneously).

             S11.  Absence of policy SHOULD be interpretable as grant



          Stokes, et al.     Expires 6 August 2000            [Page 4]
=0C




          Internet Draft        ACI Requirements         February 2000



             or deny. Deny takes precedence over grant among entries
             of equal specificity.

             S12.  ACL policy resolution MUST NOT depend on the order
             of entries in the ACL.

             S13.  Rights management MUST have no side effects.
             Granting a subject one right to an object MUST NOT
             implicitly grant the same or any other subject a
             different right to the same object.  Granting a privilege
             attribute to one subject MUST NOT implicitly grant the
             same privilege attribute to any other subject.  Granting
             a privilege attribute to one subject MUST NOT implicitly
             grant a different privilege attribute to the same or any
             other subject.  Definition: An ACL's "scope" is defined
       =20     as the set of directory objects governed by the policy it
             defines; this set of objects is a sub-tree of the
             directory.  Changing the policy asserted by an ACL (by
             changing one or more of its entries) MUST NOT implicitly
             change the policy governed by an ACL in a different
             scope.

             S14.  It SHOULD be possible to apply a single policy to
             multiple directory entries, even if those entries are in
             different subtrees.  Applying a single policy to multiple
             directory entries SHOULD NOT require creation and storage
             of multiple copies of the policy data.  The system SHOULD
             NOT require a specific implementation (e.g. nested
             groups, named ACLs) of support for policy sharing.

          3.3  Usability (Manageability)

             U1.  When in doubt, simpler is better, both at the
             interface and in the implementation.

             U2.  Subjects MUST be drawn from the "natural" LDAP
             namespace; they should be DNs.

             U3.  It SHOULD NOT be possible via ACL administration to
             lock all users, including all administrators, out of the
             directory.

             U4.  Administrators SHOULD NOT be required to evaluate
             arbitrary Boolean predicates in order to create or
             understand policy.



          Stokes, et al.     Expires 6 August 2000            [Page 5]
=0C




          Internet Draft        ACI Requirements         February 2000



             U5.  Administrators SHOULD be able to administer access
             to directories and their attributes based on their
             sensitivity, without having to understand the semantics
             of individual schema elements and their attributes (see
             U9).

             U6.  Management of access to resources in an entire
             subtree SHOULD require only one ACL (at the subtree
             root).  Note that this makes access control based
             explicitly on attribute types very hard, unless you
             constrain the types of entries in subtrees.  For example,
             another attribute is added to an entry. That attribute
             may fall outside the grouping covered by the ACL and
             hence require additional administration where the desired
             affect is indeed a different ACL.  Access control
             information specified in one administrative area MUST NOT
             have jurisdiction in another area.  You SHOULD NOT be
             able to control access to the aliased entry in the alias.
             You SHOULD be able to control access to the alias name.

             U7.  Override of subtree policy MUST be supported on a
             per-directory-entry basis.

             U8.  Control of access to individual directory entry
             attributes (not just the whole directory entry) MUST be
             supported.

             U9.  Administrator MUST be able to coarsen access policy
             granularity by grouping attributes with similar access
             sensitivities.

             U10.  Control of access on a per-user granularity MUST be
             supported.

             U11.  Administrator MUST be able to aggregate users (for
             example, by assigning them to groups or roles) to
             simplify administration.

             U12.  It MUST be possible to review "effective access" of
             any user, group, or role to any entry's attributes. This
             aids the administrator in setting the correct policy.

             U13.  A single administrator SHOULD be able to define
             policy for the entire directory tree.  An administrator
             MUST be able to delegate policy administration for



          Stokes, et al.     Expires 6 August 2000            [Page 6]
=0C




          Internet Draft        ACI Requirements         February 2000



             specific subtrees to other users.  This allows for the
             partitioning of the entire directory tree for policy
             administration, but still allows a single policy to be
             defined for the entire tree independent of partitioning.
             (Partition in this context means scope of
             administration). An administrator MUST be able to create
             new partitions at any point in the directory tree, and
             MUST be able to merge a superior and subordinate
             partition.  An administrator MUST be able to configure
             whether delegated access control information from
             superior partitions is to be accepted or not.

             U14.  It MUST be possible to authorize users to traverse
             directory structure even if they are not authorized to
             examine or modify some traversed entries; it MUST also be
             possible to prohibit this.  The tree structure MUST be
             able to be protected from view if so desired by the
             administrator.

             U15.  It MUST be possible to create publicly readable
             entries, which may be read even by unauthenticated
             clients.

             U16.  The model for combining multiple access control
             list entries referring to a single individual MUST be
             easy to understand.

             U17.  Administrator MUST be able to determine where
             inherited policy information comes from, that is, where
             ACLs are located and which ACLs were applied. Where
             inheritance of ACLs is applied, it must be able to be
             shown how/where that new ACL is derived from.

             U18.  It SHOULD be possible for the administrator to
             configure the access control system to permit users to
             grant additional access control rights for entries which
             they create.


          4.  Security Considerations

             Access control is a security consideration.  This
             documents addresses the requirements.





          Stokes, et al.     Expires 6 August 2000            [Page 7]
=0C




          Internet Draft        ACI Requirements         February 2000



          5.  Glossary

             This glossary is intended to aid the novice not versed in
             depth about access control.  It contains a list of terms
             and their definitions that are commonly used in
             discussing access control [emca].

             Access control - The prevention of use of a resource by
             unidentified and/or unauthorized entities in any other
             that an authorized manner.

             Access control list - A set of control attributes.  It is
             a list, associated with a security object or a group of
             security objects.  The list contains the names of
             security subjects and the type of access that may be
             granted.

             Access control policy - A set of rules, part of a
             security policy, by which human users, or their
             representatives, are authenticated and by which access by
             these users to applications and other services and
             security objects is granted or denied.

             Access context - The context, in terms of such variables
             as location, time of day, level of security of the
             underlying associations, etc., in which an access to a
             security object is made.

             Authorization - The granting of access to a security
             object.

             Authorization policy - A set of rules, part of an access
             control policy, by which access by security subjects to
             security objects is granted or denied.  An authorization
             policy may be defined in terms of access control lists,
             capabilities, or attributes assigned to security
             subjects, security objects, or both.

             Control attributes - Attributes, associated with a
             security object that, when matched against the privilege
             attributes of a security subject, are used to grant or
             deny access to the security object.  An access control
             list or list of rights or time of day range are examples
             of control attributes.




          Stokes, et al.     Expires 6 August 2000            [Page 8]
=0C




          Internet Draft        ACI Requirements         February 2000



             Credentials - Data that serve to establish the claimed
             identity of a security subject relative to a given
             security domain.

             Privilege attributes - Attributes, associated with a
             security subject that, when matched against control
             attributes of a security object, are used to grant or
             deny access to that subject.  Group and role memberships
             are examples of privilege attributes.

             Security attributes - A general term covering both
             privilege attributes and control attributes.  The use of
             security attributes is defined by a security policy.

             Security object - An entity in a passive role to which a
             security policy applies.

             Security policy - A general term covering both access
             control policies and authorization policies.

             Security subject - An entity in an active role to which a
             security policy applies.


          6.  References

             [ldap] Steve Kille, Tim Howes, M. Wahl, "Lightweight
             Directory Access Protocol (v3)", RFC 2251, August 1997.

             [ecma] ECMA, "Security in Open Systems: A Security
             Framework" ECMA TR/46, July 1988

             [bradner97] Bradner, S., "Key Words for use in RFCs to
             Indicate Requirement Levels", BCP 14, RFC 2119, March
             1997.


          AUTHOR(S) ADDRESS

             Bob Blakley                        Ellen Stokes
             Dascom                             IBM
             5515 Balcones Drive                11400 Burnet Rd
             Austin, TX 78731                   Austin, TX 78758
             USA                                USA
             mail-to: blakley@dascom.com        mail-to:=
 stokes@austin.ibm.com



          Stokes, et al.     Expires 6 August 2000            [Page 9]
=0C




          Internet Draft        ACI Requirements         February 2000



             phone: +1 512 458 4037  ext 5012   phone: +1 512 838 3725
             fax:   +1 512 458 2377             fax:   +1 512 838 0156


             Debbie Byrne                       Prasanta Behera
             IBM                                Netscape
             11400 Burnet Rd                    501 Ellis Street
             Austin, TX 78758                   Mountain View, CA 94043
             USA                                USA
             mail-to: djbyrne@us.ibm.com        mail-to:=
 prasanta@netscape.com
             phone: +1 512 838 1930             phone: +1 650 937 4948
             fax:   +1 512 838 8597             fax:   +1 650 528-4164




































          Stokes, et al.     Expires 6 August 2000           [Page 10]
=0C




          Internet Draft        ACI Requirements         February 2000



          7.  Full Copyright Statement

          Copyright (C) The Internet Society (1999).=A0 All Rights
          Reserved.

          This document and translations of it may be copied and
          furnished to others, and derivative works that comment on or
          otherwise explain it or assist in its implementation may be
          prepared, copied, published and distributed, in whole or in
          part, without restriction of any kind, provided that the
          above copyright notice and this paragraph are included on
          all such copies and derivative works.=A0 However, this
          document itself may not be modified in any way, such as by
          removing the copyright notice or references to the Internet
          Society or other Internet organizations, except as needed
          for the purpose of developing Internet standards in which
          case the procedures for copyrights defined in the Internet
          Standards process must be followed, or as required to
          translate it into languages other than English.

          The limited permissions granted above are perpetual and will
          not be revoked by the Internet Society or its successors or
          assigns.

          This document and the information contained herein is
          provided on an "AS IS" basis and THE INTERNET SOCIETY AND
          THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL
          WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO
          ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT
          INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
          MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

          Acknowledgement

             Funding for the RFC Editor function is currently provided
             by the Internet Society.












          Stokes, et al.     Expires 6 August 2000           [Page 11]
=0C


--=====================_7255096==_--



From list@netscape.com  Sun Feb  6 16:33:38 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA12672
	for <ldapext-archive@odin.ietf.org>; Sun, 6 Feb 2000 16:33:37 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id NAA11677;
	Sun, 6 Feb 2000 13:29:05 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id NAA11596; Sun, 6 Feb 2000 13:32:29 -0800 (PST)
Resent-Date: Sun, 6 Feb 2000 13:32:29 -0800 (PST)
Message-Id: <3.0.5.32.20000206133217.0096f100@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Sun, 06 Feb 2000 13:32:17 -0800
To: ietf-ldapext@netscape.com
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: attributeTypes for AttributeDescriptions
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"ogch0B.A.20C.shen4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

RFC2252 appears to allow attributeTypes values such as:
  ( 1.2.3 NAME 'userCertificate;binary' SUP userCertificate
	SYNTAX 1.3.6.1.4.1.1466.115.121.1.5 )

Is this an intended use?  What are intended uses of attributeTypes
values which name attribute descriptions?  I assume that OID
should be unique to the attributeTypes value and not that of
the associated attribute type.

Kurt



From list@netscape.com  Mon Feb  7 09:17:16 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA09888
	for <ldapext-archive@odin.ietf.org>; Mon, 7 Feb 2000 09:17:16 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id GAA02235;
	Mon, 7 Feb 2000 06:14:24 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id GAA24278; Mon, 7 Feb 2000 06:16:05 -0800 (PST)
Resent-Date: Mon, 7 Feb 2000 06:16:05 -0800 (PST)
From: FRANK@XGLOBE.COM
To: <ietf-ldapext@netscape.com>
Date: Wed, 9 Feb 2000 01:20:09
Message-Id: <548.893204.468935@mail.mindspring.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"yRE7R.A.E7F.kOtn4"@glacier>
Resent-From: ietf-ldapext@netscape.com
Subject: Unidentified subject!
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

web sites offered for only 12.95 per month with a 40.00 set up.

service includes hosting your own domain with your own 

"yourname@yourname.com" email address.

all sites are prepaid annually in advance with a 90 day money 
back guarantee.  all sites start at 5 megs.

dial 1 888 248 0765 for more information.
"."
 
 
 
 
 
 
 
 
 
 
 
 
 



From list@netscape.com  Mon Feb  7 12:41:16 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA16559
	for <ldapext-archive@odin.ietf.org>; Mon, 7 Feb 2000 12:41:15 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id JAA25170;
	Mon, 7 Feb 2000 09:38:28 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id JAA19625; Mon, 7 Feb 2000 09:40:10 -0800 (PST)
Resent-Date: Mon, 7 Feb 2000 09:40:10 -0800 (PST)
Message-Id: <3.0.5.32.20000207094004.009392d0@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Mon, 07 Feb 2000 09:40:04 -0800
To: ietf-ldapext@netscape.com
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: RFC2251: RootDSE subschemasubentry issue
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"80IvXB.A.XyE.5Nwn4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

As previously noted <8525679B.003DD02B.00@D51MTA04.pok.ibm.com>,
RFC 2251 states subschemaSubentry attribute type within the
Root DSE may contain multiple values though the attribute type
is single valued.

I do not believe it necessary to provide a mechanism to allow
clients to obtain a complete list of subschema entries (or
subentries) known to this server.  This list could be quite
large and, IMO, rather useless.  Applications need to known
which subschema controls which entries.

I suggest that applications obtain the DN of the subschema entry
(subentry) from either the entry(ies) they intend to access or
from the entry at the root of the naming context. 

To resolve this issue, I suggest:

RFC 2251, 3.4 "--subsubschemaSubentry" subsection be removed
and that a note be added to the end of the section:

  Note: the subsubschemaSubentry attribute type, if
  present, contains the Distinguished Name of the
  subschema entry (or subentry) which controls the
  schema for the Root DSE.

Comments?

	Kurt




From list@netscape.com  Mon Feb  7 13:16:44 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA18015
	for <ldapext-archive@odin.ietf.org>; Mon, 7 Feb 2000 13:16:42 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id KAA03359;
	Mon, 7 Feb 2000 10:13:52 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id KAA09618; Mon, 7 Feb 2000 10:15:34 -0800 (PST)
Resent-Date: Mon, 7 Feb 2000 10:15:34 -0800 (PST)
Message-ID: <EB21C070AA75D311A0AC0090271EC45C013A6D34@us-tr-exch-1.tr.unisys.com>
From: "Salter, Thomas A" <Thomas.Salter@unisys.com>
To: ietf-ldapext@netscape.com
Subject: RE: attributeTypes for AttributeDescriptions
Date: Mon, 7 Feb 2000 13:16:28 -0500 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.21)
Content-Type: text/plain;
	charset="iso-8859-1"
Resent-Message-ID: <"f61lnB.A.AWC.Fvwn4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

RFC2252 allows this, but it's not consistent with the definition of ;binary.
Both RFC 2251 and 2252 say that the binary option applies to the way the
attribute value is transfered in protocol, not the way it is stored.  That
being the case, it wouldn't make sense to define two different OIDs for the
same attribute.

Your example also changes the syntax of the derived attribute.  In X.500
that is illegal.  X.501, 12.4.2 says "If the attribute syntax is indicated
and the attribute has a direct supertype, the indicated syntax must be
compatible with the supertype's syntax, i.e. every possible value satisfying
the attribute's syntax must also satisfy the supertype's syntax."  This is
just expressing the usual notions of inheritance.  There is also a statement
about matching rules of the supertype applying to the subtype.  I think
these restrictions are all here to allow searching for the supertype to work
as expected.


 > -----Original Message-----
 > From: Kurt D. Zeilenga [mailto:Kurt@OpenLDAP.org]
 > Sent: Sunday, February 06, 2000 4:32 PM
 > To: ietf-ldapext@netscape.com
 > Subject: attributeTypes for AttributeDescriptions
 > 
 > 
 > RFC2252 appears to allow attributeTypes values such as:
 >   ( 1.2.3 NAME 'userCertificate;binary' SUP userCertificate
 > 	SYNTAX 1.3.6.1.4.1.1466.115.121.1.5 )
 > 
 > Is this an intended use?  What are intended uses of attributeTypes
 > values which name attribute descriptions?  I assume that OID
 > should be unique to the attributeTypes value and not that of
 > the associated attribute type.
 > 
 > Kurt
 > 



From list@netscape.com  Mon Feb  7 13:41:07 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA18576
	for <ldapext-archive@odin.ietf.org>; Mon, 7 Feb 2000 13:41:06 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id KAA08616;
	Mon, 7 Feb 2000 10:37:45 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id KAA22052; Mon, 7 Feb 2000 10:39:27 -0800 (PST)
Resent-Date: Mon, 7 Feb 2000 10:39:27 -0800 (PST)
Message-Id: <3.0.5.32.20000207103909.00986c80@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Mon, 07 Feb 2000 10:39:09 -0800
To: "Salter, Thomas A" <Thomas.Salter@unisys.com>
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: RE: attributeTypes for AttributeDescriptions
Cc: ietf-ldapext@netscape.com
In-Reply-To: <EB21C070AA75D311A0AC0090271EC45C013A6D34@us-tr-exch-1.tr.u
 nisys.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"d9kqlD.A.SYF.fFxn4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

So, I ask:
> > What are intended uses of attributeTypes values which
> > name attribute descriptions?




From list@netscape.com  Mon Feb  7 15:07:42 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA20523
	for <ldapext-archive@odin.ietf.org>; Mon, 7 Feb 2000 15:07:40 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id MAA12231;
	Mon, 7 Feb 2000 12:03:07 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id MAA15827; Mon, 7 Feb 2000 12:06:29 -0800 (PST)
Resent-Date: Mon, 7 Feb 2000 12:06:29 -0800 (PST)
Message-ID: <EB21C070AA75D311A0AC0090271EC45C013A7506@us-tr-exch-1.tr.unisys.com>
From: "Salter, Thomas A" <Thomas.Salter@unisys.com>
To: ietf-ldapext@netscape.com
Subject: RE: attributeTypes for AttributeDescriptions
Date: Mon, 7 Feb 2000 15:07:14 -0500 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.21)
Content-Type: text/plain;
	charset="iso-8859-1"
Resent-Message-ID: <"EC08C.A.n2D.DXyn4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

maybe its different with language codes ?

 > -----Original Message-----
 > From: Kurt D. Zeilenga [mailto:Kurt@OpenLDAP.org]
 > Sent: Monday, February 07, 2000 1:39 PM
 > To: Salter, Thomas A
 > Cc: ietf-ldapext@netscape.com
 > Subject: RE: attributeTypes for AttributeDescriptions
 > 
 > 
 > So, I ask:
 > > > What are intended uses of attributeTypes values which
 > > > name attribute descriptions?
 > 
 > 



From list@netscape.com  Mon Feb  7 15:38:00 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA21139
	for <ldapext-archive@odin.ietf.org>; Mon, 7 Feb 2000 15:37:58 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id MAA01203;
	Mon, 7 Feb 2000 12:35:07 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id MAA00829; Mon, 7 Feb 2000 12:36:50 -0800 (PST)
Resent-Date: Mon, 7 Feb 2000 12:36:50 -0800 (PST)
From: smd@iris.com
Subject: Search reference question
To: ietf-ldapext@netscape.com
X-Mailer: Lotus Notes Build V60_01192000 January 19, 2000
Message-ID: <OFC2F6E6E6.305753E2-ON8525687E.006F6A20@iris.com>
Date: Mon, 7 Feb 2000 15:36:14 -0500
X-MIMETrack: Serialize by Router on Arista/Iris(Release 5.0.2b |December 16, 1999) at 02/07/2000
 03:37:20 PM
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Resent-Message-ID: <"sgGSuD.A.tM.hzyn4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Section 4.5.3. of RFC 2251 states:
     In order to complete the search, the client MUST issue a new search
     operation for each SearchResultReference that is returned.

Can someone help me with the interpretation.  Does this mean that if a
client receives a SearchResultReference it MUST issue a new search
operation to the referenced server?  Or rather, if the client wishes to
complete the search it MUST (really should) issue a new search operation?

Thanks,
Scott M Davidson
Iris Associates

smd@iris.com
(978) 392-5436
Five Technology Park Drive
Westford, MA  01886



From list@netscape.com  Mon Feb  7 15:46:33 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA21306
	for <ldapext-archive@odin.ietf.org>; Mon, 7 Feb 2000 15:46:31 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id MAA18513;
	Mon, 7 Feb 2000 12:41:57 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id MAA05961; Mon, 7 Feb 2000 12:45:15 -0800 (PST)
Resent-Date: Mon, 7 Feb 2000 12:45:15 -0800 (PST)
Message-Id: <s89ecc63.002@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.2.1
Date: Mon, 07 Feb 2000 13:44:53 -0700
From: "Roger Harrison" <RHARRISON@novell.com>
To: <smd@iris.com>, <ietf-ldapext@netscape.com>
Subject: Re: Search reference question
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Resent-Message-ID: <"WFZXpD.A.3cB.b7yn4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ietf.org id PAA21306

Your second interpretation is correct.

I think the sticking point here is what it meant by "complete."  I believe that the authors are using the term complete to mean the entire set of entries for the given search (as opposed to the completion of a given search request). The fact that a SearchResultReference was sent by the server means that one or more entries will be missing from the set unless the client issues a new search operation for the SearchResultReference.  Thus, the search will not be complete unless a new search operation is issued for the SearchResultReference.  The client is not required to issue the new search request for each SearchResultReference, but the expected set of entries won't be complete until it does.

Roger Harrison
roger_harrison@novell.com
Novell, Inc.

>>> <smd@iris.com> 02/07/00 01:37PM >>>
Section 4.5.3. of RFC 2251 states:
     In order to complete the search, the client MUST issue a new search
     operation for each SearchResultReference that is returned.

Can someone help me with the interpretation.  Does this mean that if a
client receives a SearchResultReference it MUST issue a new search
operation to the referenced server?  Or rather, if the client wishes to
complete the search it MUST (really should) issue a new search operation?

Thanks,
Scott M Davidson
Iris Associates

smd@iris.com 
(978) 392-5436
Five Technology Park Drive
Westford, MA  01886




From list@netscape.com  Mon Feb  7 16:14:17 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA21921
	for <ldapext-archive@odin.ietf.org>; Mon, 7 Feb 2000 16:14:12 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id NAA23256;
	Mon, 7 Feb 2000 13:09:25 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id NAA21244; Mon, 7 Feb 2000 13:12:51 -0800 (PST)
Resent-Date: Mon, 7 Feb 2000 13:12:51 -0800 (PST)
Message-Id: <3.0.5.32.20000207131242.00987aa0@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Mon, 07 Feb 2000 13:12:42 -0800
To: smd@iris.com
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Re: Search reference question
Cc: ietf-ldapext@netscape.com
In-Reply-To: <OFC2F6E6E6.305753E2-ON8525687E.006F6A20@iris.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"InBiWB.A.qLF.SVzn4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 03:36 PM 2/7/00 -0500, smd@iris.com wrote:
>Section 4.5.3. of RFC 2251 states:
>     In order to complete the search, the client MUST issue a new search
>     operation for each SearchResultReference that is returned.
>
>Can someone help me with the interpretation.  Does this mean that if a
>client receives a SearchResultReference it MUST issue a new search
>operation to the referenced server? Or rather, if the client wishes to
>complete the search it MUST (really should) issue a new search operation?

The MUST does not require the operation to be completed nor state
when the client should attempt to complete the operation.  The
MUST says what the client MUST do to complete the operation.

The client may choose (or be required*) not to complete any operation.

* RFC 2251, Section 6.2.  
   They [clients] MUST NOT repeatedly contact the same server for
   the same request with the same target entry name, scope and filter.

Note: the first sentence of 6.2:
   Clients which request referrals MUST ensure that they do not loop
   between servers.

should, IMO, be reworded in RFC 2251bis to:
   Clients which chase referrals and/or references MUST ensure that
   type do not loop between servers.
	



From list@netscape.com  Mon Feb  7 22:10:11 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA26826
	for <ldapext-archive@odin.ietf.org>; Mon, 7 Feb 2000 22:10:10 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id TAA04801;
	Mon, 7 Feb 2000 19:05:39 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id TAA10302; Mon, 7 Feb 2000 19:09:04 -0800 (PST)
Resent-Date: Mon, 7 Feb 2000 19:09:04 -0800 (PST)
From: spy2@post.com
Reply-To: spy2@post.com
Date: Sun, 07 Nov 1999 19:08:57 -0800
Message-Id: <vsqvewwc.pactapfk@showme>
To: wefr@yeys.ua.netscape.com
Subject: INTERNET SPY!
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7BIT
X-SMTP-HELO: tryout
X-SMTP-MAIL-FROM: spy2@post.com
X-SMTP-RCPT-TO: ietf-run@mailbag.cps.intel.com,ietf-ldapext@netscape.com,ietf-l2tp@aptis.com,ietf-hosts@nnsc.nsf.net,ietf-charsets@innosoft.comnov,ietf-charsets@innosoft.com,ietech@mindspring.com,ietco@sympatico.ca,ietcnzix@fbs.cz,ietc@ietc-team.com,ietaosnsgz@ezoh.au,ietam@asuacad.bitnet,ietagqnhlkok@jmdwiie.cr,ietaadri@sirius.ceu.hu,iet@vflsiyf.de,iet@vcomm.net,iet@uvcs.uvic.ca,iet@sonic.net,iet@portti.edita.fi,iet@myservice.com
X-SMTP-PEER-INFO:  [194.134.96.21]
Resent-Message-ID: <"CeItxB.A.sgC.Pj4n4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7BIT

<HTML>
<HEAD>
<PRE>
<TITLE>internet spy</TITLE>
<META NAME="resource-type" CONTENT="document">
</HEAD>
<BODY TEXT="white" BGCOLOR="BLACK" LINK="white" VLINK="white" ALINK="white">
 
<H6><CENTER><FONT FACE="Comic Sans MS" SIZE="6" COLOR="YELLOW"><B>INTERNET 
SPY ORDER FORM!!</B></FONT></CENTER></H6>



////////////////////////////////////////
This is a one time mailing! No need to be removed. 
////////////////////////////////////////

CONFIDENTIAL INFORMATION YOU WANT TO KNOW.

This is the software they want banned from the INTERNET!

"The Internet Desktop Spy" shows you how to get the facts on anyone using the 

Internet.

LOCATE MISSING PERSONS, find lost relatives, obtain addresses and phone 
numbers of old school friends, even skip trace dead beat spouses.  This is 
not a Private Investigator, but a SOFTWARE program DESIGNED to automatically 
CRACK YOUR CASE with links to thousands of Public Record Databases

Find out SECRETS about your relatives, friends, enemies, and everyone else! 
-- even your spouse! With the New - "Internet Desktop SPY"

You will be AMAZED at what you can discover:

LICENSE PLATE NUMBER - Get anyone's name and address with just a license 
plate number! (Find that girl you met in traffic!)

DRIVING RECORD - Get anyone's driving record!

SOCIAL SECURITY NUMBER - Trace anyone by social security number!

ADDRESS - Get anyone's address with just a name!

UNLISTED PHONE NUMBERS - Get anyone's phone number with just a name- even 
unlisted numbers!

LOCATE - Long lost friends, relatives, a past lover who broke your heart!

E-MAIL - Send anyone anonymous e-mail that's completely untraceable!

DIRTY SECRETS - Discover dirty secrets your in-laws don't want you to know!

INVESTIGATE ANYONE - Use the sources that private investigators use (all on 
the Internet) secretly!

EX-SPOUSE - Learn how to get information on an ex-spouse that will help you 
win in court! (Dig up old skeletons)

CRIMINAL SEARCH - BACKGROUND CHECK - Find out about your daughter's 
boyfriend! (or her husband)

FIND OUT - If you are being investigated!

NEIGHBORS - Learn all about your mysterious neighbors!  Find out what they 
have to hide!

PEOPLE YOU WORK WITH - Be astonished by what you'll learn about the people 
you work with!

EDUCATION VERIFICATION - Did he really graduate college?  Find out!

"The Internet Desktop Spy" will help you discover ANYTHING about anyone, with 

clickable hyperlinks and no typing in Internet addresses!  Just download the 
software and go!  You will be shocked and amazed by the secrets that can 
be discovered about absolutely everyone!  Find out the secrets they don't 
want you to know!  About others, about yourself!

LIMITED TIME OFFER -- ORDER TODAY!  ONLY $20 (US)

You can dowmload the  "The Internet DeskTop Spy" software NOW so you can 
begin 
discovering all the secrets you ever wanted to know!  You can know EVERYTHING 

about ANYONE with "The Internet DeskTop Spy" software.  

- Works with all browsers and all versions of AOL
- PC Versions available Only!

DON'T WAIT TO GET STARTED… It's as easy as 1, 2, 3.  
ORDER TODAY - While this software is still legal!

VISA/MC ONLY

For Credit Card Orders, Click on the link below:

<A HREF="#" onClick="window.
open('http://%33%357%34%3770%36@3626198025/ca5/ispy', 'detail',
'width=775,height=475,resizable=no,scrollbars=yes,left=10,top=10')">Click
Here To Order!</a>

NOTES:
- This program will not work on Windows 3.11 and older
- DISCLAIMER - The seller of this powerful software resource will not be held 

responsible for how the purchaser chooses to use its resources.


</HTML>
</HEAD>
</PRE>




From list@netscape.com  Tue Feb  8 03:31:12 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA12404
	for <ldapext-archive@odin.ietf.org>; Tue, 8 Feb 2000 03:31:10 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id AAA25523;
	Tue, 8 Feb 2000 00:26:30 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id AAA00490; Tue, 8 Feb 2000 00:29:55 -0800 (PST)
Resent-Date: Tue, 8 Feb 2000 00:29:55 -0800 (PST)
X-Authentication-Warning: perq.cac.washington.edu: rlmorgan owned process doing -bs
Date: Tue, 8 Feb 2000 00:30:22 -0800 (PST)
From: "RL 'Bob' Morgan" <rlmorgan@washington.edu>
X-Sender: rlmorgan@perq.cac.washington.edu
Reply-To: "RL 'Bob' Morgan" <rlmorgan@washington.edu>
To: IETF ldapext WG <ietf-ldapext@netscape.com>
Subject: what ldapext-locate is about
Message-ID: <Pine.LNX.4.19.99.0002070102001.21022-100000@perq.cac.washington.edu>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Resent-Message-ID: <"OGY69B.A.YH.DQ9n4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


During the recent thread of comments on draft-ietf-ldapext-locate-01.txt
Bruce Greenblatt asked this question:

> Can this same mechanism be used to find an LDAP server from an email
> address? It seems like you should be able to find the appropriate SRV
> record from an email address just as easy as you can from a DN that
> conforms to the DC naming principles.

and I think others asked it too, more or less.  I think this question is
based on a misconception of the issue that
draft-ietf-ldapext-locate-01.txt is addressing.  Since I was confused
about this too and only came to understand it after some reflection, let
me argue the point here so we can all (I hope) be clear about it.  (I've
also submitted text to the document authors along this line.)

The first parameter of the Search operation is the baseObject, "the LDAPDN
that is the base object entry relative to which the search is to be
performed."  All other substantive LDAP operations, ie Modify, Add,
Delete, ModifyDN, and Compare also all have a DN as the first parameter,
in each case specifying the directory object on which the operation is to
be performed.  To successfully perform any of these operations, the
request must eventually be processed by a server that stores that DN (or
the subtree, in the case of Search) locally.  Finding that server, based
on the DN in the request, is precisely what this document is about, no
more, no less.  This is an *internal* directory function that has to
happen for any LDAP operation to be carried out.  Whether it is done by
the client or the server doesn't matter for this discussion.  The fact
that in practice, these days, this function is almost always null --
because servers don't know anything about other servers, and clients are
configured only to talk to particular servers for particular data and
never ask about anything else -- tends to obscure this point; but opening
up the current narrow-focus nature of LDAP directory usage is exactly what
this spec is about.

On the other hand, finding a directory entry for a person who has a
particular email address, as above, is an *application* that uses the
directory, not an internal functional component of the directory itself.  
It's the same kind of thing as finding all entries of people at UW with
the surname "Lee", or using the directory to route email, or any of the
other million directory-enabled apps that specify what the DS client
should do (construct request 'R' using DN 'D', use the value of attribute
'X' to do 'Y', etc), and what schema and data should be in the DIT to
support the app.  These sorts of things certainly need to be documented,
but in their own docs.

The observation that, when looking up info about a DNS-named thing, the
DNS name is first turned into a DC-name-based DN, then back into a DNS
name to do the SRV lookup, might lead one to believe that the DN is
superfluous and can just be skipped but clearly this isn't so.  Note that
it's the client application that does the DNS-to-DN to construct the
request, while it will likely be the server, doing chaining or referral,
that does the DN-to-DNS before doing the SRV record lookup.

Agreed?

 - RL "Bob"




From list@netscape.com  Tue Feb  8 06:33:50 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA13759
	for <ldapext-archive@odin.ietf.org>; Tue, 8 Feb 2000 06:33:50 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id DAA01638;
	Tue, 8 Feb 2000 03:30:58 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id DAA28827; Tue, 8 Feb 2000 03:32:41 -0800 (PST)
Resent-Date: Tue, 8 Feb 2000 03:32:41 -0800 (PST)
Message-Id: <200002081132.GAA13712@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ietf-ldapext@netscape.com
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-ldapext-acl-reqts-03.txt
Date: Tue, 08 Feb 2000 06:32:37 -0500
Sender: nsyracus@cnri.reston.va.us
Resent-Message-ID: <"3eTVGD.A.JCH.X7_n4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the LDAP Extension Working Group of the IETF.

	Title		: Access Control Requirements for LDAP
	Author(s)	: E. Stokes, D. Byrne,  B. Blakley, P. Behera
	Filename	: draft-ietf-ldapext-acl-reqts-03.txt
	Pages		: 11
	Date		: 07-Feb-00
	
This document describes the fundamental requirements of
an access control list (ACL) model for the Lightweight
Directory Application Protocol (LDAP) directory service.
It is intended to be a gathering place for access control
requirements needed to provide authorized access to and
interoperability between directories.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ldapext-acl-reqts-03.txt

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ldapext-acl-reqts-03.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ldapext-acl-reqts-03.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20000207125741.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ldapext-acl-reqts-03.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ldapext-acl-reqts-03.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20000207125741.I-D@ietf.org>

--OtherAccess--

--NextPart--




From list@netscape.com  Tue Feb  8 14:22:51 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA08438
	for <ldapext-archive@odin.ietf.org>; Tue, 8 Feb 2000 14:22:50 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id LAA24592;
	Tue, 8 Feb 2000 11:18:15 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id LAA13805; Tue, 8 Feb 2000 11:21:41 -0800 (PST)
Resent-Date: Tue, 8 Feb 2000 11:21:41 -0800 (PST)
Message-Id: <s8a00a44.088@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.2.1
Date: Tue, 08 Feb 2000 12:20:34 -0700
From: "Mark Meredith" <MMEREDIT@novell.com>
To: <internet-drafts@ietf.org>
Cc: <ietf-ldapext@netscape.com>
Subject: please publish draft-mmeredith-rootdse-vendor-info-01.txt
Mime-Version: 1.0
Content-Type: multipart/mixed; boundary="=_3861ADA4.EE8FBB57"
Resent-Message-ID: <"rfBqQD.A.ZXD.DzGo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

This is a MIME message. If you are reading this text, you may want to 
consider changing to a mail reader or gateway that understands how to 
properly handle MIME multipart messages.

--=_3861ADA4.EE8FBB57
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Please publish - this reflects the changes requested via feed back on =
draft-00.

Please review this draft and submit comments.

-Mark

Mark Meredith
Novell Inc
122 E. 1700 S. Provo UT 84606
mark_meredith@novell.com
801-861-2645
---------------------
A boat in the harbor is safe,=20
but that is not what boats are for.
--John A. Shed
---------------------


--=_3861ADA4.EE8FBB57
Content-Type: text/plain
Content-Disposition: attachment; filename="draft-mmeredith-rootdse-vendor-info-01.txt"




Individual Submission to the LDAPExt Working Group        Mark Meredith
Internet Draft                                              Novell Inc.
Document: draft-mmeredith-rootdse-vendor-info-01.txt   February 7, 2000


Category: Proposed Standard


               Storing Vendor Information in the root DSE


Status of this Memo

   This document is an Internet-Draft and is in full conformance with
   all provisions of Section 10 of [RFC2026].

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups. Note that
   other groups may also distribute working documents as Internet-
   Drafts. Internet-Drafts are draft documents valid for a maximum of
   six months and may be updated, replaced, or made obsolete by other
   documents at any time. It is inappropriate to use Internet- Drafts
   as reference material or to cite them other than as "work in
   progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt
   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.
   Comments and suggestions on this document are encouraged.
   Comments on this document should be sent to the LDAPEXT working
   group discussion list ietf-ldapext@netscape.com or the author.

1. Abstraction

   This document specifies two new attributes, vendorName and
   vendorVersion that can be included in the root DSE to contain
   vendor-specific information.

2. Conventions used in this document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED",  "MAY", and "OPTIONAL" in
   this document are to be interpreted as described in [RFC-2219]

3. Overview

   The root DSE query is a mechanism used by clients to find out what
   controls, extensions, etc. is available from a given LDAP server. It
   is useful to be able to query an LDAP server to determine the vendor
   of that server and see what version of that vendor’s code is
   currently installed. Since vendors can implement X- options for
   attributes, classes, and syntaxes (described in section 4 of
   [RFC2251] and section 4 of [RFC2252] ) that may or may not be
   published, this would allow users or applications to be able to
   determine if these features are available from a given server.
   It is also possible for vendors to have an LDAP server
   implementation to be incomplete in some respect or to have


M. Meredith               Expires August-2000                         1

    LDAP root DSE to display vendor information          February 2000

   implementation quirks that must be worked around until they can be
   fixed in the subsequent release. The vendorName and vendorVersion
   allow client developers to identify a specific implementation of
   LDAP and work around any shortcomings of that implementation as
   needed.

4. Vendor specific information

   This is an addition to the Server-specific Data Requirements defined
   in section 3.4 of [RFC-2251] and the associated syntaxes defined in
   section 4 of [RFC-2252].

   - vendorName

     All LDAP server implementations SHOULD maintain a vendorName,
     which is generally the name of the company that wrote the LDAP
     Server code like "Novell, Inc." This is single-valued so that it
     will only have one vendor.

     ( 2.16.840.1.113719.1.27.4.43 NAME 'vendorName' SYNTAX
     1.3.6.1.4.1.1466.115.121.1.15 NO-USER-MODIFICATION SINGLE-VALUE
     USAGE dSAOperation )

   - vendorVersion

     All LDAP server implementations SHOULD maintain a vendorVersion,
     which is the release number of the LDAP server product, (as
     opposed to the supportedLDAPVersion, which specifies the version
     of the LDAP protocol supported by this server). This is single-
     valued so that it will only have one version number.

     ( 2.16.840.1.113719.1.27.4.44 NAME 'vendorVersion' SYNTAX
     1.3.6.1.4.1.1466.115.121.1.15 NO-USER-MODIFICATION SINGLE-VALUE
     USAGE dSAOperation )

5. Notes to Implementers

     Implementers may want to consider tying the vendorVersion
     attribute value to the build mechanism so that it is automatically
     updated when the version number changes.

6. Notes to Client Developers

     The use of vendorName and vendorVersion SHOULD NOT be used to
     discover features. It is just an informational attribute. If a
     client relies on a vendorVersion number then that client MUST
     be coded to work with later versions and not just one version and
     no other.

7. Security Considerations

   The vendorName and vendorVersion attributes are provided only as an
   aid to help client implementers assess what features may or may not
   exist in a given server implementation. Server and application
   implementers should realize that the existence of a given value in
   the vendorName or vendorVersion attribute is no guarantee that the
   server was actually built by the asserted vendor or that its version
   is the asserted version and should act accordingly.




M. Meredith               Expires August-2000                         2

    LDAP root DSE to display vendor information          February 2000

8. References

   RFC-2219
         Bradner, S., "Key words for use in RFCs to Indicate
         Requirement Levels", BCP 14, RFC 2119, March 1997

   RFC-2026
         Bradner, S., "The Internet Standards Process-Revision 3", BCP
         9, RFC 2026, October 1996.

   RFC-2251
         Wahl, M., Howes, T., Kille, S., "Lightweight Directory Access
         Protocol (v3)", RFC 2251, December 1997

   RFC-2252
         Wahl, M., Coulbeck, A., Howes, T., Kille, S., "Lightweight
         Directory Access Protocol (v3): Attribute Syntax Definitions",
         RFC 2252, December 1997

9. Acknowledgments

        The author would like to thank the generous input and review by
        individuals at Novell including but not limited to Jim Sermersheim,
        Mark Hinckley, Renea Campbell, and Roger Harrison.

10. Author’s Addresses

   Mark Meredith
   Novell Inc.
   122 E. 1700 S. Provo, UT 84606
   Phone: 801-861-2645
   Email: mark_meredith@novell.com

Full Copyright Statement
   Copyright (c) The Internet Society (1999). All Rights Reserved. This
   document and translations of it may be copied and furnished to
   others, and derivative works that comment on or otherwise explain it
   or assist in its implementation may be prepared, copied, published
   and distributed, in whole or in part, without restriction of any
   kind, provided that the above copyright notice and this paragraph
   are included on all such copies and derivative works. However, this
   document itself may not be modified in any way, such as by removing
   the copyright notice or references to the Internet Society or other
   Internet organizations, except as needed for the purpose of
   developing Internet standards in which case the procedures for
   copyrights defined in the Internet Standards process must be
   followed, or as required to translate it into languages other than
   English.

   The limited permissions granted above are perpetual and will not be
   revoked by the Internet Society or its successors or assigns.

   This document and the information contained herein is provided on an
   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
   MER-CHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.




M. Meredith               Expires August-2000                         3

--=_3861ADA4.EE8FBB57--



From list@netscape.com  Tue Feb  8 14:34:57 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA08897
	for <ldapext-archive@odin.ietf.org>; Tue, 8 Feb 2000 14:34:56 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id LAA02043;
	Tue, 8 Feb 2000 11:32:02 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id LAA27088; Tue, 8 Feb 2000 11:33:45 -0800 (PST)
Resent-Date: Tue, 8 Feb 2000 11:33:45 -0800 (PST)
Message-Id: <3.0.5.32.20000208113335.0095d8a0@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Tue, 08 Feb 2000 11:33:35 -0800
To: ietf-ldapext@netscape.com
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: substring matching rules
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"XA4PPD.A.wmG.Y-Go4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

RFC 2252, 8.3 says:

   The Substring Assertion syntax is used only as the syntax of
   assertion values in the extensible match.  It is not used as the
   syntax of attributes, or in the substring filter.
   
   ( 1.3.6.1.4.1.1466.115.121.1.58 DESC 'Substring Assertion' )
   
   [...]
 
   Servers SHOULD be capable of performing the following matching rules,
   which are used in substring filters. 
   
   ( 2.5.13.4 NAME 'caseIgnoreSubstringsMatch'
    SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )
   
I find this a bit confusing.  The SYNTAX should not be used as
part of substring filters but then is used to specify the syntax
used with substring filters.  Shouldn't the syntax of
caseIgnoreSubstringsMatch, for use with substring filters, have
a syntax of DirectoryString like other caseIngore*Match filters
and that a separate matching rule be defined specifically for
use extended filters?  Is it safe to presume that the syntax of
asserted substring components are of the same syntax as the
attribute value being tested?




From list@netscape.com  Tue Feb  8 14:43:26 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA09150
	for <ldapext-archive@odin.ietf.org>; Tue, 8 Feb 2000 14:43:25 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id LAA29205;
	Tue, 8 Feb 2000 11:38:47 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id LAA01456; Tue, 8 Feb 2000 11:42:15 -0800 (PST)
Resent-Date: Tue, 8 Feb 2000 11:42:15 -0800 (PST)
From: kime@freeservers.com
Message-Id: <200002081939.OAA09063@ec1.maxime.net>
Date: Tue, 08 Feb 2000 13:35:33
To: <craigyarger@netscape.net>
X-Mailer: Microsoft Outlook Express 4.72.3110.7
Subject: Professional email services.
MIME-Version: 1.0
Content-Type: text/plain
X-In-Response-To: 087D4275A
MessageID: <5f1sh5f7ucvivtt.080220001335@LocalHost>
X-See-Also: 08760D117
X-MimeOLE: Produced By Microsoft MimeOLE V4.72.3110.3
Resent-Message-ID: <"kHnpCC.A.eW.WGHo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Thanks to the invention of the Internet.
Anyone can now market their ideas and products to
millions of people.

Imagine having a product or idea and selling it
for only $10.

Now imagine sending an ad for your product or idea
to 25 million people!

If you only get a 1/10 of 1% response
you have just made $250,000!!

You hear about people getting rich off
the Internet everyday on TV,
now is the perfect time for you
to jump in on all the action.

Targeted email works!!


Email marketing is the most cost effective
form of marketing available.
Call now to order 702-248-1057










We are terribly sorry if you have received this
message in error. If you wish to be removed go to
721064@caramail.com and type in the word "REMOVE"



From list@netscape.com  Tue Feb  8 15:31:35 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA10389
	for <ldapext-archive@odin.ietf.org>; Tue, 8 Feb 2000 15:31:34 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id MAA13240;
	Tue, 8 Feb 2000 12:28:46 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id MAA26419; Tue, 8 Feb 2000 12:30:28 -0800 (PST)
Resent-Date: Tue, 8 Feb 2000 12:30:28 -0800 (PST)
Message-Id: <3.0.5.32.20000208123016.0092f490@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Tue, 08 Feb 2000 12:30:16 -0800
To: "Mark Meredith" <MMEREDIT@novell.com>
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Re: please publish draft-mmeredith-rootdse-vendor-info-01.txt
Cc: <ietf-ldapext@netscape.com>
In-Reply-To: <s8a00a44.088@prv-mail20.provo.novell.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"j-wG.A.gcG.jzHo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Mark, a few comments:

I suggest that this draft be a informational elective feature.
I believe that prior operational experience with such features
have proven to be source of numerous interoperability problems.
You'll end up with clients that only support select versions
of select vendor products and other vendors resorting to
spoofing the vendor names/versions.  (We've already have
received requests (and patches) from users to do exactly
this!).

I suggest adding an applicability statement to the overview,
such as:
  This document describes an elective feature which LDAP
  servers MAY implement.

I then suggest that the applicability statement in each
attribute descriptions be replaced with a technical
specification.
  The value of vendorName contains the name of the vendor
  producing or providing server implementation.
  Example: "Novell, Inc."  

Likewise for vendorVersion:
  The value of vendorVersion contains the string indicating
  the version of the directory implementation.
  Example: "NDS 2100-r1.2.3/NT4SP3/US-crypto-128-1.1/TurboBlaster-v2 compat FooDir"

No matching rules are defined.  An EQUALITY
matching rule should minimally be defined.  I suggest
caseExactMatch.

Security Considerations:

You may want to add a note publishing specific vendor
information may be used by clients to determine what
security holes a server provides (by feature or flaw).

You may note that servers MAY restrict access to
vendorName/vendorVersion and clients SHOULD NOT
expect such attribute to be available.





From list@netscape.com  Tue Feb  8 15:45:54 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA10729
	for <ldapext-archive@odin.ietf.org>; Tue, 8 Feb 2000 15:45:51 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id MAA15900;
	Tue, 8 Feb 2000 12:43:02 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id MAA01881; Tue, 8 Feb 2000 12:44:46 -0800 (PST)
Resent-Date: Tue, 8 Feb 2000 12:44:46 -0800 (PST)
From: "Alexis Bor" <alexis.bor@directoryworks.com>
To: "Mark Meredith" <MMEREDIT@novell.com>
Cc: <ietf-ldapext@netscape.com>
Subject: RE: please publish draft-mmeredith-rootdse-vendor-info-01.txt
Date: Tue, 8 Feb 2000 12:43:50 -0800
Message-ID: <NDBBIIDPMPGNNDBGKGAJEEJDCMAA.alexis.bor@directoryworks.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
In-Reply-To: <s8a00a44.088@prv-mail20.provo.novell.com>
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2919.6700
Resent-Message-ID: <"aZ3-b.A.Hd.9AIo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Mark,
An initial reading of your draft raises lots of questions and concerns.  I
agree that from a client perspective, it would help to know how to behave in
specific situations.  At the same time, a server may want to also know how
to behave when communicating with another server.

It is a sad statement when client applications have to build up a knowledge
base to be able to work in every LDAP Server environment.  This raises the
value of groups like the Directory Interoperability Forum (DIF) - which
Novell and many others are members of.  I went to the last DIF meeting in
San Diego and wasn't fully convinced of their long-term relevance.  However,
I am now convinced that we need such an industry group to solve/document
interoperability issues.

Just think, when we have a directory of LDAP servers, you can quickly
connect to each server and build a profile of the brands that are out there
and maintain a census of brands and versions.  I don't know if this is good
or bad - but when I was a senior at UC Irvine, we had to take a class on the
"Social Impacts of Computing on Society".  This certainly would have been a
discussion topic.

Unfortunately, I don't see any other way for an application to manage its
behavior based on which vendor product it is connected to.  The current
process for LDAP standards has intentionally built a loose protocol that
makes behavior inconsistent between vendors.  This is chaos that most of us
are willing to live with.  Too bad...

-- Alexis

Alexis Bor
Directory Works, Inc.
alexis.bor@directoryworks.com
http://www.directoryworks.com

-----Original Message-----
From: Mark Meredith [mailto:MMEREDIT@novell.com]
Sent: Tuesday, February 08, 2000 11:21 AM
To: internet-drafts@ietf.org
Cc: ietf-ldapext@netscape.com
Subject: please publish draft-mmeredith-rootdse-vendor-info-01.txt

Please publish - this reflects the changes requested via feed back on
draft-00.

Please review this draft and submit comments.

-Mark

Mark Meredith
Novell Inc
122 E. 1700 S. Provo UT 84606
mark_meredith@novell.com
801-861-2645
---------------------
A boat in the harbor is safe,
but that is not what boats are for.
--John A. Shed
---------------------



From list@netscape.com  Tue Feb  8 18:08:42 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA13278
	for <ldapext-archive@odin.ietf.org>; Tue, 8 Feb 2000 18:08:41 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id PAA09659;
	Tue, 8 Feb 2000 15:05:54 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id PAA00989; Tue, 8 Feb 2000 15:07:33 -0800 (PST)
Resent-Date: Tue, 8 Feb 2000 15:07:33 -0800 (PST)
From: "David Chadwick" <d.w.chadwick@salford.ac.uk>
Organization: University of Salford
To: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>, ietf-ldapext@netscape.com
Date: Tue, 8 Feb 2000 23:07:04 -0000
MIME-Version: 1.0
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: 7BIT
Subject: Re: RFC2251: RootDSE subschemasubentry issue
Reply-to: d.w.chadwick@salford.ac.uk
Priority: normal
In-reply-to: <3.0.5.32.20000207094004.009392d0@infidel.boolean.net>
X-mailer: Pegasus Mail for Win32 (v3.12b)
Message-Id: <E12IJiG-0000wL-00@serv1.is1.u-net.net>
Resent-Message-ID: <"EZzfC.A.LP.0GKo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7BIT

Date forwarded: 	Mon, 7 Feb 2000 09:40:11 -0800 (PST)
Date sent:      	Mon, 07 Feb 2000 09:40:04 -0800
To:             	ietf-ldapext@netscape.com
From:           	"Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject:        	RFC2251: RootDSE subschemasubentry issue
Forwarded by:   	ietf-ldapext@netscape.com

> As previously noted <8525679B.003DD02B.00@D51MTA04.pok.ibm.com>,
> RFC 2251 states subschemaSubentry attribute type within the
> Root DSE may contain multiple values though the attribute type
> is single valued.

Sorry, I dont follow this. What do you mean by "THe attribute type is 
single valued." Do you mean the attribute type definition mandates a 
single valued attribute? This is surely wrong, as the definition must 
allow for multiple values.

> 
> I do not believe it necessary to provide a mechanism to allow
> clients to obtain a complete list of subschema entries (or
> subentries) known to this server. 

This is part of the confusion, and is due to poor wording in 2251. 
What the RFC is trying to say is "subschema entries known to be 
controlling the entries held in this server". It does not mean 
subschema entries anywhere in the world that this server happens to 
know about.  If you read further in the RFC you will find some 
limited clarification about subschema subentries for master and 
copy entries viz:

If the server does not master entries and does 
not know the locations
   of schema information, the subschemaSubentry 
attribute is not present
   in the root DSE.  If the server masters 
directory entries under one
   or more schema rules, there may be any number 
of values of the
   subschemaSubentry attribute in the root DSE.


Again, this is ambiguously worded, as "may be any 
number of values" should really be "will be an 
equivalent number of values"


> This list could be quite
> large and, IMO, rather useless.  Applications need to known
> which subschema controls which entries.

Agreed. This is due to a wrong interpretation of the RFC (due to 
ambiguous wording)

> 
> I suggest that applications obtain the DN of the subschema entry
> (subentry) from either the entry(ies) they intend to access or
> from the entry at the root of the naming context. 

In general a client may not know the root of the naming context, but 
will know the root of the DIT, hence the ability to find the subschema 
entry from the root.

> 
> To resolve this issue, I suggest:
> 
> RFC 2251, 3.4 "--subsubschemaSubentry" subsection be removed
> and that a note be added to the end of the section:

I disagree, but a better wording should be used.

> 
>   Note: the subsubschemaSubentry attribute type, if
>   present, contains the Distinguished Name of the
>   subschema entry (or subentry) which controls the
>   schema for the Root DSE.

This is wrong. The subschema subentry does not control the 
schema of the root DSE - nothing does. Rather it controls the 
schema of a naming context.

David

> 
> Comments?
> 
>  Kurt
> 
> 
> 


***************************************************

David Chadwick
IS Institute, University of Salford, Salford M5 4WT
Tel +44 161 295 5351  Fax +44 161 745 8169
Mobile +44 790 167 0359
Email D.W.Chadwick@salford.ac.uk
Home Page  http://www.salford.ac.uk/its024/chadwick.htm
Understanding X.500  http://www.salford.ac.uk/its024/X500.htm
X.500/LDAP Seminars http://www.salford.ac.uk/its024/seminars.htm
Entrust key validation string MLJ9-DU5T-HV8J

***************************************************



From list@netscape.com  Tue Feb  8 18:44:02 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA13592
	for <ldapext-archive@odin.ietf.org>; Tue, 8 Feb 2000 18:44:02 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id PAA05377;
	Tue, 8 Feb 2000 15:39:31 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id PAA14888; Tue, 8 Feb 2000 15:42:53 -0800 (PST)
Resent-Date: Tue, 8 Feb 2000 15:42:53 -0800 (PST)
Message-Id: <3.0.5.32.20000208154242.009699c0@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Tue, 08 Feb 2000 15:42:42 -0800
To: d.w.chadwick@salford.ac.uk
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Re: RFC2251: RootDSE subschemasubentry issue
Cc: ietf-ldapext@netscape.com
In-Reply-To: <E12IJiG-0000wL-00@serv1.is1.u-net.net>
References: <3.0.5.32.20000207094004.009392d0@infidel.boolean.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"QSayn.A.JoD.7nKo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 11:07 PM 2/8/00 -0000, David Chadwick wrote:
>> As previously noted <8525679B.003DD02B.00@D51MTA04.pok.ibm.com>,
>> RFC 2251 states subschemaSubentry attribute type within the
>> Root DSE may contain multiple values though the attribute type
>> is single valued.
>
>Sorry, I dont follow this. What do you mean by "THe attribute type is 
>single valued." Do you mean the attribute type definition mandates a 
>single valued attribute?

Yes.

RFC 2252, 5.1.5. subschemaSubentry 
   
   The value of this attribute is the name of a subschema entry (or
   subentry if the server is based on X.500(93)) in which the server
   makes available attributes specifying the schema.

    ( 2.5.18.10 NAME 'subschemaSubentry'
      EQUALITY distinguishedNameMatch
      SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 NO-USER-MODIFICATION
      SINGLE-VALUE USAGE directoryOperation )

>This is surely wrong, as the definition must 
>allow for multiple values.

I believe SINGLE-VALUED is appropriate as an entry can only
have one controlling subschema subentry.  I believe the
use of this attribute type when the RootDSE to list available
subschema subentries is inappropriate as it imparts no
knowledge to the client as to which value controls which
entries.

>If the server does not master entries and does 
>not know the locations
>   of schema information, the subschemaSubentry 
>attribute is not present
>   in the root DSE.  If the server masters 
>directory entries under one
>   or more schema rules, there may be any number 
>of values of the
>   subschemaSubentry attribute in the root DSE.

Which implies that the subschema controlling an
entry may not be listed in the RootDSE whilst other
subschemesubentries are listed, such as when the
entry is not mastered by the server (and subschema
not published this slaves), yet other name contexts
are.

>Again, this is ambiguously worded, as "may be any 
>number of values" should really be "will be an 
>equivalent number of values"

In the Root DSE, which subschemasubentry value(s) belongs to
which namingContexts value(s)?

>> To resolve this issue, I suggest:
>> 
>> RFC 2251, 3.4 "--subsubschemaSubentry" subsection be removed
>> and that a note be added to the end of the section:
>
>I disagree, but a better wording should be used.
>
>> 
>>   Note: the subsubschemaSubentry attribute type, if
>>   present, contains the Distinguished Name of the
>>   subschema entry (or subentry) which controls the
>>   schema for the Root DSE.
>
>This is wrong. The subschema subentry does not control the 
>schema of the root DSE - nothing does.

Something must... a client should be able to determine the
schema of attributes provided in the RootDSE and should
have some mechanism to determine which schema controls
the RootDSE.

>Rather it controls the 
>schema of a naming context.

Which naming context?

A server can support multiple naming contexts each with
different controlling subschemas.  The subschemasubentry
values of the RootDSE are fairly worthless without knownledge
of which value controls which naming context.



From list@netscape.com  Tue Feb  8 20:58:23 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA14667
	for <ldapext-archive@odin.ietf.org>; Tue, 8 Feb 2000 20:58:20 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id RAA05642;
	Tue, 8 Feb 2000 17:55:04 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id RAA05679; Tue, 8 Feb 2000 17:56:41 -0800 (PST)
Resent-Date: Tue, 8 Feb 2000 17:56:41 -0800 (PST)
Message-Id: <3.0.5.32.20000208175632.00960270@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Tue, 08 Feb 2000 17:56:32 -0800
To: ietf-ldapext@netscape.com
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Re: substring matching rules
In-Reply-To: <3.0.5.32.20000208113335.0095d8a0@infidel.boolean.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"BL5c5.A.dYB.YlMo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 11:33 AM 2/8/00 -0800, Kurt D. Zeilenga wrote:
>RFC 2252, 8.3 says:
>   ( 2.5.13.4 NAME 'caseIgnoreSubstringsMatch'
>    SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )
>   

Interesting enough, the inetOrgPerson draft says:

13.3.3.  Additional matching rules from X.520

    ( 2.5.13.5 NAME 'caseExactMatch'
      SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
    
    ( 2.5.13.7 NAME 'caseExactSubstringsMatch'
      SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )

I don't have a copy of X.520 to confirm correctness.  But
appear so.  When used in a substrings filter, the asserted
substrings are each of directoryString syntax, not each a
substringsAssertion syntax.

The caseIgnoreSubstringsMatch implies that in a substrings
filter, each of the asserted substrings are each of
substringsAssertion syntax.  This is incorrect.  Each should
be a directoryString.

I believe two matching rules, one for substrings filters
and one for extended matching using substrings assertions,
are needed for every match algorithm.   That is:

  ( <OID>.1 NAME 'mySubstringsMatch'
	DESC 'for use with substring filters'
	SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
  ( <OID>.2 NAME 'mySubstringsExtendedMatch'
	DESC 'for use with extended match filters'
	SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )

(where <OID> is replaced with some valid OID).




From list@netscape.com  Wed Feb  9 00:25:38 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA18827
	for <ldapext-archive@odin.ietf.org>; Wed, 9 Feb 2000 00:24:29 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id VAA21958;
	Tue, 8 Feb 2000 21:21:29 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id VAA25953; Tue, 8 Feb 2000 21:23:00 -0800 (PST)
Resent-Date: Tue, 8 Feb 2000 21:23:00 -0800 (PST)
Message-ID: <007b01bf72bd$f47a3ba0$90071896@sktelecom.com>
From: =?ks_c_5601-1987?B?wMy1v7Hi?= <galahad@sktelecom.com>
To: <ietf-ldapext@netscape.com>
Subject: Question about OID(Object Identifier)
Date: Wed, 9 Feb 2000 14:24:20 +0900
MIME-Version: 1.0
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_0072_01BF7309.5A90C440"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.00.2919.6600
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2919.6600
Resent-Message-ID: <"DrnvWC.A._UG.vmPo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

This is a multi-part message in MIME format.

------=_NextPart_000_0072_01BF7309.5A90C440
Content-Type: text/plain;
	charset="ks_c_5601-1987"
Content-Transfer-Encoding: base64
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------=_NextPart_000_0072_01BF7309.5A90C440
Content-Type: text/html;
	charset="ks_c_5601-1987"
Content-Transfer-Encoding: base64
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==

------=_NextPart_000_0072_01BF7309.5A90C440--



From list@netscape.com  Wed Feb  9 08:26:17 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA05525
	for <ldapext-archive@odin.ietf.org>; Wed, 9 Feb 2000 08:26:16 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id FAA20519;
	Wed, 9 Feb 2000 05:23:29 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id FAA21736; Wed, 9 Feb 2000 05:25:11 -0800 (PST)
Resent-Date: Wed, 9 Feb 2000 05:25:11 -0800 (PST)
Date: Wed, 09 Feb 2000 07:24:05 -0600
From: Mark Wahl <M.Wahl@INNOSOFT.COM>
Subject: Re: RFC2251: RootDSE subschemasubentry issue
In-reply-to: "Your message of Mon, 07 Feb 2000 09:40:04 PST."
 <3.0.5.32.20000207094004.009392d0@infidel.boolean.net>
Sender: Mark.Wahl@INNOSOFT.COM
To: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Cc: ietf-ldapext@netscape.com
Message-id: <7078.950102645@threadgill.austin.innosoft.com>
Resent-Message-ID: <"2Yx4-C.A.WTF.2qWo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


The role of the subschemaSubentry attribute of the root DSE was discussed on
the IETF-ASID mailing list during the design of LDAPv3.   It provides an 
important adminstrative function to allow management clients to determine the
capabilities of an LDAP server and the data it contains.  

Mark Wahl, Directory Product Architect
Innosoft International, Inc.



From list@netscape.com  Wed Feb  9 08:29:05 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA05561
	for <ldapext-archive@odin.ietf.org>; Wed, 9 Feb 2000 08:29:05 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id FAA03711;
	Wed, 9 Feb 2000 05:24:33 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id FAA22633; Wed, 9 Feb 2000 05:27:56 -0800 (PST)
Resent-Date: Wed, 9 Feb 2000 05:27:56 -0800 (PST)
Date: Wed, 09 Feb 2000 07:26:51 -0600
From: Mark Wahl <M.Wahl@INNOSOFT.COM>
Subject: Re: substring matching rules
In-reply-to: "Your message of Tue, 08 Feb 2000 17:56:32 PST."
 <3.0.5.32.20000208175632.00960270@infidel.boolean.net>
Sender: Mark.Wahl@INNOSOFT.COM
To: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Cc: ietf-ldapext@netscape.com
Message-id: <7416.950102811@threadgill.austin.innosoft.com>
Resent-Message-ID: <"S3Yw6D.A.XhF.btWo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


Thanks for pointing out this discrepancy in inetorgperson section 13.3.3. 
I'll check with X.501/X.520 and suggest a change to Mark Smith.

Mark Wahl, Directory Product Architect
Innosoft International, Inc.



From list@netscape.com  Wed Feb  9 10:06:00 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA07646
	for <ldapext-archive@odin.ietf.org>; Wed, 9 Feb 2000 10:05:59 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id HAA10464;
	Wed, 9 Feb 2000 07:01:48 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id HAA14695; Wed, 9 Feb 2000 07:05:17 -0800 (PST)
Resent-Date: Wed, 9 Feb 2000 07:05:17 -0800 (PST)
Message-ID: <38A181E4.C683919C@netscape.com>
Date: Wed, 09 Feb 2000 10:04:04 -0500
From: mcs@netscape.com (Mark C Smith)
Organization: iPlanet E-Commerce Solutions
X-Mailer: Mozilla 4.7 [en] (WinNT; U)
X-Accept-Language: en
MIME-Version: 1.0
To: Mark Wahl <M.Wahl@INNOSOFT.COM>
CC: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>, ietf-ldapext@netscape.com
Subject: Re: substring matching rules
References: <7416.950102811@threadgill.austin.innosoft.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"JA1JBC.A.VlD.sIYo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Mark Wahl wrote:
> 
> Thanks for pointing out this discrepancy in inetorgperson section 13.3.3.
> I'll check with X.501/X.520 and suggest a change to Mark Smith.

Yes, this looks like a bug in the inetOrgPerson document... to match
X.520, the definition of caseExactSubstringsMatch should be:

    ( 2.5.13.7 NAME 'caseExactSubstringsMatch'
      SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )

I replaced the DirectoryString syntax OID with the OID for
SubstringAssertion.  Correct?

According to X.520, the values that make up a Substring Assertion are
each of syntax DirectoryString:

  6.1.3 Case Ignore Substrings Match

  The Case Ignore Substrings Match rule determines whether a presented
  value is a substring of an attribute value of type DirectoryString,
  without regard to the case (upper or lower) of the strings. 

  caseIgnoreSubstringsMatch MATCHING-RULE ::= {
     SYNTAX SubstringAssertion
     ID id-mr-caseIgnoreSubstringsMatch }

  SubstringAssertion ::= SEQUENCE OF CHOICE {
     initial [0] DirectoryString {ub-match},
     any [1] DirectoryString {ub-match},
     final [2] DirectoryString {ub-match} }
          -- at most one initial and one final component

Kurt, I think the syntaxes associated with matching rules refer to the
syntax of a presented value, e.g., a value that is in a search filter. 
That's how I think about it anyway....

-- 
Mark Smith
Directory Product Development / iPlanet E-Commerce Solutions
My words are my own, not my employer's.            Got LDAP?



From list@netscape.com  Wed Feb  9 10:08:34 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA07675
	for <ldapext-archive@odin.ietf.org>; Wed, 9 Feb 2000 10:08:33 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id HAA10966;
	Wed, 9 Feb 2000 07:04:02 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id HAA15550; Wed, 9 Feb 2000 07:07:31 -0800 (PST)
Resent-Date: Wed, 9 Feb 2000 07:07:31 -0800 (PST)
From: "Peter Strong" <pestrong@nortelnetworks.com>
To: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>,
        Mark Meredith <MMEREDIT@novell.com>
Cc: ietf-ldapext <ietf-ldapext@netscape.com>
Subject: RE: please publish draft-mmeredith-rootdse-vendor-info-01.txt
Date: Wed, 9 Feb 2000 10:10:06 -0500
Message-ID: <002401bf730f$bf525190$3750fb8d@net-pstrong.corpnorth.baynetworks.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook 8.5, Build 4.71.2173.0
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V4.72.3110.3
In-Reply-To: <3.0.5.32.20000208123016.0092f490@infidel.boolean.net>
Resent-Message-ID: <"ySUQRB.A.syD.zKYo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Kurt/Mark

> From: Kurt D. Zeilenga [mailto:Kurt@OpenLDAP.org]
> Sent: Tuesday, February 08, 2000 3:30 PM
> To: Mark Meredith
> Cc: ietf-ldapext
> Subject: Re: please publish draft-mmeredith-rootdse-vendor-info-01.txt
>
> Mark, a few comments:
>
> I suggest that this draft be a informational elective feature.

As a designer of products that have to support multiple directory
implementations, I have to disagree. Vendor identification information
should be mandatory in all directory implementations until such time
as vendors get together, solve their differences and make their
directory implementations truely interoperable. (I'm not holding
my breath for this momentous event!)

> I believe that prior operational experience with such features
> have proven to be source of numerous interoperability problems.

I don't think that providing useful information is the source of
interoperability problems.

The source of interoperability problems is the basic fact that vendors
will always implement part or all of a standard in order to say that they
comply and will then add other features/bells/whistles to differentiate
their product from their competitor's. This may cause some clients
difficulties, but it's the way the world works and the way that new
technologies are introduced and (eventually) standardized.

As we progress with directory technology, more and more of the basic
standards are implemented by vendors, but this implementation takes
place at different rates for different vendors. Knowing the vendor
and the version via a "standard" mechanism simply makes it easier
to determine what implementation you're talking to and what
"implementation quirks" might exist. I think Mark makes it clear
that clients shouldn't depend on this information too heavily:

     The use of vendorName and vendorVersion SHOULD NOT be used to
     discover features. It is just an informational attribute. If a
     client relies on a vendorVersion number then that client MUST
     be coded to work with later versions and not just one version and
     no other.

> You'll end up with clients that only support select versions
> of select vendor products and other vendors resorting to
> spoofing the vendor names/versions.  (We've already have
> received requests (and patches) from users to do exactly
> this!).

This is like saying that indicator lights on cars are dangerous because a
driver may signal one way and turn the other; therefore, we shouldn't have
signal lights on cars!

If you're stupid enough to develop a client with hard-coded limits based
on this information, you get what you deserve!

If you have vendors spoofing this information, they'll get what they
deserve - in the marketplace!


All debate aside, this "feature" is simple, straightforward and useful
to those of us who must attempt to integrate our products with multiple
directory implementations.

We're currently faced with delivering product that must interwork with
Netscape, Novell, Active Directory and an in-house directory, with
others on the way. As one example of what we have to deal with, each of
these directories has a subtly different way of altering the schema
definitions (even though there is a standard for this behaviour). We
currently have to perform some really disgusting, poking and prodding to
determine what type of directory we're talking to in order to perform the
schema changes properly. We'd rather just query some attributes at a
well-known location and perform the appropriate schema update based on that
information.

Directory implementations will always have differences. It's that simple.

If we're arguing about such a simple addition on the basis that it may
disrupt the ivory tower of interoperability, I fail to see how far more
complex aspects of directory usage will ever be standardized or agreed to.


> I suggest adding an applicability statement to the overview,
> such as:
>   This document describes an elective feature which LDAP
>   servers MAY implement.
>
> I then suggest that the applicability statement in each
> attribute descriptions be replaced with a technical
> specification.
>   The value of vendorName contains the name of the vendor
>   producing or providing server implementation.
>   Example: "Novell, Inc."
>
> Likewise for vendorVersion:
>   The value of vendorVersion contains the string indicating
>   the version of the directory implementation.
>   Example: "NDS
> 2100-r1.2.3/NT4SP3/US-crypto-128-1.1/TurboBlaster-v2 compat FooDir"
>
> No matching rules are defined.  An EQUALITY
> matching rule should minimally be defined.  I suggest
> caseExactMatch.
>
> Security Considerations:
>
> You may want to add a note publishing specific vendor
> information may be used by clients to determine what
> security holes a server provides (by feature or flaw).
>
> You may note that servers MAY restrict access to
> vendorName/vendorVersion and clients SHOULD NOT
> expect such attribute to be available.
>
>
>

Regards,

  Peter

------------------------------------------------------------------------
Peter Strong
Software Architect
Nortel Networks - Optivity Policy Services (OPS) and NetID
pestrong@nortelnetworks.com <mailto:pestrong@nortelnetworks.com>
(613) 831-6615





From list@netscape.com  Wed Feb  9 10:48:31 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA08399
	for <ldapext-archive@odin.ietf.org>; Wed, 9 Feb 2000 10:48:30 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id HAA03029;
	Wed, 9 Feb 2000 07:45:36 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id HAA25999; Wed, 9 Feb 2000 07:47:19 -0800 (PST)
Resent-Date: Wed, 9 Feb 2000 07:47:19 -0800 (PST)
Message-ID: <EB21C070AA75D311A0AC0090271EC45C01427BF2@us-tr-exch-1.tr.unisys.com>
From: "Salter, Thomas A" <Thomas.Salter@unisys.com>
To: ietf-ldapext@netscape.com
Subject: RE: substring matching rules
Date: Wed, 9 Feb 2000 10:48:18 -0500 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.21)
Content-Type: text/plain;
	charset="iso-8859-1"
Resent-Message-ID: <"wLEzoB.A.7VG.FwYo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Here's the X.511 definition of Filter.  The need for two matching rules
arises from the definition of substrings as three different value components
each having the syntax of the substrings matching rule.  The extensibleMatch
component has only a single value component which, for a substring match,
must be the same SEQUENCE defined in the strings component of the substrings
filter item.
 
Filter	::=	CHOICE {
	item	[0]	FilterItem,
	and	[1]	SET OF Filter,
	or	[2]	SET OF Filter,
	not	[3]	Filter }
FilterItem	::=	CHOICE {
	equality	[0]	AttributeValueAssertion,
	substrings	[1]	SEQUENCE {
	  type	ATTRIBUTE.&id({SupportedAttributes}),
	  strings	SEQUENCE OF CHOICE {
	    initial	[0]  ATTRIBUTE.&Type
	               ({SupportedAttributes}{@substrings.type}),
	    any	[1]  ATTRIBUTE.&Type
	               ({SupportedAttributes}{@substrings.type}),
	    final	[2]  ATTRIBUTE.&Type
	               ({SupportedAttributes}{@substrings.type})}},
	greaterOrEqual	[2]	AttributeValueAssertion,
	lessOrEqual	[3]	AttributeValueAssertion,
	present	[4]	AttributeType,
	approximateMatch 	[5]	AttributeValueAssertion,
	extensibleMatch	[6]	MatchingRuleAssertion }
MatchingRuleAssertion ::= SEQUENCE {
	matchingRule	[1]	SET SIZE (1..MAX) OF MATCHING-RULE.&id,
	type	[2]	AttributeType  OPTIONAL,
	matchValue	[3]	MATCHING-RULE.&AssertionType ( CONSTRAINED
BY {
	-  matchValue must be a value of  type specified by the
&AssertionType field of 
	-- one of the MATCHING-RULE information objects identified by
matchingRule -- } ),
	dnAttributes	[4]	BOOLEAN DEFAULT FALSE }



 > -----Original Message-----
 > From: Kurt D. Zeilenga [mailto:Kurt@OpenLDAP.org]
 > Sent: Tuesday, February 08, 2000 8:57 PM
 > To: ietf-ldapext@netscape.com
 > Subject: Re: substring matching rules
 > 
 > 
 > At 11:33 AM 2/8/00 -0800, Kurt D. Zeilenga wrote:
 > >RFC 2252, 8.3 says:
 > >   ( 2.5.13.4 NAME 'caseIgnoreSubstringsMatch'
 > >    SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )
 > >   
 > 
 > Interesting enough, the inetOrgPerson draft says:
 > 
 > 13.3.3.  Additional matching rules from X.520
 > 
 >     ( 2.5.13.5 NAME 'caseExactMatch'
 >       SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
 >     
 >     ( 2.5.13.7 NAME 'caseExactSubstringsMatch'
 >       SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
 > 
 > I don't have a copy of X.520 to confirm correctness.  But
 > appear so.  When used in a substrings filter, the asserted
 > substrings are each of directoryString syntax, not each a
 > substringsAssertion syntax.
 > 
 > The caseIgnoreSubstringsMatch implies that in a substrings
 > filter, each of the asserted substrings are each of
 > substringsAssertion syntax.  This is incorrect.  Each should
 > be a directoryString.
 > 
 > I believe two matching rules, one for substrings filters
 > and one for extended matching using substrings assertions,
 > are needed for every match algorithm.   That is:
 > 
 >   ( <OID>.1 NAME 'mySubstringsMatch'
 > 	DESC 'for use with substring filters'
 > 	SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
 >   ( <OID>.2 NAME 'mySubstringsExtendedMatch'
 > 	DESC 'for use with extended match filters'
 > 	SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )
 > 
 > (where <OID> is replaced with some valid OID).
 > 
 > 



From list@netscape.com  Wed Feb  9 10:52:39 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA08555
	for <ldapext-archive@odin.ietf.org>; Wed, 9 Feb 2000 10:52:38 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id HAA16057;
	Wed, 9 Feb 2000 07:48:02 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id HAA27530; Wed, 9 Feb 2000 07:51:29 -0800 (PST)
Resent-Date: Wed, 9 Feb 2000 07:51:29 -0800 (PST)
Date: Wed, 09 Feb 2000 09:50:14 -0600
From: Mark Wahl <M.Wahl@INNOSOFT.COM>
Subject: Re: please publish draft-mmeredith-rootdse-vendor-info-01.txt
In-reply-to: "Your message of Tue, 08 Feb 2000 12:20:34 MST."
 <s8a00a44.088@prv-mail20.provo.novell.com>
Sender: Mark.Wahl@INNOSOFT.COM
To: Mark Meredith <MMEREDIT@novell.com>
Cc: ietf-ldapext@netscape.com
Message-id: <24386.950111414@threadgill.austin.innosoft.com>
Resent-Message-ID: <"YmyTMB.A.ztG.A0Yo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


Again, I believe this is the wrong approach to specifying server behavior 
and will not lead to interoperable clients.  

If there is a element of service X which two or more vendors implement 
differently, then there should be a proposal for a new attribute or similar
for the server to advertise how it implements X.

For example,

allowsMultipleSubschemas: TRUE

or

accessControlScheme: 1.2.3.4

A standards-track proposal would be best for each, because during the course
of discussion on the mailing list, we may find that the root DSE it not the 
best place for it, or there are more than an anticipated number of approaches
and so what was a BOOLEAN option flag might be better described some other way.

E.g. if a server uses chaining to automatically forward operations in a 
naming context to other servers which is a different implementation, then the 
capabilities that the chaining initiating server might advertise would 
potentially be more than if the server was not chaining.

Another example.  A server implementation allows the subschema subentry to
be modified to introduce new object classes, for compatibility with 
Netscape-oriented clients. It also allows subsubentries to be created below 
the subschema subentry to introduce new object classes, for compatibility with
Active Directory-oriented clients.  That server would advertise:

allowsSubschemaEntryModification: TRUE
implementsSubschemaLikeActiveDirectory: TRUE


> If a client relies on a vendorVersion number then that client MUST
> be coded to work with later versions and not just one version and
> no other.

I don't see how this would work at all.  If the first version of the server
ships on 1-JAN-2000, the client ships on 1-JAN-2001 and the next version of 
the server makes an incompatible change to something and ships on 1-JAN-2002,
that would mean that the client would need to know a year in advance what 
non-backwards compatible changes would be made.

Mark Wahl, Directory Product Architect
Innosoft International, Inc.



From list@netscape.com  Wed Feb  9 10:58:51 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA08652
	for <ldapext-archive@odin.ietf.org>; Wed, 9 Feb 2000 10:58:50 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id HAA05134;
	Wed, 9 Feb 2000 07:56:04 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id HAA29277; Wed, 9 Feb 2000 07:57:48 -0800 (PST)
Resent-Date: Wed, 9 Feb 2000 07:57:48 -0800 (PST)
Message-Id: <s8a12c07.018@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.2.1
Date: Wed, 09 Feb 2000 08:57:38 -0700
From: "Roger Harrison" <RHARRISON@novell.com>
To: <M.Wahl@INNOSOFT.COM>, "Mark Meredith" <MMEREDIT@novell.com>
Cc: <ietf-ldapext@netscape.com>
Subject: Re: please publish draft-mmeredith-rootdse-vendor-info-01.txt
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Resent-Message-ID: <"Dg2Hk.A.EJH.75Yo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ietf.org id KAA08652

I agree wholeheartedly with your thoughts.  For documented server features, the best way to specify server behavior is by some standard mechanism.  There could even be some sort of grading provided to allow servers to specify which portions of a feature are implemented.

However, every server implementation has "quirks" (also sometimes known as bugs), which may not be known in advance of shipping the server.  A client that wants to interoperate with a server that doesn't do something quite right can be greatly aided if it knows the server's vendor and version.  Often there's a way to work around quirky behavior if that information is available.

Roger Harrison
Novell, Inc.

>>> Mark Wahl <M.Wahl@INNOSOFT.COM> 02/09/00 08:51AM >>>

Again, I believe this is the wrong approach to specifying server behavior 
and will not lead to interoperable clients.  

If there is a element of service X which two or more vendors implement 
differently, then there should be a proposal for a new attribute or similar
for the server to advertise how it implements X.

For example,

allowsMultipleSubschemas: TRUE

or

accessControlScheme: 1.2.3.4

A standards-track proposal would be best for each, because during the course
of discussion on the mailing list, we may find that the root DSE it not the 
best place for it, or there are more than an anticipated number of approaches
and so what was a BOOLEAN option flag might be better described some other way.

E.g. if a server uses chaining to automatically forward operations in a 
naming context to other servers which is a different implementation, then the 
capabilities that the chaining initiating server might advertise would 
potentially be more than if the server was not chaining.

Another example.  A server implementation allows the subschema subentry to
be modified to introduce new object classes, for compatibility with 
Netscape-oriented clients. It also allows subsubentries to be created below 
the subschema subentry to introduce new object classes, for compatibility with
Active Directory-oriented clients.  That server would advertise:

allowsSubschemaEntryModification: TRUE
implementsSubschemaLikeActiveDirectory: TRUE


> If a client relies on a vendorVersion number then that client MUST
> be coded to work with later versions and not just one version and
> no other.

I don't see how this would work at all.  If the first version of the server
ships on 1-JAN-2000, the client ships on 1-JAN-2001 and the next version of 
the server makes an incompatible change to something and ships on 1-JAN-2002,
that would mean that the client would need to know a year in advance what 
non-backwards compatible changes would be made.

Mark Wahl, Directory Product Architect
Innosoft International, Inc.




From list@netscape.com  Wed Feb  9 11:47:58 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA10186
	for <ldapext-archive@odin.ietf.org>; Wed, 9 Feb 2000 11:47:57 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id IAA23609;
	Wed, 9 Feb 2000 08:43:24 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id IAA22675; Wed, 9 Feb 2000 08:46:53 -0800 (PST)
Resent-Date: Wed, 9 Feb 2000 08:46:53 -0800 (PST)
Date: Wed, 09 Feb 2000 10:45:43 -0600
From: Mark Wahl <M.Wahl@INNOSOFT.COM>
Subject: Re: please publish draft-mmeredith-rootdse-vendor-info-01.txt
In-reply-to: "Your message of Wed, 09 Feb 2000 08:57:38 MST."
 <s8a12c07.018@prv-mail20.provo.novell.com>
Sender: Mark.Wahl@INNOSOFT.COM
To: Roger Harrison <RHARRISON@novell.com>
Cc: Mark Meredith <MMEREDIT@novell.com>, ietf-ldapext@netscape.com
Message-id: <1014.950114743@threadgill.austin.innosoft.com>
Resent-Message-ID: <"sl9WpB.A.-hF.8nZo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


> However, every server implementation has "quirks" (also sometimes known as 
> bugs), which may not be known in advance of shipping the server. 

Correct.  My concern is primarily that the draft is proposing also doing 
feature selection with this.  I don't have a problem in general with using 
version names and numbers for bug detection though, so long as the client 
behavior is specified along the lines of

 If the client does not recognize the specific vendor/version as one it has
 its 'bug workaround needed' table, then the client must assume that the 
 server it is talking to is complete and correct. 

Mark Wahl, Directory Product Architect
Innosoft International, Inc.



From list@netscape.com  Wed Feb  9 11:51:16 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA10292
	for <ldapext-archive@odin.ietf.org>; Wed, 9 Feb 2000 11:51:10 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id IAA24696;
	Wed, 9 Feb 2000 08:46:35 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id IAA25864; Wed, 9 Feb 2000 08:50:03 -0800 (PST)
Resent-Date: Wed, 9 Feb 2000 08:50:03 -0800 (PST)
Message-Id: <3.0.5.32.20000209084941.00939140@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Wed, 09 Feb 2000 08:49:41 -0800
To: Mark Wahl <M.Wahl@INNOSOFT.COM>
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Re: RFC2251: RootDSE subschemasubentry issue
Cc: ietf-ldapext@netscape.com
In-Reply-To: <7078.950102645@threadgill.austin.innosoft.com>
References: <"Your message of Mon, 07 Feb 2000 09:40:04 PST." <3.0.5.32.20000207094004.009392d0@infidel.boolean.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"AxShc.A.ISG.4qZo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 07:24 AM 2/9/00 -0600, Mark Wahl wrote:
>The role of the subschemaSubentry attribute of the root DSE was discussed on
>the IETF-ASID mailing list during the design of LDAPv3.

Are the archives to the IETF-ASID mailing list still available?

>It provides an important adminstrative function to allow management
>clients to determine the capabilities of an LDAP server and the data
>it contains.  

A couple of questions:

How does a client determine which subschema subentry controls the
RootDSE?  David said that this wasn't needed.  I disagre. The RootDSE
may contain additional attributes to which the client may desire to
access and hence may desire to discover schema for. It's possible that
attribute type "foo" be listed differently in two different subschemas
(because each was being separately maintained).  Which defines "foo"
as used in the Root DSE?

But how can an attribute type restricted to SINGLE-VALUE (RFC 2252)
take on multiple values as prescribed (RFC 2251)?   Seems that one
of the two documents must be in error.

Kurt



From list@netscape.com  Wed Feb  9 12:09:25 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA10935
	for <ldapext-archive@odin.ietf.org>; Wed, 9 Feb 2000 12:09:22 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id JAA28047;
	Wed, 9 Feb 2000 09:04:41 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id JAA04276; Wed, 9 Feb 2000 09:08:10 -0800 (PST)
Resent-Date: Wed, 9 Feb 2000 09:08:10 -0800 (PST)
Message-Id: <3.0.5.32.20000209090759.0097bc80@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Wed, 09 Feb 2000 09:07:59 -0800
To: mcs@netscape.com (Mark C Smith)
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Re: substring matching rules
Cc: Mark Wahl <M.Wahl@INNOSOFT.COM>, ietf-ldapext@netscape.com
In-Reply-To: <38A181E4.C683919C@netscape.com>
References: <7416.950102811@threadgill.austin.innosoft.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"lDsJO.A.iCB.57Zo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

So, if I want to define a bitString substring matching rule
where each asserted component is a bitString, I should define
a bitStringSubstrings (assertion) syntax and than use this as
the syntax of asserted values of bitStringSubstringsMatch?

Okay, so why?

( 2.5.13.10 NAME 'numericStringSubstringsMatch'
    SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )

This says that each asserted substring component is of
directoryString syntax.  I would think each asserted substring
component should be of numericString syntax.




From list@netscape.com  Wed Feb  9 12:48:30 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA12668
	for <ldapext-archive@odin.ietf.org>; Wed, 9 Feb 2000 12:48:30 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id JAA04419;
	Wed, 9 Feb 2000 09:43:43 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id JAA23447; Wed, 9 Feb 2000 09:47:12 -0800 (PST)
Resent-Date: Wed, 9 Feb 2000 09:47:12 -0800 (PST)
Message-Id: <s8a145a8.027@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.2.1
Date: Wed, 09 Feb 2000 10:46:56 -0700
From: "Mark Meredith" <MMEREDIT@novell.com>
To: <M.Wahl@INNOSOFT.COM>, "Roger Harrison" <RHARRISON@novell.com>
Cc: <ietf-ldapext@netscape.com>
Subject: Re: please publish draft-mmeredith-rootdse-vendor-info-01.txt
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="=_5108C508.ED8CB993"
Resent-Message-ID: <"w22QmC.A.tsF.cgao4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

This is a MIME message. If you are reading this text, you may want to 
consider changing to a mail reader or gateway that understands how to 
properly handle MIME multipart messages.

--=_5108C508.ED8CB993
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: quoted-printable

I will add your suggestion to section 6  Notes to Client Developers. To =
read something like this.

6. Notes to Client Developers

     The use of vendorName and vendorVersion SHOULD NOT be used to
     discover features. It is just an informational attribute. If a
     client relies on a vendorVersion number then that client MUST
     be coded to work with later versions and not just one version and
     no other.

     If the client does not recognize the specific vendorName/vendorVersion=
 as=20
     one it has for its 'bug workaround needed' table, then the client =
MUST=20
     assume that the server it is talking to is complete and correct.=20

Does this look ok?

-Mark


Mark Meredith
Novell Inc
122 E. 1700 S. Provo UT 84606
mark_meredith@novell.com
801-861-2645
---------------------
A boat in the harbor is safe,=20
but that is not what boats are for.
--John A. Shed
---------------------

>>> Mark Wahl <M.Wahl@INNOSOFT.COM> 02/09/00 09:45AM >>>

> However, every server implementation has "quirks" (also sometimes known =
as=20
> bugs), which may not be known in advance of shipping the server.=20

Correct.  My concern is primarily that the draft is proposing also =
doing=20
feature selection with this.  I don't have a problem in general with =
using=20
version names and numbers for bug detection though, so long as the =
client=20
behavior is specified along the lines of

If the client does not recognize the specific vendor/version as one it has
its 'bug workaround needed' table, then the client must assume that the=20
server it is talking to is complete and correct.=20

Mark Wahl, Directory Product Architect
Innosoft International, Inc.

--=_5108C508.ED8CB993
Content-Type: text/html; charset=US-ASCII
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD W3 HTML//EN">
<HTML>
<HEAD>

<META content="text/html; charset=iso-8859-1" http-equiv=Content-Type>
<META content='"MSHTML 4.72.3110.7"' name=GENERATOR>
</HEAD>
<BODY bgColor=#ffffff 
style="FONT: 10pt Arial; MARGIN-LEFT: 2px; MARGIN-TOP: 2px">
<DIV>I will add your suggestion to section 6&nbsp; Notes to Client Developers. 
To read something like this.</DIV>
<DIV><BR>6. Notes to Client Developers</DIV>
<DIV>&nbsp;</DIV>
<DIV>&nbsp;&nbsp;&nbsp;&nbsp; The use of vendorName and vendorVersion SHOULD NOT 
be used to<BR>&nbsp;&nbsp;&nbsp;&nbsp; discover features. It is just an 
informational attribute. If a<BR>&nbsp;&nbsp;&nbsp;&nbsp; client relies on a 
vendorVersion number then that client MUST<BR>&nbsp;&nbsp;&nbsp;&nbsp; be coded 
to work with later versions and not just one version 
and<BR>&nbsp;&nbsp;&nbsp;&nbsp; no other.</DIV>
<DIV>&nbsp;</DIV>
<DIV>&nbsp;&nbsp;&nbsp;&nbsp; If the client does not recognize the specific 
vendorName/vendorVersion as </DIV>
<DIV>&nbsp;&nbsp;&nbsp;&nbsp; one it has for its 'bug workaround needed' table, 
then the client MUST </DIV>
<DIV>&nbsp;&nbsp;&nbsp;&nbsp; assume that the server it is talking to is 
complete and correct. </DIV>
<DIV>&nbsp;</DIV>
<DIV>Does this look ok?</DIV>
<DIV>&nbsp;</DIV>
<DIV>-Mark<BR></DIV>
<DIV>&nbsp;</DIV>
<DIV>Mark Meredith<BR>Novell Inc<BR>122 E. 1700 S. Provo UT 84606<BR><A 
href="mailto:mark_meredith@novell.com">mark_meredith@novell.com</A><BR>801-861-2645<BR>---------------------<BR>A 
boat in the harbor is safe, <BR>but that is not what boats are for.<BR>--John A. 
Shed<BR>---------------------<BR><BR>&gt;&gt;&gt; Mark Wahl 
&lt;M.Wahl@INNOSOFT.COM&gt; 02/09/00 09:45AM &gt;&gt;&gt;<BR><BR>&gt; However, 
every server implementation has &quot;quirks&quot; (also sometimes known as 
<BR>&gt; bugs), which may not be known in advance of shipping the server. 
<BR><BR>Correct.&nbsp; My concern is primarily that the draft is proposing also 
doing <BR>feature selection with this.&nbsp; I don't have a problem in general 
with using <BR>version names and numbers for bug detection though, so long as 
the client <BR>behavior is specified along the lines of<BR><BR>If the client 
does not recognize the specific vendor/version as one it has<BR>its 'bug 
workaround needed' table, then the client must assume that the <BR>server it is 
talking to is complete and correct. <BR><BR>Mark Wahl, Directory Product 
Architect<BR>Innosoft International, Inc.<BR></DIV></BODY></HTML>

--=_5108C508.ED8CB993--



From list@netscape.com  Wed Feb  9 13:09:50 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA13947
	for <ldapext-archive@odin.ietf.org>; Wed, 9 Feb 2000 13:09:47 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id KAA09325;
	Wed, 9 Feb 2000 10:05:06 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id KAA06439; Wed, 9 Feb 2000 10:08:34 -0800 (PST)
Resent-Date: Wed, 9 Feb 2000 10:08:34 -0800 (PST)
Message-Id: <3.0.5.32.20000209100822.00976100@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Wed, 09 Feb 2000 10:08:22 -0800
To: ietf-ldapext@netscape.com
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: unsolicited controls  (Was: I-D
  ACTION:draft-weltman-ldapv3-auth-response-01.txt)
In-Reply-To: <200002091641.LAA09935@ietf.org>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"LJvB9.A.8jB.g0ao4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

I like to voice a general concern about unsolicited response
controls.  That is, controls provided by servers without the
client implicit or explicit solicitating the control.

I believe we should discourage unsolicited controls in responses.

As the number of such controls increase, which is inevidable,
clients and networks will be overloaded with unneeded information.
It would prudent, IMO, to provide and encourage use of client
solicatation of desired information.  That is, our general
protocol model is one of client request/server response.  I
see no overriding reason why this particular control should
not be sent without solicitation.

I suggest that this response control be explicitly solicited
by the client via a request control.

	Kurt



From list@netscape.com  Wed Feb  9 13:11:26 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA14077
	for <ldapext-archive@odin.ietf.org>; Wed, 9 Feb 2000 13:11:24 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id KAA23835;
	Wed, 9 Feb 2000 10:08:14 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id KAA07629; Wed, 9 Feb 2000 10:09:58 -0800 (PST)
Resent-Date: Wed, 9 Feb 2000 10:09:58 -0800 (PST)
Message-ID: <38A1ADB6.6AA56D34@netscape.com>
Date: Wed, 09 Feb 2000 10:11:02 -0800
From: dboreham@netscape.com (David Boreham)
X-Mailer: Mozilla 4.7 [en] (WinNT; U)
X-Accept-Language: en
MIME-Version: 1.0
To: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
CC: ietf-ldapext@netscape.com
Subject: Re: unsolicited controls  (Was: 
 I-DACTION:draft-weltman-ldapv3-auth-response-01.txt)
References: <3.0.5.32.20000209100822.00976100@infidel.boolean.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"BdjbNB.A.72B.21ao4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit


Examples ?

"Kurt D. Zeilenga" wrote:

> I like to voice a general concern about unsolicited response
> controls.  That is, controls provided by servers without the
> client implicit or explicit solicitating the control.
>
> I believe we should discourage unsolicited controls in responses.
>
> As the number of such controls increase, which is inevidable,
> clients and networks will be overloaded with unneeded information.
> It would prudent, IMO, to provide and encourage use of client
> solicatation of desired information.  That is, our general
> protocol model is one of client request/server response.  I
> see no overriding reason why this particular control should
> not be sent without solicitation.
>
> I suggest that this response control be explicitly solicited
> by the client via a request control.
>
>         Kurt



From list@netscape.com  Wed Feb  9 13:54:18 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA16856
	for <ldapext-archive@odin.ietf.org>; Wed, 9 Feb 2000 13:54:16 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id KAA17886;
	Wed, 9 Feb 2000 10:49:54 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id KAA13553; Wed, 9 Feb 2000 10:53:23 -0800 (PST)
Resent-Date: Wed, 9 Feb 2000 10:53:23 -0800 (PST)
Message-Id: <3.0.5.32.20000209105319.009804f0@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Wed, 09 Feb 2000 10:53:19 -0800
To: dboreham@netscape.com (David Boreham)
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Re: unsolicited controls  (Was: 
  I-DACTION:draft-weltman-ldapv3-auth-response-01.txt)
Cc: ietf-ldapext@netscape.com
In-Reply-To: <38A1ADB6.6AA56D34@netscape.com>
References: <3.0.5.32.20000209100822.00976100@infidel.boolean.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"_-1YhB.A.dTD.iebo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 10:11 AM 2/9/00 -0800, David Boreham wrote:
>
>Examples ?

draft-weltman-ldapv3-auth-response-01.txt
draft-behera-ldap-password-policy-00.txt

I feel the client should be required to take some explicit
action before the returns any response not described by
the core specifications.  This act may be an explicit
request control, a control upon bind enabling the behavior
for the "session", an extended operation enabling the behavior,
or some other form of solicitation.

I feel a server should not respond with controls and/or
extended responses not detailed by the core specifications
without such solicitation.

That is, the client should
	1) discover what protocol extensions are supported by the server
	2) enable desired extensions

A server should:
	1) published supported extensions
	2) disable all extensions until enabled by the client




From list@netscape.com  Wed Feb  9 14:07:12 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA17650
	for <ldapext-archive@odin.ietf.org>; Wed, 9 Feb 2000 14:07:11 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id LAA21062;
	Wed, 9 Feb 2000 11:02:31 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id KAA20921; Wed, 9 Feb 2000 10:58:55 -0800 (PST)
Resent-Date: Wed, 9 Feb 2000 10:58:55 -0800 (PST)
Message-Id: <3.0.5.32.20000209105851.00973570@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Wed, 09 Feb 2000 10:58:51 -0800
To: ietf-ldapext@netscape.com
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Security Considerations in
  draft-weltman-ldapv3-auth-response-01.txt
In-Reply-To: <200002091641.LAA09935@ietf.org>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"H80p_D.A.6FF.tjbo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

I suggest noting explicitly in Security Considerations that the
control is not protected by the SASL privacy or integrity
protection negotiated by the BIND process returning this control.
A client requiring such protection must rely on independent
services, such as TLS or IPSEC, or use some operation after
negotiating SASL protection services.

Because of this consideration, I can see the need for an extended
operation to obtain authorization information post BIND.

BTW, what's the intended track of this document?  I suggest
adding a note to the draft indicating your intent.



From list@netscape.com  Wed Feb  9 14:13:10 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA17873
	for <ldapext-archive@odin.ietf.org>; Wed, 9 Feb 2000 14:13:09 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id LAA22419;
	Wed, 9 Feb 2000 11:09:08 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id LAA29686; Wed, 9 Feb 2000 11:12:38 -0800 (PST)
Resent-Date: Wed, 9 Feb 2000 11:12:38 -0800 (PST)
Message-ID: <38A1BBFB.A0F93C05@netscape.com>
Date: Wed, 09 Feb 2000 11:11:55 -0800
From: rweltman@netscape.com (Rob Weltman)
X-Mailer: Mozilla 4.7 [en] (WinNT; U)
X-Accept-Language: en-US,sv,ja
MIME-Version: 1.0
To: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
CC: ietf-ldapext@netscape.com
Subject: Re: Security Considerations indraft-weltman-ldapv3-auth-response-01.txt
References: <3.0.5.32.20000209105851.00973570@infidel.boolean.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"Ra91r.A.kPH.lwbo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

  Per previous messages: I originally proposed something more along the lines of what you have suggested - a control or extended operation which could be issued at any time to query the authentication identity of a connection. Mark Wahl had a strong argument at the time (a year ago) for why it would be better to have an unsolicited control returned on bind. I don't remember what that strong argument was... Maybe Mark can add to this discussion.

"Kurt D. Zeilenga" wrote:

> I suggest noting explicitly in Security Considerations that the
> control is not protected by the SASL privacy or integrity
> protection negotiated by the BIND process returning this control.
> A client requiring such protection must rely on independent
> services, such as TLS or IPSEC, or use some operation after
> negotiating SASL protection services.

  That could be added, but note that the information being returned in the control is not a password, but just the identity (DN) of the authenticated connection.

>
>
> Because of this consideration, I can see the need for an extended
> operation to obtain authorization information post BIND.
>
> BTW, what's the intended track of this document?  I suggest
> adding a note to the draft indicating your intent.

  It depends a little on the interest among participants on this list.

Thanks,
Rob




From list@netscape.com  Wed Feb  9 14:27:38 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA18819
	for <ldapext-archive@odin.ietf.org>; Wed, 9 Feb 2000 14:27:32 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id LAA25054;
	Wed, 9 Feb 2000 11:22:30 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id LAA07521; Wed, 9 Feb 2000 11:26:00 -0800 (PST)
Resent-Date: Wed, 9 Feb 2000 11:26:00 -0800 (PST)
Message-Id: <3.0.5.32.20000209112555.00968970@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Wed, 09 Feb 2000 11:25:55 -0800
To: rweltman@netscape.com (Rob Weltman)
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Re: Security Considerations
  indraft-weltman-ldapv3-auth-response-01.txt
Cc: ietf-ldapext@netscape.com
In-Reply-To: <38A1BBFB.A0F93C05@netscape.com>
References: <3.0.5.32.20000209105851.00973570@infidel.boolean.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"9w-aYB.A.I1B.H9bo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 11:11 AM 2/9/00 -0800, Rob Weltman wrote:
>"Kurt D. Zeilenga" wrote:
>> I suggest noting explicitly in Security Considerations that the
>> control is not protected by the SASL privacy or integrity
>> protection negotiated by the BIND process returning this control.
>> A client requiring such protection must rely on independent
>> services, such as TLS or IPSEC, or use some operation after
>> negotiating SASL protection services.
>  That could be added, but note that the information being returned in the control is not a password, but just the identity (DN) of the authenticated connection.

I am specifically concerned that the DN returned may be modified
in transit or by man in the middle and the client may assume
incorrectly that the information is protected by services
negotiated during the bind operation.

I believe any specification of a control passed in a Bind
Request or Response should have a explicit security consideration
statement that control is not protected by services which the
Bind may or may not negotiate.



From list@netscape.com  Wed Feb  9 14:27:53 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA18839
	for <ldapext-archive@odin.ietf.org>; Wed, 9 Feb 2000 14:27:50 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id LAA25595;
	Wed, 9 Feb 2000 11:23:14 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id LAA08267; Wed, 9 Feb 2000 11:26:44 -0800 (PST)
Resent-Date: Wed, 9 Feb 2000 11:26:44 -0800 (PST)
Message-ID: <38A1BF2C.AFDD7A32@netscape.com>
Date: Wed, 09 Feb 2000 14:25:32 -0500
From: mcs@netscape.com (Mark C Smith)
Organization: iPlanet E-Commerce Solutions
X-Mailer: Mozilla 4.7 [en] (WinNT; U)
X-Accept-Language: en
MIME-Version: 1.0
To: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
CC: ietf-ldapext@netscape.com
Subject: Re: Security Considerations indraft-weltman-ldapv3-auth-response-01.txt
References: <3.0.5.32.20000209105851.00973570@infidel.boolean.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"QmT7G.A.2AC.z9bo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

"Kurt D. Zeilenga" wrote:
> 
> BTW, what's the intended track of this document?  I suggest
> adding a note to the draft indicating your intent.

Good point.  You raised this before but we neglected to address it.  I
think this should be a standards track document, i.e., if a server is
going to return authentication information this is how it should do it
(subject to revision and debate about issues such as whether the client
must request the information, etc. of course).  My point is that we
should have one way of returning this information so that if a server or
client needs this feature they can count on it being implemented in just
one way from a protocol perspective.

-- 
Mark Smith
Directory Product Development / iPlanet E-Commerce Solutions
My words are my own, not my employer's.            Got LDAP?



From list@netscape.com  Wed Feb  9 14:30:37 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA18997
	for <ldapext-archive@odin.ietf.org>; Wed, 9 Feb 2000 14:30:34 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id LAA10745;
	Wed, 9 Feb 2000 11:27:33 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id LAA10821; Wed, 9 Feb 2000 11:29:17 -0800 (PST)
Resent-Date: Wed, 9 Feb 2000 11:29:17 -0800 (PST)
From: "David Chadwick" <d.w.chadwick@salford.ac.uk>
Organization: University of Salford
To: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>, ietf-ldapext@netscape.com,
        Mark Wahl <M.Wahl@INNOSOFT.COM>
Date: Wed, 9 Feb 2000 19:26:37 -0000
MIME-Version: 1.0
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: 7BIT
Subject: Re: RFC2251: RootDSE subschemasubentry issue
Reply-to: d.w.chadwick@salford.ac.uk
Priority: normal
In-reply-to: <3.0.5.32.20000209084941.00939140@infidel.boolean.net>
References: <7078.950102645@threadgill.austin.innosoft.com>
X-mailer: Pegasus Mail for Win32 (v3.12b)
Message-Id: <E12Icmc-0001pY-00@serv1.is1.u-net.net>
Resent-Message-ID: <"xTD8EC.A.zoC.MAco4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7BIT

Mark, Kurt

I think I have an answer to the problem(s) being posed by Kurt.

The model as it stands is OK if a server only masters one naming 
context. Everything works fine. All the entries in the NC and the 
rootDSE can contain the subschemaSubentry attribute which points 
to the single subschema subentry.

The problem arises once we have multiple NCs in a server. The 
subschemaSubentry attribute can still be single valued and exist in 
each entry in each NC and point to the correct subschema 
subentry. However, the attribute in the root DSE no longer works, for 
two reasons.

Firstly it is supposed to be single valued (as Kurt pointed out) and 
now it needs to have multiple values.

Secondly, (again as Kurt pointed out) there is no way for the user to 
know from the multivalued attribute in the rootDSE which value 
points to which subschema subentry for which NC. THis of course is 
not a problem for the entries within the NC, as they only still need a 
single pointer to their one and only subschema subentry.

Thus I conclude that the model is broken for multiple naming 
contexts, and that the subschemaSubentry attribute in the rootDSE 
needs to be replaced by a multivalued attribute, having two 
components - the context prefix of an NC (an LDAP DN), and the 
pointer to the subschemaSubentry.

Do you agree with this analysis?

David

***************************************************

David Chadwick
IS Institute, University of Salford, Salford M5 4WT
Tel +44 161 295 5351  Fax +44 161 745 8169
Mobile +44 790 167 0359
Email D.W.Chadwick@salford.ac.uk
Home Page  http://www.salford.ac.uk/its024/chadwick.htm
Understanding X.500  http://www.salford.ac.uk/its024/X500.htm
X.500/LDAP Seminars http://www.salford.ac.uk/its024/seminars.htm
Entrust key validation string MLJ9-DU5T-HV8J

***************************************************



From list@netscape.com  Wed Feb  9 14:31:46 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA19120
	for <ldapext-archive@odin.ietf.org>; Wed, 9 Feb 2000 14:31:42 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id LAA11472;
	Wed, 9 Feb 2000 11:29:24 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id LAA13011; Wed, 9 Feb 2000 11:31:09 -0800 (PST)
Resent-Date: Wed, 9 Feb 2000 11:31:09 -0800 (PST)
Message-ID: <38A1C055.C82ABF09@netscape.com>
Date: Wed, 09 Feb 2000 11:30:29 -0800
From: rweltman@netscape.com (Rob Weltman)
X-Mailer: Mozilla 4.7 [en] (WinNT; U)
X-Accept-Language: en-US,sv,ja
MIME-Version: 1.0
To: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
CC: ietf-ldapext@netscape.com
Subject: Re: Security Considerationsindraft-weltman-ldapv3-auth-response-01.txt
References: <3.0.5.32.20000209105851.00973570@infidel.boolean.net> <3.0.5.32.20000209112555.00968970@infidel.boolean.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"VfI_DB.A.xKD.7Bco4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

"Kurt D. Zeilenga" wrote:

> At 11:11 AM 2/9/00 -0800, Rob Weltman wrote:
> >"Kurt D. Zeilenga" wrote:
> >> I suggest noting explicitly in Security Considerations that the
> >> control is not protected by the SASL privacy or integrity
> >> protection negotiated by the BIND process returning this control.
> >> A client requiring such protection must rely on independent
> >> services, such as TLS or IPSEC, or use some operation after
> >> negotiating SASL protection services.
> >  That could be added, but note that the information being returned in the control is not a password, but just the identity (DN) of the authenticated connection.
>
> I am specifically concerned that the DN returned may be modified
> in transit or by man in the middle and the client may assume
> incorrectly that the information is protected by services
> negotiated during the bind operation.
>
> I believe any specification of a control passed in a Bind
> Request or Response should have a explicit security consideration
> statement that control is not protected by services which the
> Bind may or may not negotiate.

I see. Thanks for pointing that out. The response is returned before any session protection takes effect, so it is more exposed than any other data-carrying LDAP response.

Rob




From list@netscape.com  Wed Feb  9 14:53:03 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA20123
	for <ldapext-archive@odin.ietf.org>; Wed, 9 Feb 2000 14:53:00 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id LAA16780;
	Wed, 9 Feb 2000 11:50:28 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id LAA21972; Wed, 9 Feb 2000 11:42:14 -0800 (PST)
Resent-Date: Wed, 9 Feb 2000 11:42:14 -0800 (PST)
Message-ID: <38A1C2CD.ED72039D@netscape.com>
Date: Wed, 09 Feb 2000 14:41:01 -0500
From: mcs@netscape.com (Mark C Smith)
Organization: iPlanet E-Commerce Solutions
X-Mailer: Mozilla 4.7 [en] (WinNT; U)
X-Accept-Language: en
MIME-Version: 1.0
To: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
CC: Mark Wahl <M.Wahl@INNOSOFT.COM>, ietf-ldapext@netscape.com
Subject: Re: substring matching rules
References: <7416.950102811@threadgill.austin.innosoft.com> <3.0.5.32.20000209090759.0097bc80@infidel.boolean.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"b8GCvD.A.FXF.UMco4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

I don't have access to all of the right standard documents here, but I
suspect that the NumericString syntax is compatible with
DirectoryString.  Not true for bitString or octetString... in fact,
X.521 includes this definition:

  octetStringSubstringsMatch MATCHING-RULE ::= {
    SYNTAX OctetSubstringAssertion
    ID id-mr-octetStringSubstringsMatch }

  OctetSubstringAssertion ::= SEQUENCE OF CHOICE {
    initial [0] OCTET STRING,
    any [1] OCTET STRING,
    final [2] OCTET STRING }
   -- at most one initial and one final component

which is very similar in concept to your bitStringSubstringsMatch
example.

It would be nice to add some text about all of this to RFC2252-bis when
it is created.

-- 
Mark Smith
Directory Product Development / iPlanet E-Commerce Solutions
My words are my own, not my employer's.            Got LDAP?



"Kurt D. Zeilenga" wrote:
> 
> So, if I want to define a bitString substring matching rule
> where each asserted component is a bitString, I should define
> a bitStringSubstrings (assertion) syntax and than use this as
> the syntax of asserted values of bitStringSubstringsMatch?
> 
> Okay, so why?
> 
> ( 2.5.13.10 NAME 'numericStringSubstringsMatch'
>     SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )
> 
> This says that each asserted substring component is of
> directoryString syntax.  I would think each asserted substring
> component should be of numericString syntax.



From list@netscape.com  Wed Feb  9 14:59:35 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA20451
	for <ldapext-archive@odin.ietf.org>; Wed, 9 Feb 2000 14:59:35 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id LAA17596;
	Wed, 9 Feb 2000 11:56:35 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id LAA00556; Wed, 9 Feb 2000 11:58:20 -0800 (PST)
Resent-Date: Wed, 9 Feb 2000 11:58:20 -0800 (PST)
Message-Id: <3.0.5.32.20000209115809.00970b70@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Wed, 09 Feb 2000 11:58:09 -0800
To: d.w.chadwick@salford.ac.uk
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Re: RFC2251: RootDSE subschemasubentry issue
Cc: ietf-ldapext@netscape.com, Mark Wahl <M.Wahl@INNOSOFT.COM>
In-Reply-To: <E12Icmc-0001pY-00@serv1.is1.u-net.net>
References: <3.0.5.32.20000209084941.00939140@infidel.boolean.net>
 <7078.950102645@threadgill.austin.innosoft.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"n5RuIC.A.aI.abco4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 07:26 PM 2/9/00 -0000, David Chadwick wrote:
>Do you agree with this analysis?

Yes.

The next questions are:

What other attributes published in RootDSE are naming
context specific?

I've seen a lot of proposals (including my own) which
suggest attributes for publishing capabilities.  It's
likely that some of these are not server specific,
but are naming context specific.

From the design perpective, I see different ways of
providing naming context specific information:

1) add new attributes which provide the context
and the capability as combined value.  (Ie:
 1A)	dn:  (root dse)
	subschemasubentries: dc=openldap,dc=org $
	 ( cn=subschema $ cn=openldap-subschema )
	subschemasubentries: dc=example,dc=com $ cn=subschema
	...

or:
 1B)	dn: (root dse)
	subschemasubentries: dc=openldap,dc=org $ cn=subschema
	subschemasubentries: dc=openldap,dc=org $ cn=opendlap-subschema
	subschemasubentries: dc=example,dc=com $ cn=subschema

2) provide an attribute which lists naming contexts
AND a provides a DN of an entry (or subentry) which
contains attributes describing the naming context
specific capabilities.

	dn: (root dse)
	namingContextCapabilities: dc=openldap,dc=org $ cn=openldap
	namingContextCapabilities: dc=example,dc=com $ cn=example

	dn: cn=openldap
	subschemasubentries: cn=subschema
	subschemasubentries: cn=openldap-subschema

	dn: cn=example
	subschemasubentires: cn=subschema


Comments?



From list@netscape.com  Wed Feb  9 16:37:01 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA24510
	for <ldapext-archive@odin.ietf.org>; Wed, 9 Feb 2000 16:36:59 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id NAA16111;
	Wed, 9 Feb 2000 13:32:12 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id NAA12279; Wed, 9 Feb 2000 13:35:41 -0800 (PST)
Resent-Date: Wed, 9 Feb 2000 13:35:41 -0800 (PST)
Message-Id: <s8a17b10.024@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.2.1
Date: Wed, 09 Feb 2000 14:34:46 -0700
From: "Steven Merrill" <SMERRILL@novell.com>
To: "<"<ietf-ldapext@netscape.com>
Subject: java-api-asynch-ext-04, Sec 4.1.8 search
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Resent-Message-ID: <"THJwRB.A.K_C.s2do4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ietf.org id QAA24510

For the second search method definition shouldn't an LDAPSearchConstraints object be specified instead of LDAPConstraints? Downcasting the LDAPConstraints to an LDAPSearchContraints object would be dangerous.

Steve Merrill
Novell, Inc.



From list@netscape.com  Wed Feb  9 17:27:43 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA25851
	for <ldapext-archive@odin.ietf.org>; Wed, 9 Feb 2000 17:27:38 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id OAA09321;
	Wed, 9 Feb 2000 14:25:14 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id OAA04092; Wed, 9 Feb 2000 14:26:57 -0800 (PST)
Resent-Date: Wed, 9 Feb 2000 14:26:57 -0800 (PST)
Message-Id: <s8a1873e.098@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.2.1
Date: Wed, 09 Feb 2000 15:26:38 -0700
From: "Jim Sermersheim" <JIMSE@novell.com>
To: <mcs@netscape.com>, <Kurt@OpenLDAP.org>
Cc: <M.Wahl@INNOSOFT.COM>, <ietf-ldapext@netscape.com>
Subject: Re: substring matching rules
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Resent-Message-ID: <"WHNv-D.A.o_.wmeo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ietf.org id RAA25851

We still need two separate substrings matching rules (Ech). Either that, or the MatchingRuleDescription needs to allow for two syntaxes, one being the syntax used for the matchValue of an extensibleMatch, and the other used for the substrings value of a normal (not extensible) filter.

Jim

>>> Mark C Smith <mcs@netscape.com> 2/9/00 12:42:46 PM >>>
I don't have access to all of the right standard documents here, but I
suspect that the NumericString syntax is compatible with
DirectoryString.  Not true for bitString or octetString... in fact,
X.521 includes this definition:

  octetStringSubstringsMatch MATCHING-RULE ::= {
    SYNTAX OctetSubstringAssertion
    ID id-mr-octetStringSubstringsMatch }

  OctetSubstringAssertion ::= SEQUENCE OF CHOICE {
    initial [0] OCTET STRING,
    any [1] OCTET STRING,
    final [2] OCTET STRING }
   -- at most one initial and one final component

which is very similar in concept to your bitStringSubstringsMatch
example.

It would be nice to add some text about all of this to RFC2252-bis when
it is created.

-- 
Mark Smith
Directory Product Development / iPlanet E-Commerce Solutions
My words are my own, not my employer's.            Got LDAP?



"Kurt D. Zeilenga" wrote:
> 
> So, if I want to define a bitString substring matching rule
> where each asserted component is a bitString, I should define
> a bitStringSubstrings (assertion) syntax and than use this as
> the syntax of asserted values of bitStringSubstringsMatch?
> 
> Okay, so why?
> 
> ( 2.5.13.10 NAME 'numericStringSubstringsMatch'
>     SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )
> 
> This says that each asserted substring component is of
> directoryString syntax.  I would think each asserted substring
> component should be of numericString syntax.




From list@netscape.com  Wed Feb  9 18:16:07 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA26674
	for <ldapext-archive@odin.ietf.org>; Wed, 9 Feb 2000 18:16:07 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id PAA16924;
	Wed, 9 Feb 2000 15:13:10 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id PAA03499; Wed, 9 Feb 2000 15:14:53 -0800 (PST)
Resent-Date: Wed, 9 Feb 2000 15:14:53 -0800 (PST)
Message-Id: <3.0.5.32.20000209151440.0096f350@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Wed, 09 Feb 2000 15:14:40 -0800
To: ietf-ldapext@netscape.com
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Re: unsolicited controls  (Was:  
  I-DACTION:draft-weltman-ldapv3-auth-response-01.txt)
In-Reply-To: <3.0.5.32.20000209105319.009804f0@infidel.boolean.net>
References: <38A1ADB6.6AA56D34@netscape.com>
 <3.0.5.32.20000209100822.00976100@infidel.boolean.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"aliCFB.A.O1.qTfo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

RFC 2251, 4.4 (unsolicited notifications) says:
   It [an unsolicited notification] is used to signal an
   extraordinary condition in the server or in the connection
   between the client and the server

I believe the same should apply to unsolicited controls:
  An unsolicited response control is used to signal an
  extraordinary condition with the operation.

That is, the fact that an identity is authorized is by a
operation bind is quite ordinary and hence a client shouldn't
be notified of the identity unless explicitly requested.

Kurt


At 10:53 AM 2/9/00 -0800, Kurt D. Zeilenga wrote:
>At 10:11 AM 2/9/00 -0800, David Boreham wrote:
>>
>>Examples ?
>
>draft-weltman-ldapv3-auth-response-01.txt
>draft-behera-ldap-password-policy-00.txt
>
>I feel the client should be required to take some explicit
>action before the returns any response not described by
>the core specifications.  This act may be an explicit
>request control, a control upon bind enabling the behavior
>for the "session", an extended operation enabling the behavior,
>or some other form of solicitation.
>
>I feel a server should not respond with controls and/or
>extended responses not detailed by the core specifications
>without such solicitation.
>
>That is, the client should
>	1) discover what protocol extensions are supported by the server
>	2) enable desired extensions
>
>A server should:
>	1) published supported extensions
>	2) disable all extensions until enabled by the client
>
>
>



From list@netscape.com  Wed Feb  9 21:04:55 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA29667
	for <ldapext-archive@odin.ietf.org>; Wed, 9 Feb 2000 21:04:50 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id SAA11396;
	Wed, 9 Feb 2000 18:02:24 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id SAA16483; Wed, 9 Feb 2000 18:04:07 -0800 (PST)
Resent-Date: Wed, 9 Feb 2000 18:04:07 -0800 (PST)
Message-Id: <s8a1ba1d.077@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.2.1
Date: Wed, 09 Feb 2000 19:03:44 -0700
From: "Jim Sermersheim" <JIMSE@novell.com>
To: <ietf-ldapext@netscape.com>, <Kurt@OpenLDAP.org>
Subject: Re: unsolicited controls  (Was: 
	I-DACTION:draft-weltman-ldapv3-auth-response-01.txt)
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Resent-Message-ID: <"gTS0n.A.RBE.Wyho4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ietf.org id VAA29667

Given this definition, what constitutes extraordinary? Is an expired password an extraordinary condition? Unless we can define the meaning of extraordinary, I'd rather just decide to allow unsolicited response controls or not.

>>> "Kurt D. Zeilenga" <Kurt@OpenLDAP.org> 2/9/00 4:15:26 PM >>>
RFC 2251, 4.4 (unsolicited notifications) says:
   It [an unsolicited notification] is used to signal an
   extraordinary condition in the server or in the connection
   between the client and the server

I believe the same should apply to unsolicited controls:
  An unsolicited response control is used to signal an
  extraordinary condition with the operation.

That is, the fact that an identity is authorized is by a
operation bind is quite ordinary and hence a client shouldn't
be notified of the identity unless explicitly requested.

Kurt


At 10:53 AM 2/9/00 -0800, Kurt D. Zeilenga wrote:
>At 10:11 AM 2/9/00 -0800, David Boreham wrote:
>>
>>Examples ?
>
>draft-weltman-ldapv3-auth-response-01.txt
>draft-behera-ldap-password-policy-00.txt
>
>I feel the client should be required to take some explicit
>action before the returns any response not described by
>the core specifications.  This act may be an explicit
>request control, a control upon bind enabling the behavior
>for the "session", an extended operation enabling the behavior,
>or some other form of solicitation.
>
>I feel a server should not respond with controls and/or
>extended responses not detailed by the core specifications
>without such solicitation.
>
>That is, the client should
>	1) discover what protocol extensions are supported by the server
>	2) enable desired extensions
>
>A server should:
>	1) published supported extensions
>	2) disable all extensions until enabled by the client
>
>
>




From list@netscape.com  Wed Feb  9 22:43:14 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA02518
	for <ldapext-archive@odin.ietf.org>; Wed, 9 Feb 2000 22:43:13 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id TAA04727;
	Wed, 9 Feb 2000 19:38:21 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id TAA11959; Wed, 9 Feb 2000 19:41:51 -0800 (PST)
Resent-Date: Wed, 9 Feb 2000 19:41:51 -0800 (PST)
Message-Id: <3.0.5.32.20000209194141.00977940@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Wed, 09 Feb 2000 19:41:41 -0800
To: "Jim Sermersheim" <JIMSE@novell.com>
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Re: unsolicited controls  (Was:
  I-DACTION:draft-weltman-ldapv3-auth-response-01.txt)
Cc: <ietf-ldapext@netscape.com>
In-Reply-To: <s8a1ba1e.096@prv-mail25.provo.novell.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"Omsc8B.A.l6C.-Njo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Is their a compelling reason to not negotiate these elective
features?  I believe it is unwise not to negotiate elective
features.

At 07:03 PM 2/9/00 -0700, Jim Sermersheim wrote:
>Given this definition, what constitutes extraordinary?

Good question.  Ask?
	Is the importance of the notification such that most
	applications would be modified to recognize it and
	do something reasonable because of it?

If the answer is no, than it's not extraordinary.

> Is an expired password an extraordinary condition?

Per my above definition, no.

In the case of password policy, I'd suggest a bind control that
the client could use to tell the server, "I recognize password
policy controls/responses".  This is a form of solicitation.

> Unless we can define the meaning of extraordinary,
> I'd rather just decide to allow unsolicited response controls or not.

Even though I am hard pressed at the moment to find a control
extraordinary enough that application developers would be compelled
to update their codes to recognize it, I would hate to disallow
unsolicited response controls completely as I believe that
the recommended use of unsolicited controls should be comparable
to unsolicited responses.

	Kurt



From list@netscape.com  Thu Feb 10 08:12:23 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA21880
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 08:12:22 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id FAA23535;
	Thu, 10 Feb 2000 05:09:31 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id FAA16784; Thu, 10 Feb 2000 05:11:09 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 05:11:09 -0800 (PST)
From: hahnt@us.ibm.com
Importance: Normal
Subject: Re: RFC2251: RootDSE subschemasubentry issue
To: ietf-ldapext@netscape.com
X-Mailer: Lotus Notes Release 5.0.1 July 16, 1999
Message-ID: <OF32F19675.393BE5FE-ON05256881.00479AFD@pok.ibm.com>
Date: Thu, 10 Feb 2000 08:08:42 -0500
X-MIMETrack: Serialize by Router on D01MLC96/01/M/IBM(Release 5.0.2b (Intl)|7 January
 2000) at 10/02/2000 08:11:04
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Resent-Message-ID: <"9Des1.A.-FE.rjro4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


Greetings,

I believe that this was discussed on the mailing list about 6 months ago.
At that time, the general direction seemed to be that  the rootDSE entry
would contain an additional attribute:

subschemasubentries

which would be defined to have distinguishedName syntax.  And while this
does not provide the detailed mapping (offered in Kurt's response), of
associating namingContext values with subschemasubentries values, it also
does not introduce another attribute value format that needs to be parsed.
The X.500 specifications give some guidance on the placement of
subschemasubentry values, namely they are to be placed "just below" the
namingContext and should have object class: top, subentry,
subschemasubentry.

So, I would add a fourth option for the rootDSE:

namingContexts: ou=Sales, o=Widgets
namingContexts: ou=Development, o=Widgets
subschemasubentries: cn=schema, ou=Sales, o=Widgets
subschemasubentries: cn=schema, ou=Development, o=Widgets

Regards,
Tim Hahn

Internet: hahnt@us.ibm.com
Internal: Timothy Hahn/Endicott/IBM@IBMUS or IBMUSM00(HAHNT)
phone: 607.752.6388     tie-line: 8/852.6388
fax: 607.752.3681







From list@netscape.com  Thu Feb 10 09:09:00 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA25395
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 09:08:59 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id GAA27608;
	Thu, 10 Feb 2000 06:06:08 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id GAA26717; Thu, 10 Feb 2000 06:07:50 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 06:07:50 -0800 (PST)
Message-ID: <EB21C070AA75D311A0AC0090271EC45C014644CB@us-tr-exch-1.tr.unisys.com>
From: "Salter, Thomas A" <Thomas.Salter@unisys.com>
To: ietf-ldapext@netscape.com
Subject: RE: RFC2251: RootDSE subschemasubentry issue
Date: Thu, 10 Feb 2000 09:08:50 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.21)
Content-Type: text/plain;
	charset="iso-8859-1"
Resent-Message-ID: <"Pie4JD.A.JhG.1Yso4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Instead of inventing new attributes or syntaxes, why not just say that the
subschema for a naming context can be discovered by reading the
subschemaSubentry attribute in the naming context?



From list@netscape.com  Thu Feb 10 09:25:09 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA26521
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 09:25:09 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id GAA28788;
	Thu, 10 Feb 2000 06:22:07 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id GAA29705; Thu, 10 Feb 2000 06:23:53 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 06:23:53 -0800 (PST)
From: "David Chadwick" <d.w.chadwick@salford.ac.uk>
Organization: University of Salford
To: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>, ietf-ldapext@netscape.com,
        Mark Wahl <M.Wahl@INNOSOFT.COM>
Date: Thu, 10 Feb 2000 14:22:17 -0000
MIME-Version: 1.0
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: 7BIT
Subject: Re: RFC2251: RootDSE subschemasubentry issue
Reply-to: d.w.chadwick@salford.ac.uk
Priority: normal
In-reply-to: <3.0.5.32.20000209115809.00970b70@infidel.boolean.net>
References: <E12Icmc-0001pY-00@serv1.is1.u-net.net>
X-mailer: Pegasus Mail for Win32 (v3.12b)
Message-Id: <E12IuU8-00070l-00@serv1.is1.u-net.net>
Resent-Message-ID: <"4DAPcC.A.3PH.4nso4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7BIT


> At 07:26 PM 2/9/00 -0000, David Chadwick wrote:
> >Do you agree with this analysis?
> 
> Yes.

Good, we are making progress towards resolution.

> 
> The next questions are:
> 
> What other attributes published in RootDSE are naming
> context specific?

The question should actually be wider than this I believe. i.e. What 
attributes are NC specific and what attributes are server specific 
and what attributes are Management Domain specific, since

i) a Man Domain can comprise many servers
ii) a server can hold many NCs
iii) a server can hold many Man Domains.

So we really need placeholders for all of these.
It seems to me like the rootDSE should hold server specific 
attributes, a subentry under the NC context prefix should hold NC 
specific attributes (this is in line with the LDUP group I believe), and 
a subentry under an Admin Point should hold Man Domain specific 
attributes (this is in line with X.500(93)).

What do you think?

> 
> I've seen a lot of proposals (including my own) which
> suggest attributes for publishing capabilities.  It's
> likely that some of these are not server specific,
> but are naming context specific.

agreed

> 
> From the design perpective, I see different ways of
> providing naming context specific information:
> 
> 1) add new attributes which provide the context
> and the capability as combined value.  (Ie:
>  1A)	dn:  (root dse)
>  subschemasubentries: dc=openldap,dc=org $
>   ( cn=subschema $ cn=openldap-subschema )
>  subschemasubentries: dc=example,dc=com $ cn=subschema
>  ...
> 
> or:
>  1B)	dn: (root dse)
>  subschemasubentries: dc=openldap,dc=org $ cn=subschema
>  subschemasubentries: dc=openldap,dc=org $ cn=opendlap-subschema
>  subschemasubentries: dc=example,dc=com $ cn=subschema
> 
> 2) provide an attribute which lists naming contexts
> AND a provides a DN of an entry (or subentry) which
> contains attributes describing the naming context
> specific capabilities.

Or, an attribute which lists NCs and have subentries under the NCs, 
so that no pointer is needed in the rootDSE.

> 
>  dn: (root dse)
>  namingContextCapabilities: dc=openldap,dc=org $ cn=openldap
>  namingContextCapabilities: dc=example,dc=com $ cn=example
> 
>  dn: cn=openldap
>  subschemasubentries: cn=subschema
>  subschemasubentries: cn=openldap-subschema

Why would you have 2 subschemasubentries for 1 NC?
I think only one is needed (this is mandatory at the moment I believe)

David

> 
>  dn: cn=example
>  subschemasubentires: cn=subschema
> 
> 
> Comments?
> 
> 


***************************************************

David Chadwick
IS Institute, University of Salford, Salford M5 4WT
Tel +44 161 295 5351  Fax +44 161 745 8169
Mobile +44 790 167 0359
Email D.W.Chadwick@salford.ac.uk
Home Page  http://www.salford.ac.uk/its024/chadwick.htm
Understanding X.500  http://www.salford.ac.uk/its024/X500.htm
X.500/LDAP Seminars http://www.salford.ac.uk/its024/seminars.htm
Entrust key validation string MLJ9-DU5T-HV8J

***************************************************



From list@netscape.com  Thu Feb 10 10:04:25 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA29164
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 10:04:24 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id GAA12703;
	Thu, 10 Feb 2000 06:59:26 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id HAA09490; Thu, 10 Feb 2000 07:02:58 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 07:02:58 -0800 (PST)
Message-ID: <AAAAD7534DADD3119C4F00204804F0CC52C492@rbmail101.chamb.disa.mil>
From: "Mcauliffe, Kristin" <mcaulifk@ftm.disa.mil>
To: ietf-ldapext@netscape.com
Subject: Question on Extensible Match Filter
Date: Thu, 10 Feb 2000 10:02:34 -0500
Importance: low
X-Priority: 5
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.10)
Content-Type: text/plain;
	charset="iso-8859-1"
Resent-Message-ID: <"Tbx8VB.A.AUC.hMto4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


I am working on LDAP v3 Search filters and cannot seem to get a return from
the DS servers (Netscape, Novell NDS and MS AD) that I am testing using the
Extensible Match string.  I am following the definition identified in
RFC2254 and those identified in Chapter 3 of "Understanding and Deploying
LDAP DS" (and the examples).  I have used both the assertion syntax and the
value syntax. 

The results received are:  

Bind operation successful.
ldap_search_s:  Protocol error 
ldap_search_s:  additional info: Bad search filter

Any guidance would be appreciated.

=====================================
Kristin McAuliffe
Center for Information Technology Standards
DISA
mcaulifk@ftm.disa.mil
=====================================



From list@netscape.com  Thu Feb 10 12:06:21 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA04283
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 12:06:19 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id JAA25474;
	Thu, 10 Feb 2000 09:02:13 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id JAA17784; Thu, 10 Feb 2000 09:05:43 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 09:05:43 -0800 (PST)
Date: Thu, 10 Feb 2000 17:27:44 +0100
From: =?ISO-8859-1?Q?Patrik_F=E4ltstr=F6m?= <paf@swip.net>
To: ietf-ldapext@netscape.com
cc: Jeff.Hodges@stanford.edu, RLBob Morgan <rlmorgan@cac.washington.edu>,
        Mark Wahl <M.Wahl@innosoft.com>
Subject: Re: Please publish this I-D: draft-ietf-ldapext-ldapv3-tls-06.txt
Message-ID: <2734229.3159192464@[192.168.111.25]>
In-Reply-To: <200002101627.IAA01306@breakaway.Stanford.EDU>
X-Mailer: Mulberry/2.0.0b9 (MacOS)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Resent-Message-ID: <"7IVVPD.A.WVE.m_uo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

--On 2000-02-10 08.27 -0800, Jeff.Hodges@stanford.edu wrote:

> We'd appreciate it if you could carry the below version of the doc
> forward  into the RFC process. Thanks,

Send it to internet-drafts@ietf.org, and let me know when the I-D is
announced on the IETF-announce list.

   Patrik





From list@netscape.com  Thu Feb 10 12:18:12 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA04615
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 12:18:08 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id JAA27754;
	Thu, 10 Feb 2000 09:14:03 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id JAA24629; Thu, 10 Feb 2000 09:17:34 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 09:17:34 -0800 (PST)
Message-ID: <017E033801420200@mailgate.netconnect.co.uk>
In-Reply-To: <2734229%.3159192464@mailgate.netconnect.co.uk>
Date: Thu, 10 Feb 2000 17:16:00 +0000
From: John Storry <jstorry@netconnect.co.uk>
Sender: John Storry <jstorry@netconnect.co.uk>
Organization: NetConnect Ltd
To: ietf-ldapext@netscape.com
Subject: Please remove from mailing list
Importance: High
X-SMF-Hop-Count: 2
MIME-Version: 1.0
Content-type: text/plain; charset="US-ASCII"
Content-transfer-encoding: 7bit
X-Mailer: Connect2-SMTP 4.32 MHS/SMF to SMTP Gateway
Resent-Message-ID: <"93XNdC.A.SAG.sKvo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Could you please remove the following:

dnesbitt@netconnect.co.uk from your mailing list ASAP as this user is no 
longer employed by this company.

Many thanks

===== Original Message from ietf-ldapext @ netscape.com at 10/02/00 16:27
>--On 2000-02-10 08.27 -0800, Jeff.Hodges@stanford.edu wrote:
>
>> We'd appreciate it if you could carry the below version of the doc
>> forward  into the RFC process. Thanks,
>
>Send it to internet-drafts@ietf.org, and let me know when the I-D is
>announced on the IETF-announce list.
>
>   Patrik


John Storry

Internal Systems Engineer
NetConnect Ltd

Integration  Training for Messaging, Security  Directory Systems

Phone:+44 (0) 1223 423 523
Fax:+44 (0) 1223 420 655

http://www.netconnect.co.uk/

CONFIDENTIALITY NOTICE: This e-mail contains confidential information which
is intended only for use by the recipient (s) named above.  If you have
received this communication in error, please notify the sender immediately
via e-mail and return the entire message.  Thank you for your assistance.



From list@netscape.com  Thu Feb 10 12:18:29 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA04630
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 12:18:23 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id JAA20154;
	Thu, 10 Feb 2000 09:16:02 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id JAA25016; Thu, 10 Feb 2000 09:17:47 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 09:17:47 -0800 (PST)
Message-Id: <200002101717.JAA01460@breakaway.Stanford.EDU>
X-Mailer: exmh version 2.0.2 2/24/98
Subject: Please publish this I-D: draft-ietf-ldapext-ldapv3-tls-06.txt
To: internet-drafts@ietf.org
cc: jhodges@oblix.com, RLBob Morgan <rlmorgan@cac.washington.edu>,
        Mark Wahl <M.Wahl@INNOSOFT.COM>,
        LDAP extensions <ietf-ldapext@netscape.com>
From: jhodges@oblix.com
Reply-to: ietf-ldapext@netscape.com
Mime-Version: 1.0
Content-Type: multipart/mixed ;
	boundary="==_Exmh_5686075430"
Date: Thu, 10 Feb 2000 09:17:11 -0800
Sender: hodges@Wind.Stanford.EDU
Resent-Message-ID: <"cwB78C.A.sFG.4Kvo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

This is a multipart MIME message.

--==_Exmh_5686075430
Content-Type: text/plain; charset=us-ascii

This revision of draft-ietf-ldapext-ldapv3-tls has only minor editorial 
changes, plus a clarification at the end of section 4.6 as a result of 
Security Area review. The extraneous section 6 fragment was removed (we'd moved
that entire section to draft-ietf-ldapext-authmeth-04), and remaining sections 
renumbered.

JeffH



--==_Exmh_5686075430
Content-Type: text/plain ; name="draft-ietf-ldapext-ldapv3-tls-06.txt"; charset=us-ascii
Content-Description: draft-ietf-ldapext-ldapv3-tls-06.txt
Content-Disposition: attachment; filename="draft-ietf-ldapext-ldapv3-tls-06.txt"







LDAPEXT Working Group                          Jeff Hodges, Oblix Inc.
INTERNET-DRAFT                     RL "Bob" Morgan, Univ of Washington
Intended Category:             Mark Wahl, Innosoft International, Inc.
  Standards Track                                       February, 2000


              Lightweight Directory Access Protocol (v3):
                 Extension for Transport Layer Security
                 <draft-ietf-ldapext-ldapv3-tls-06.txt>



                        Status of this Document

This document is an Internet-Draft and is in full conformance with all
provisions of Section 10 of RFC2026.

Internet-Drafts are working documents of the Internet Engineering Task
Force (IETF), its areas, and its working groups.  Note that other groups
may also distribute working documents as Internet-Drafts.

Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time.  It is inappropriate to use Internet- Drafts as reference material
or to cite them other than as "work in progress."

The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt

The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.

Comments and suggestions on this document are encouraged.  Comments on
this document should be sent to the LDAPEXT working group discussion
list:
                       ietf-ldapext@netscape.com

This document expires in July 2000.


1.  Abstract

This document defines the "Start Transport Layer Security (TLS) Opera-
tion" for LDAP [LDAPv3, TLS]. This operation provides for TLS establish-
ment in an LDAP association and is defined in terms of an LDAP extended
request.





Hodges, Morgan, Wahl                                            [Page 1]

I-D     LDAPv3: Extension for Transport Layer Security     February 2000


2.  Conventions Used in this Document

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED",  "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [ReqsKeywords].

3.  The Start TLS Request

This section describes the Start TLS extended request and extended
response themselves: how to form the request, the form of the response,
and enumerates the various result codes the client MUST be prepared to
handle.

The section following this one then describes how to sequence an overall
Start TLS Operation.

3.1.  Requesting TLS Establishment

A client may perform a Start TLS operation by transmitting an LDAP PDU
containing an ExtendedRequest [LDAPv3] specifying the OID for the Start
TLS operation:

     1.3.6.1.4.1.1466.20037

An LDAP ExtendedRequest is defined as follows:

     ExtendedRequest ::= [APPLICATION 23] SEQUENCE {
             requestName             [0] LDAPOID,
             requestValue            [1] OCTET STRING OPTIONAL }

A Start TLS extended request is formed by setting the requestName field
to the OID string given above.  The requestValue field is absent.  The
client MUST NOT send any PDUs on this connection following this request
until it receives a Start TLS extended response.

When a Start TLS extended request is made, the server MUST return an
LDAP PDU containing a Start TLS extended response.  An LDAP Exten-
dedResponse is defined as follows:

     ExtendedResponse ::= [APPLICATION 24] SEQUENCE {
             COMPONENTS OF LDAPResult,
             responseName     [10] LDAPOID OPTIONAL,
             response         [11] OCTET STRING OPTIONAL }

A Start TLS extended response MUST contain a responseName field which
MUST be set to the same string as that in the responseName field present
in the Start TLS extended request. The response field is absent. The
server MUST set the resultCode field to either success or one of the



Hodges, Morgan, Wahl                                            [Page 2]

I-D     LDAPv3: Extension for Transport Layer Security     February 2000


other values outlined in section 3.3.

3.2.  "Success" Response

If the ExtendedResponse contains a resultCode of success, this indicates
that the server is willing and able to negotiate TLS. Refer to section
4, below, for details.

3.3.  Response other than "success"

If the ExtendedResponse contains a resultCode other than success, this
indicates that the server is unwilling or unable to negotiate TLS.

If the Start TLS extended request was not successful, the resultCode
will be one of:

     operationsError    (operations sequencing incorrect; e.g. TLS already
                         established)

     protocolError      (TLS not supported or incorrect PDU structure)

     referral           (this server doesn't do TLS, try this one)

     unavailable        (e.g. some major problem with TLS, or server is
                         shutting down)

The server MUST return operationsError if the client violates any of the
Start TLS extended operation sequencing requirements described in sec-
tion 4, below.

If the server does not support TLS (whether by design or by current con-
figuration), it MUST set the resultCode to protocolError (see section
4.1.1 of [LDAPv3]), or to referral. The server MUST include an actual
referral value in the LDAP Result if it returns a resultCode of refer-
ral. The client's current session is unaffected if the server does not
support TLS. The client MAY proceed with any LDAP operation, or it MAY
close the connection.

The server MUST return unavailable if it supports TLS but cannot estab-
lish a TLS connection for some reason, e.g. the certificate server not
responding, it cannot contact its TLS implementation, or if the server
is in process of shutting down. The client MAY retry the StartTLS opera-
tion, or it MAY proceed with any other LDAP operation, or it MAY close
the connection.

4.  Sequencing of the Start TLS Operation

This section describes the overall procedures clients and servers MUST



Hodges, Morgan, Wahl                                            [Page 3]

I-D     LDAPv3: Extension for Transport Layer Security     February 2000


follow for TLS establishment. These procedures take into consideration
various aspects of the overall security of the LDAP association includ-
ing discovery of resultant security level and assertion of the client's
authorization identity.

Note that the precise effects, on a client's authorzation identity, of
establishing TLS on an LDAP association are described in detail in sec-
tion 7.

4.1.  Requesting to Start TLS on an LDAP Association

The client MAY send the Start TLS extended request at any time after
establishing an LDAP association, except that in the following cases the
client MUST NOT send a Start TLS extended request:

     - if TLS is currently established on the connection, or
     - during a multi-stage SASL negotiation, or
     - if there are any LDAP operations outstanding on the connection.

The result of violating any of these requirements is a resultCode of
operationsError, as described above in section 3.3.

The client MAY have already perfomed a Bind operation when it sends a
Start TLS request, or the client might have not yet bound.

If the client did not establish a TLS connection before sending any
other requests, and the server requires the client to establish a TLS
connection before performing a particular request, the server MUST
reject that request with a confidentialityRequired or strongAuthRequired
result. The client MAY send a Start TLS extended request, or it MAY
choose to close the connection.

4.2.  Starting TLS

The server will return an extended response with the resultCode of suc-
cess if it is willing and able to negotiate TLS.  It will return other
resultCodes, documented above, if it is unable.

In the successful case, the client, which has ceased to transfer LDAP
requests on the connection, MUST either begin a TLS negotiation or close
the connection. The client will send PDUs in the TLS Record Protocol
directly over the underlying transport connection to the server to ini-
tiate TLS negotiation [TLS].

4.3.  TLS Version Negotiation

Negotiating the version of TLS or SSL to be used is a part of the TLS
Handshake Protocol, as documented in [TLS]. Please refer to that



Hodges, Morgan, Wahl                                            [Page 4]

I-D     LDAPv3: Extension for Transport Layer Security     February 2000


document for details.

4.4.  Discovery of Resultant Security Level

After a TLS connection is established on an LDAP association, both par-
ties MUST individually decide whether or not to continue based on the
privacy level achieved. Ascertaining the TLS connection's privacy level
is implementation dependent, and accomplished by communicating with
one's respective local TLS implementation.

If the client or server decides that the level of authentication or
privacy is not high enough for it to continue, it SHOULD gracefully
close the TLS connection immediately after the TLS negotiation has com-
pleted (see sections 5 and 7.2, below).

The client MAY attempt to Start TLS again, or MAY send an unbind
request, or send any other LDAP request.

4.5.  Assertion of Client's Authorization Identity

The client MAY, upon receipt of a Start TLS extended response indicating
success, assert that a specific authorization identity be utilized in
determining the client's authorization status. The client accomplishes
this via an LDAP Bind request specifying a SASL mechanism of "EXTERNAL"
[SASL]. See section 7, below.

4.6.  Server Identity Check

The client MUST check its understanding of the server's hostname against
the server's identity as presented in the server's Certificate message,
in order to prevent man-in-the-middle attacks.

If a subjectAltName extension of type dNSName is present, it SHOULD be
used as the source of the server's identity.

Matching is performed according to these rules:

   - The client MUST use the server hostname it used to open
     the LDAP connection as the value to compare against the
     server name as expressed in the server's certificate.
     The client MUST NOT use the server's canonical DNS name or
     any other derived form of name.

   - If a subjectAltName extension of type dNSName is present
     in the certificate, it SHOULD be used as the source of the
     server's identity.

   - Matching is case-insensitive.



Hodges, Morgan, Wahl                                            [Page 5]

I-D     LDAPv3: Extension for Transport Layer Security     February 2000


   - The "*" wildcard character is allowed.
     - If present, it applies only to the left-most name component.

E.g. *.bar.com would match a.bar.com, b.bar.com, etc. but not bar.com.
If more than one identity of a given type is present in the certificate
(e.g. more than one dNSName name), a match in any one of the set is con-
sidered acceptable.

If the hostname does not match the dNSName-based identity in the certi-
ficate per the above check, user-oriented clients SHOULD either notify
the user (clients MAY give the user the opportunity to continue with the
connection in any case) or terminate the connection and indicate that
the server's identity is suspect. Automated clients SHOULD close the
connection, returning and/or logging an error indicating hat the
server's identity is suspect.

Beyond the server identity checks described in this section, clients
SHOULD be prepared to do further checking to ensure that the server is
authorized to provide the service it is observed to provide. The client
MAY need to make use of local policy information.

4.7.  Refresh of Server Capabilities Information

The client MUST refresh any cached server capabilities information (e.g.
from the server's root DSE; see section 3.4 of [LDAPv3]) upon TLS ses-
sion establishment. This is necessary to protect against active-
intermediary attacks which may have altered any server capabilities
information retrieved prior to TLS establishment. The server MAY adver-
tise different capabilities after TLS establishment.

5.  Closing a TLS Connection

5.1.  Graceful Closure

Either the client or server MAY terminate the TLS connection on an LDAP
association by sending a TLS closure alert. This will leave the LDAP
association intact.

Before closing a TLS connection, the client MUST either wait for any
outstanding LDAP operations to complete, or explicitly abandon them
[LDAPv3].

After the initiator of a close has sent a closure alert, it MUST discard
any TLS messages until it has received an alert from the other party.
It will cease to send TLS Record Protocol PDUs, and following the
reciept of the alert, MAY send and receive LDAP PDUs.

The other party, if it receives a closure alert, MUST immediately



Hodges, Morgan, Wahl                                            [Page 6]

I-D     LDAPv3: Extension for Transport Layer Security     February 2000


transmit a TLS closure alert.  It will subequently cease to send TLS
Record Protocol PDUs, and MAY send and receive LDAP PDUs.

5.2.  Abrupt Closure

Either the client or server MAY abruptly close the entire LDAP associa-
tion and any TLS connection established on it by dropping the underlying
TCP connection. A server MAY beforehand send the client a Notice of
Disconnection [LDAPv3] in this case.

6.  Effects of TLS on a Client's Authorization Identity

This section describes the effects on a client's authorization identity
brought about by establishing TLS on an LDAP association. The default
effects are described first, and next the facilities for client asser-
tion of authorization identity are discussed including error conditions.
Lastly, the effects of closing the TLS connection are described.

Authorization identities and related concepts are defined in [AuthMeth].

6.1.  TLS Connection Establishment Effects

6.1.1.  Default Effects

Upon establishment of the TLS connection onto the LDAP association, any
previously established authentication and authorization identities MUST
remain in force, including anonymous state. This holds even in the case
where the server requests client authentication via TLS -- e.g. requests
the client to supply its certificate during TLS negotiation (see [TLS]).

6.1.2.  Client Assertion of Authorization Identity

A client MAY either implicitly request that its LDAP authorization iden-
tity be derived from its authenticated TLS credentials or it MAY expli-
citly provide an authorization identity and assert that it be used in
combination with its authenticated TLS credentials. The former is known
as an implicit assertion, and the latter as an explicit assertion.

6.1.2.1.  Implicit Assertion

An implicit authorization identity assertion is accomplished after TLS
establishment by invoking a Bind request of the SASL form using the
"EXTERNAL" mechanism name [SASL, LDAPv3] that SHALL NOT include the
optional credentials octet string (found within the SaslCredentials
sequence in the Bind Request). The server will derive the client's
authorization identity from the authentication identity supplied in the
client's TLS credentials (typically a public key certificate) according
to local policy. The underlying mechanics of how this is accomplished



Hodges, Morgan, Wahl                                            [Page 7]

I-D     LDAPv3: Extension for Transport Layer Security     February 2000


are implementation specific.

6.1.2.2.  Explicit Assertion

An explicit authorization identity assertion is accomplished after TLS
establishment by invoking a Bind request of the SASL form using the
"EXTERNAL" mechanism name [SASL, LDAPv3] that SHALL include the creden-
tials octet string. This string MUST be constructed as documented in
section 11 of [AuthMeth].

6.1.2.3.  Error Conditions

For either form of assertion, the server MUST verify that the client's
authentication identity as supplied in its TLS credentials is permitted
to be mapped to the asserted authorization identity. The server MUST
reject the Bind operation with an invalidCredentials resultCode in the
Bind response if the client is not so authorized. The LDAP association's
authentication identity and authorization identity (if any) which were
in effect after TLS establishment but prior to making the Bind request,
MUST remain in force.

Additionally, with either form of assertion, if a TLS session has not
been established between the client and server prior to making the SASL
EXTERNAL Bind request and there is no other external source of authenti-
cation credentials (e.g.  IP-level security RFC 1825), or if, during the
process of establishing the TLS session, the server did not request the
client's authentication credentials, the SASL EXTERNAL bind MUST fail
with a result code of inappropriateAuthentication. Any authentication
identity and authorization identity, as well as TLS connection, which
were in effect prior to making the Bind request, MUST remain in force.

6.2.  TLS Connection Closure Effects

Closure of the TLS connection MUST cause the LDAP association to move to
an anonymous authentication and authorization state regardless of the
state established over TLS and regardless of the authentication and
authorization state prior to TLS connection establishment.

7.  Security Considerations

The goals of using the TLS protocol with LDAP are to ensure connection
confidentiality and integrity, and to optionally provide for authentica-
tion. TLS expressly provides these capabilities, as described in [TLS].

All security gained via use of the Start TLS operation is gained by the
use of TLS itself. The Start TLS operation, on its own, does not provide
any additional security.




Hodges, Morgan, Wahl                                            [Page 8]

I-D     LDAPv3: Extension for Transport Layer Security     February 2000


The use of TLS does not provide or ensure for confidentiality and/or
non-repudiation of the data housed by an LDAP-based directory server.
Nor does it secure the data from inspection by the server administra-
tors.  Once established, TLS only provides for and ensures confidential-
ity and integrity of the operations and data in transit over the LDAP
association, and only if the implementations on the client and server
support and negotiate it.

The level of security provided though the use of TLS depends directly on
both the quality of the TLS implementation used and the style of usage
of that implementation. Additionally, an active-intermediary attacker
can remove the Start TLS extended operation from the supportedExtension
attribute of the root DSE. Therefore, both parties SHOULD independently
ascertain and consent to the security level achieved once TLS is esta-
blished and before begining use of the TLS connection. For example, the
security level of the TLS connection might have been negotiated down to
plaintext.

Clients SHOULD either warn the user when the security level achieved
does not provide confidentiality and/or integrity protection, or be con-
figurable to refuse to proceed without an acceptable level of security.

Client and server implementors SHOULD take measures to ensure proper
protection of credentials and other confidential data where such meas-
ures are not otherwise provided by the TLS implementation.

Server implementors SHOULD allow for server administrators to elect
whether and when connection confidentiality and/or integrity is
required, as well as elect whether and when client authentication via
TLS is required.

8.  Acknowledgements

The authors thank Tim Howes, Paul Hoffman, John Kristian, Shirish Rai,
Jonathan Trostle, Harald Alvestrand, and Marcus Leech for their contri-
butions to this document.

9.  References

[AuthMeth]     M. Wahl, H. Alvestrand, J. Hodges, R. Morgan. "Authenti-
               cation Methods for LDAP".  INTERNET-DRAFT, Work In Pro-
               gress. draft-ietf-ldapext-authmeth-04.txt

[LDAPv3]       M. Wahl, S. Kille and T. Howes. "Lightweight Directory
               Access Protocol (v3)". RFC 2251.

[ReqsKeywords] Scott Bradner. "Key Words for use in RFCs to Indicate
               Requirement Levels". RFC 2119.



Hodges, Morgan, Wahl                                            [Page 9]

I-D     LDAPv3: Extension for Transport Layer Security     February 2000


[SASL]         J. Myers. "Simple Authentication and Security Layer
               (SASL)". RFC 2222.

[TLS]          Tim Dierks, C. Allen. "The TLS Protocol Version 1.0". RFC
               2246.

10.  Authors' Addresses

   Jeff Hodges
   Oblix, Inc.
   18922 Forge Drive
   Cupertino, CA 95014
   USA

   Phone: +1-408-861-6656
   EMail: JHodges@oblix.com


   RL "Bob" Morgan
   Computing and Communications
   University of Washington
   Seattle, WA
   USA

   Phone: +1-206-221-3307
   EMail: rlmorgan@washington.edu


   Mark Wahl
   Innosoft International, Inc.
   8911 Capital of Texas Hwy, Suite 4140
   Austin, TX 78759
   USA

   Phone: +1 626 919 3600
   EMail:  Mark.Wahl@innosoft.com


                  -----------------------------------

11.  Intellectual Property Rights Notices

The IETF takes no position regarding the validity or scope of any intel-
lectual property or other rights that might be claimed to  pertain to
the implementation or use of the technology described in this document
or the extent to which any license under such rights might or might not
be available; neither does it represent that it has made any effort to
identify any such rights.  Information on the IETF's procedures with



Hodges, Morgan, Wahl                                           [Page 10]

I-D     LDAPv3: Extension for Transport Layer Security     February 2000


respect to rights in standards-track and standards-related documentation
can be found in BCP-11.  Copies of claims of rights made available for
publication and any assurances of licenses to be made available, or the
result of an attempt made to obtain a general license or permission for
the use of such proprietary rights by implementors or users of this
specification can be obtained from the IETF Secretariat.

The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary rights
which may cover technology that may be required to practice this stan-
dard.  Please address the information to the IETF Executive Director.

12.  Copyright Notice and Disclaimer

   Copyright (C) The Internet Society (1998).  All Rights Reserved.

   This document and translations of it may be copied and furnished to
   others, and derivative works that comment on or otherwise explain it
   or assist in its implementation may be prepared, copied, published
   and distributed, in whole or in part, without restriction of any
   kind, provided that the above copyright notice and this paragraph are
   included on all such copies and derivative works.  However, this
   document itself may not be modified in any way, such as by removing
   the copyright notice or references to the Internet Society or other
   Internet organizations, except as needed for the purpose of develop-
   ing Internet standards in which case the procedures for copyrights
   defined in the Internet Standards process must be followed, or as
   required to translate it into languages other than English.

   The limited permissions granted above are perpetual and will not be
   revoked by the Internet Society or its successors or assigns.

   This document and the information contained herein is provided on an
   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MER-
   CHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.













Hodges, Morgan, Wahl                                           [Page 11]



--==_Exmh_5686075430--


From list@netscape.com  Thu Feb 10 12:32:22 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA05157
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 12:32:22 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id JAA22703;
	Thu, 10 Feb 2000 09:29:50 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id JAA01012; Thu, 10 Feb 2000 09:31:35 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 09:31:35 -0800 (PST)
Message-Id: <3.0.5.32.20000210093128.00984100@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Thu, 10 Feb 2000 09:31:28 -0800
To: "Mcauliffe, Kristin" <mcaulifk@ftm.disa.mil>
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Re: Question on Extensible Match Filter
Cc: ietf-ldapext@netscape.com
In-Reply-To: <AAAAD7534DADD3119C4F00204804F0CC52C492@rbmail101.chamb.dis
 a.mil>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"VOZJKD.A.iP.2Xvo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 10:02 AM 2/10/00 -0500, Mcauliffe, Kristin wrote:
>I am working on LDAP v3 Search filters and cannot seem to get a return from
>the DS servers (Netscape, Novell NDS and MS AD) that I am testing using the
>Extensible Match string.

I suggest you request help on a forum specific to the implementation
of LDAPv3 you are using.

>I am following the definition identified in
>RFC2254 and those identified in Chapter 3 of "Understanding and Deploying
>LDAP DS" (and the examples).  I have used both the assertion syntax and the
>value syntax. 
>
>The results received are:  
>
>Bind operation successful.
>ldap_search_s:  Protocol error 
>ldap_search_s:  additional info: Bad search filter

Looks like you sent the filter to an LDAPv2 server.  An LDAPv3
should not have returned a protocol error just because it
doesn't recognize extended search filter or other filter details.

RFC 2251:
     A filter item evaluates to Undefined when the server would not
     be able to determine whether the assertion value matches an
     entry.  If an attribute description in an equalityMatch, substrings,
     greaterOrEqual, lessOrEqual, approxMatch or extensibleMatch
     filter is not recognized by the server, a matching rule id in the
     extensibleMatch is not recognized by the server, the assertion
     value cannot be parsed, or the type of filtering requested is not
     implemented, then the filter is Undefined. 


I suggest contacting your server vendor.  Be sure to provide
the exact search filter specified and other detail likely to
assist the vendor in helping you.

Kurt



From list@netscape.com  Thu Feb 10 12:44:32 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA05459
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 12:44:29 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id JAA02283;
	Thu, 10 Feb 2000 09:39:47 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id JAA07790; Thu, 10 Feb 2000 09:43:18 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 09:43:18 -0800 (PST)
X-Authentication-Warning: perq.cac.washington.edu: rlmorgan owned process doing -bs
Date: Thu, 10 Feb 2000 09:43:42 -0800 (PST)
From: "RL 'Bob' Morgan" <rlmorgan@washington.edu>
X-Sender: rlmorgan@perq.cac.washington.edu
Reply-To: "RL 'Bob' Morgan" <rlmorgan@washington.edu>
To: IETF ldapext WG <ietf-ldapext@netscape.com>
Subject: LDAP subtree search with zero-length DN for baseObject?
Message-ID: <Pine.LNX.4.19.99.0002080043140.19935-100000@perq.cac.washington.edu>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Resent-Message-ID: <"5F18tD.A.Q5B.0ivo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


RFC 2251 says, in section 3.4:

   An LDAP server MUST provide information about itself and other
   information that is specific to each server.  This is represented as
   a group of attributes located in the root DSE (DSA-Specific Entry),
   which is named with the zero-length LDAPDN.  These attributes are
   retrievable if a client performs a base object search of the root
   with filter "(objectClass=*)", however they are subject to access
   control restrictions.  The root DSE MUST NOT be included if the
   client performs a subtree search starting from the root.

It isn't clear to me, though, what the expected result should be from a
subtree search where the baseObject is the zero-length DN.  It mustn't
include the root DSE info, but what should it include?  Should this mean
"the subtree rooted at root of the global DIT"?  Presumably, if so, in
existing cases this would typically fail since the DSA doesn't know how to
contact a DSA for "the root".  Or can a DSA interpret it as "search all
the naming contexts you have locally?"  By experiment I find that servers
I've tried this on report "no such object".

Thanks,

 - RL "Bob"




From list@netscape.com  Thu Feb 10 12:49:53 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA05579
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 12:49:52 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id JAA26615;
	Thu, 10 Feb 2000 09:46:42 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id JAA12347; Thu, 10 Feb 2000 09:48:23 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 09:48:23 -0800 (PST)
Message-ID: <90B308416283D311978B0090272BF7F503C1DA@mail.availnetworks.com>
From: Ron Carter <rcarter@availnetworks.com>
To: IETF ldapext WG <ietf-ldapext@netscape.com>
Subject: RE: Notification: Inbound Mail Failure 
Date: Thu, 10 Feb 2000 12:47:41 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.10)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01BF73EE.F141B810"
Resent-Message-ID: <"rj6pd.A.RAD.mnvo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01BF73EE.F141B810
Content-Type: text/plain;
	charset="iso-8859-1"

This user is no longer with our company. Please remove him from your list.

Ron Carter
Network Administrator
Avail Networks
305 E. Eisenhower pkwy.
Ann Arbor, MI   48108
(734) 332-5578
rcarter@availnetworks.com


-----Original Message-----
From: Ron Carter 
Sent: Thursday, February 10, 2000 12:43 PM
To: Ron Carter
Subject: Notification: Inbound Mail Failure 


The following recipients did not receive the attached mail. Reasons are
listed with each recipient:

<rich@nei.com> rich@nei.com
	MSEXCH:IMS:avail:site-1:AVAIL-EXC 0 (000C05A6) Unknown Recipient

The message that caused this notification was:

 

------_=_NextPart_001_01BF73EE.F141B810
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<META NAME="Generator" CONTENT="MS Exchange Server version 5.5.2448.0">
<TITLE>RE: Notification: Inbound Mail Failure </TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=2>This user is no longer with our company. Please remove him from your list.</FONT>
</P>

<P><FONT SIZE=2>Ron Carter</FONT>
<BR><FONT SIZE=2>Network Administrator</FONT>
<BR><FONT SIZE=2>Avail Networks</FONT>
<BR><FONT SIZE=2>305 E. Eisenhower pkwy.</FONT>
<BR><FONT SIZE=2>Ann Arbor, MI&nbsp;&nbsp; 48108</FONT>
<BR><FONT SIZE=2>(734) 332-5578</FONT>
<BR><FONT SIZE=2>rcarter@availnetworks.com</FONT>
</P>
<BR>

<P><FONT SIZE=2>-----Original Message-----</FONT>
<BR><FONT SIZE=2>From: Ron Carter </FONT>
<BR><FONT SIZE=2>Sent: Thursday, February 10, 2000 12:43 PM</FONT>
<BR><FONT SIZE=2>To: Ron Carter</FONT>
<BR><FONT SIZE=2>Subject: Notification: Inbound Mail Failure </FONT>
</P>
<BR>

<P><FONT SIZE=2>The following recipients did not receive the attached mail. Reasons are listed with each recipient:</FONT>
</P>

<P><FONT SIZE=2>&lt;rich@nei.com&gt; rich@nei.com</FONT>
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <FONT SIZE=2>MSEXCH:IMS:avail:site-1:AVAIL-EXC 0 (000C05A6) Unknown Recipient</FONT>
</P>

<P><FONT SIZE=2>The message that caused this notification was:</FONT>
</P>

<P><FONT SIZE=2>&nbsp;</FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01BF73EE.F141B810--



From list@netscape.com  Thu Feb 10 12:56:04 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA05769
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 12:56:01 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id JAA28232;
	Thu, 10 Feb 2000 09:53:27 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id JAA17168; Thu, 10 Feb 2000 09:55:12 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 09:55:12 -0800 (PST)
Message-Id: <s8a29906.085@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.2.1
Date: Thu, 10 Feb 2000 10:54:57 -0700
From: "Jim Sermersheim" <JIMSE@novell.com>
To: <ietf-ldapext@netscape.com>, <rlmorgan@washington.edu>
Subject: Re: LDAP subtree search with zero-length DN for baseObject?
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Resent-Message-ID: <"HxA5_B.A.-LE.Auvo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ietf.org id MAA05769

Our server follows the "search all the naming contexts you have locally" model which I think is reasonable.

Jim

>>> "RL 'Bob' Morgan" <rlmorgan@washington.edu> 2/10/00 10:43:42 AM >>>

RFC 2251 says, in section 3.4:

   An LDAP server MUST provide information about itself and other
   information that is specific to each server.  This is represented as
   a group of attributes located in the root DSE (DSA-Specific Entry),
   which is named with the zero-length LDAPDN.  These attributes are
   retrievable if a client performs a base object search of the root
   with filter "(objectClass=*)", however they are subject to access
   control restrictions.  The root DSE MUST NOT be included if the
   client performs a subtree search starting from the root.

It isn't clear to me, though, what the expected result should be from a
subtree search where the baseObject is the zero-length DN.  It mustn't
include the root DSE info, but what should it include?  Should this mean
"the subtree rooted at root of the global DIT"?  Presumably, if so, in
existing cases this would typically fail since the DSA doesn't know how to
contact a DSA for "the root".  Or can a DSA interpret it as "search all
the naming contexts you have locally?"  By experiment I find that servers
I've tried this on report "no such object".

Thanks,

 - RL "Bob"





From list@netscape.com  Thu Feb 10 13:08:56 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA06188
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 13:08:49 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id KAA08082;
	Thu, 10 Feb 2000 10:04:04 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id KAA23636; Thu, 10 Feb 2000 10:07:35 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 10:07:35 -0800 (PST)
Message-Id: <s8a29bf2.053@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.2.1
Date: Thu, 10 Feb 2000 11:07:14 -0700
From: "Jim Sermersheim" <JIMSE@novell.com>
To: <M.Wahl@INNOSOFT.COM>, <ietf-ldapext@netscape.com>, <Kurt@OpenLDAP.org>,
        <d.w.chadwick@salford.ac.uk>
Subject: Re: RFC2251: RootDSE subschemasubentry issue
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Resent-Message-ID: <"zpo8mB.A.7wF.m5vo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ietf.org id NAA06188

>>> "David Chadwick" <d.w.chadwick@salford.ac.uk> 2/10/00 7:24:12 AM >>>

>So we really need placeholders for all of these.
>It seems to me like the rootDSE should hold server specific 
>attributes, a subentry under the NC context prefix should hold NC 
>specific attributes (this is in line with the LDUP group I believe), and 
>a subentry under an Admin Point should hold Man Domain specific 
>attributes (this is in line with X.500(93)).
>
>What do you think?

<snip>

>Or, an attribute which lists NCs and have subentries under the NCs, 
>so that no pointer is needed in the rootDSE.

This makes sense to me. The current model of listing the DN's of all known subschema subentries is confusing because of the "decoupled from NCs" problems already discussed. As long as a client can discover the NCs, it can discover the entire set of subschema subentries.

Jim



From list@netscape.com  Thu Feb 10 13:13:20 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA06313
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 13:13:17 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id KAA09531;
	Thu, 10 Feb 2000 10:09:10 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id KAA27737; Thu, 10 Feb 2000 10:12:42 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 10:12:42 -0800 (PST)
Message-Id: <3.0.5.32.20000210101238.009a0100@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Thu, 10 Feb 2000 10:12:38 -0800
To: ietf-ldapext@netscape.com
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: draft-ietf-ldapext-ldapv3-tls-06.txt
Cc: jhodges@oblix.com, RLBob Morgan <rlmorgan@cac.washington.edu>,
        Mark Wahl <M.Wahl@INNOSOFT.COM>,
        LDAP extensions <ietf-ldapext@netscape.com>
In-Reply-To: <200002101717.JAA01460@breakaway.Stanford.EDU>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"2hirQC.A.HxG.Z-vo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Jeff,

I have only significant concern.

In 6.1.2:
	[Upon failure of BIND SASL/EXTERNAL...]
	The LDAP association's authentication identity and
       authorization identity (if any) which were in effect
       after TLS establishment but prior to making the Bind request,
       MUST remain in force.

This is inconsistent with RFC 2251 prescribed behavior:
  Clients MAY send multiple bind requests on a connection to change
  their credentials. ...  Authentication from earlier binds
  are subsequently ignored, and so if the bind fails, the connection
  will be treated as anonymous.

I can find no compelling reasoning why BIND failure whilst
TLS is enabled should have special behavior.  I believe this an
unnecessary complication.  I believe there are many good reasons
why this BIND behavior should be consistent without regard to TLS
(or IPSEC or whatever).  Reasons: simplicity of specification,
implementation, and use.

The general rule for security is simplicity.  Why the complication?



From list@netscape.com  Thu Feb 10 13:20:38 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA06591
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 13:20:36 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id KAA03976;
	Thu, 10 Feb 2000 10:18:14 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id KAA02411; Thu, 10 Feb 2000 10:19:56 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 10:19:56 -0800 (PST)
Date: Thu, 10 Feb 2000 12:18:50 -0600
From: Mark Wahl <M.Wahl@INNOSOFT.COM>
Subject: Re: LDAP subtree search with zero-length DN for baseObject?
In-reply-to: "Your message of Thu, 10 Feb 2000 09:43:42 PST."
 <Pine.LNX.4.19.99.0002080043140.19935-100000@perq.cac.washington.edu>
Sender: Mark.Wahl@INNOSOFT.COM
To: "RL 'Bob' Morgan" <rlmorgan@washington.edu>
Cc: IETF ldapext WG <ietf-ldapext@netscape.com>
Message-id: <3425.950206730@threadgill.austin.innosoft.com>
Resent-Message-ID: <"1x8DKC.A.Xl.LFwo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


I can tell you what at least one implementation does in the case of a 
search that is not baseObject and the base name is zero length:

 1) If the server is configured to hold ALL naming contexts immediately 
   subordinate to the root (it is a top level server), then it searches 
   each of these naming contexts that are immediately subordinate to the
   root, and any subordinate contexts as normal.  

 2) If the server is configured with a superior reference, then it returns
    a referral.

 3) Otherwise it returns an error such as noSuchObject.

Mark Wahl, Directory Product Architect
Innosoft International, Inc.



From list@netscape.com  Thu Feb 10 13:20:43 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA06601
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 13:20:41 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id KAA10903;
	Thu, 10 Feb 2000 10:16:32 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id KAA02521; Thu, 10 Feb 2000 10:20:02 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 10:20:02 -0800 (PST)
Message-Id: <3.0.5.32.20000210101955.00990950@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Thu, 10 Feb 2000 10:19:55 -0800
To: "Jim Sermersheim" <JIMSE@novell.com>
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Re: LDAP subtree search with zero-length DN for baseObject?
Cc: <ietf-ldapext@netscape.com>, <rlmorgan@washington.edu>
In-Reply-To: <s8a29906.085@prv-mail20.provo.novell.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"VevoP.A.0m.RFwo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 10:54 AM 2/10/00 -0700, Jim Sermersheim wrote:
>Our server follows the "search all the naming contexts you have locally" model which I think is reasonable.

Our server returns noSuchObject (or superior referral) unless the
server is configured to be a global root server (experimental only).



From list@netscape.com  Thu Feb 10 13:22:49 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA06654
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 13:22:45 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id KAA11764;
	Thu, 10 Feb 2000 10:18:24 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id KAA05274; Thu, 10 Feb 2000 10:21:53 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 10:21:53 -0800 (PST)
Date: Thu, 10 Feb 2000 12:20:45 -0600
From: Mark Wahl <M.Wahl@INNOSOFT.COM>
Subject: Re: RFC2251: RootDSE subschemasubentry issue
In-reply-to: "Your message of Thu, 10 Feb 2000 11:07:14 MST."
 <s8a29bf2.052@prv-mail20.provo.novell.com>
Sender: Mark.Wahl@INNOSOFT.COM
To: Jim Sermersheim <JIMSE@novell.com>
Cc: ietf-ldapext@netscape.com, Kurt@OpenLDAP.org, d.w.chadwick@salford.ac.uk
Message-id: <3678.950206845@threadgill.austin.innosoft.com>
Resent-Message-ID: <"W4ygPD.A.ISB.AHwo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


> As long as a client can discover the NCs, it can discover the entire 
> set of subschema subentries.

This doesn't work where there are subschema administrative areas inside of 
naming contexts.  You put the subschema subentry below the subschema admin 
point, not below the naming context prefix.

Mark Wahl, Directory Product Architect
Innosoft International, Inc.



From list@netscape.com  Thu Feb 10 13:35:12 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA07034
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 13:35:08 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id KAA14018;
	Thu, 10 Feb 2000 10:29:57 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id KAA12379; Thu, 10 Feb 2000 10:33:29 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 10:33:29 -0800 (PST)
Date: Thu, 10 Feb 2000 12:33:17 -0600
From: Andy Coulbeck <andy.coulbeck@INNOSOFT.COM>
Subject: Re: RFC2251: RootDSE subschemasubentry issue
Sender: Andy.Coulbeck@INNOSOFT.COM
To: Jim Sermersheim <JIMSE@novell.com>
Cc: M.Wahl@INNOSOFT.COM, ietf-ldapext@netscape.com, Kurt@OpenLDAP.org,
        d.w.chadwick@salford.ac.uk
Message-id: <38A3046D.FBC7D91D@innosoft.com>
Organization: Innosoft International Inc.
MIME-version: 1.0
X-Mailer: Mozilla 4.7 [en] (X11; U; SunOS 5.6 sun4u)
Content-type: text/plain; charset=us-ascii
Content-transfer-encoding: 7bit
X-Accept-Language: fr, en
References: <s8a29bf2.053@prv-mail20.provo.novell.com>
Resent-Message-ID: <"UuDmUB.A.vAD.3Rwo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Jim Sermersheim wrote:
> 
> >>> "David Chadwick" <d.w.chadwick@salford.ac.uk> 2/10/00 7:24:12 AM >>>
> 
> >So we really need placeholders for all of these.
> >It seems to me like the rootDSE should hold server specific
> >attributes, a subentry under the NC context prefix should hold NC
> >specific attributes (this is in line with the LDUP group I believe), and
> >a subentry under an Admin Point should hold Man Domain specific
> >attributes (this is in line with X.500(93)).
> >
> >What do you think?
> 
> <snip>
> 
> >Or, an attribute which lists NCs and have subentries under the NCs,
> >so that no pointer is needed in the rootDSE.
> 
> This makes sense to me. The current model of listing the DN's of all known subschema subentries is confusing because of the "decoupled from NCs" problems already discussed. As long as a client can discover the NCs, it can discover the entire set of subschema subentries.
> 
> Jim

As Thomas Salter has already pointed out, the subschema subentry
associated with a given naming context can be found by reading the
naming context entry. The root DSE already contains the set of naming
contexts. Therefore the current model is not broken. Also, in the
current model, a server may have several naming contexts referring to
a single subschema subentry. This would not be possible if subschema
subentries were assumed to be under the naming context.



From list@netscape.com  Thu Feb 10 13:38:19 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA07156
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 13:38:14 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id KAA10030;
	Thu, 10 Feb 2000 10:35:53 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id KAA15874; Thu, 10 Feb 2000 10:37:39 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 10:37:39 -0800 (PST)
Sender: mcs@netscape.com (Mark C Smith)
Message-ID: <38A3056D.64A8167@netscape.com>
Date: Thu, 10 Feb 2000 13:37:33 -0500
From: Mark Smith <mcs@netscape.com>
Organization: iPlanet E-Commerce Solutions
X-Mailer: Mozilla 4.7 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en-US,en
MIME-Version: 1.0
To: John Storry <jstorry@netconnect.co.uk>,
        John Storry <jstorry@netconnect.co.uk>
CC: ietf-ldapext@netscape.com
Subject: Re: Please remove from mailing list
References: <017E033801420200@mailgate.netconnect.co.uk>
Content-Type: multipart/mixed;
 boundary="------------7977908668D4FCB925CFF188"
Resent-Message-ID: <"JuSG7D.A.d3D.xVwo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

This is a multi-part message in MIME format.
--------------7977908668D4FCB925CFF188
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

John Storry wrote:
> 
> Could you please remove the following:
> 
> dnesbitt@netconnect.co.uk from your mailing list ASAP as this user is no
> longer employed by this company.

Please, please do not send "unsubscribe" and other administrative
requests to the entire LDAPEXT mailing list!  See:

   http://www.ietf.org/html.charters/ldapext-charter.html

for list information.  Or just try the nearly universal Internet
convention of sending administrative requests to -request, i.e.,

   mailto:ietf-ldapext-REQUEST@netscape.com

Thanks.  I won't repeat this again soon, so I hope everyone is paying
attention.

-- 
Mark Smith
Directory Product Development / iPlanet E-Commerce Solutions
My words are my own, not my employer's.            Got LDAP?
--------------7977908668D4FCB925CFF188
Content-Type: message/rfc822
Content-Disposition: inline

Return-Path: <list@aka.mcom.com>
Received: from aka.mcom.com ([205.217.237.180]) by
          tintin.mcom.com (Netscape Messaging Server 4.1) with ESMTP id
          FPQ6TK00.S2Q for <mcs@tintin.mcom.com>; Thu, 10 Feb 2000 09:48:56 -0800 
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id JAA13086 for mcs; Thu, 10 Feb 2000 09:48:56 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 09:48:56 -0800 (PST)
Message-ID: <90B308416283D311978B0090272BF7F503C1DA@mail.availnetworks.com>
From: Ron Carter <rcarter@availnetworks.com>
To: IETF ldapext WG <ietf-ldapext@netscape.com>
Subject: RE: Notification: Inbound Mail Failure 
Date: Thu, 10 Feb 2000 12:47:41 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.10)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01BF73EE.F141B810"
Resent-Message-ID: <"rj6pd.A.RAD.mnvo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01BF73EE.F141B810
Content-Type: text/plain;
	charset="iso-8859-1"

This user is no longer with our company. Please remove him from your list.

Ron Carter
Network Administrator
Avail Networks
305 E. Eisenhower pkwy.
Ann Arbor, MI   48108
(734) 332-5578
rcarter@availnetworks.com


-----Original Message-----
From: Ron Carter 
Sent: Thursday, February 10, 2000 12:43 PM
To: Ron Carter
Subject: Notification: Inbound Mail Failure 


The following recipients did not receive the attached mail. Reasons are
listed with each recipient:

<rich@nei.com> rich@nei.com
	MSEXCH:IMS:avail:site-1:AVAIL-EXC 0 (000C05A6) Unknown Recipient

The message that caused this notification was:

 

------_=_NextPart_001_01BF73EE.F141B810
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<META NAME="Generator" CONTENT="MS Exchange Server version 5.5.2448.0">
<TITLE>RE: Notification: Inbound Mail Failure </TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=2>This user is no longer with our company. Please remove him from your list.</FONT>
</P>

<P><FONT SIZE=2>Ron Carter</FONT>
<BR><FONT SIZE=2>Network Administrator</FONT>
<BR><FONT SIZE=2>Avail Networks</FONT>
<BR><FONT SIZE=2>305 E. Eisenhower pkwy.</FONT>
<BR><FONT SIZE=2>Ann Arbor, MI&nbsp;&nbsp; 48108</FONT>
<BR><FONT SIZE=2>(734) 332-5578</FONT>
<BR><FONT SIZE=2>rcarter@availnetworks.com</FONT>
</P>
<BR>

<P><FONT SIZE=2>-----Original Message-----</FONT>
<BR><FONT SIZE=2>From: Ron Carter </FONT>
<BR><FONT SIZE=2>Sent: Thursday, February 10, 2000 12:43 PM</FONT>
<BR><FONT SIZE=2>To: Ron Carter</FONT>
<BR><FONT SIZE=2>Subject: Notification: Inbound Mail Failure </FONT>
</P>
<BR>

<P><FONT SIZE=2>The following recipients did not receive the attached mail. Reasons are listed with each recipient:</FONT>
</P>

<P><FONT SIZE=2>&lt;rich@nei.com&gt; rich@nei.com</FONT>
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <FONT SIZE=2>MSEXCH:IMS:avail:site-1:AVAIL-EXC 0 (000C05A6) Unknown Recipient</FONT>
</P>

<P><FONT SIZE=2>The message that caused this notification was:</FONT>
</P>

<P><FONT SIZE=2>&nbsp;</FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01BF73EE.F141B810--


--------------7977908668D4FCB925CFF188--



From list@netscape.com  Thu Feb 10 14:01:54 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA07688
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 14:01:52 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id KAA14406;
	Thu, 10 Feb 2000 10:59:28 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id LAA29470; Thu, 10 Feb 2000 11:01:14 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 11:01:14 -0800 (PST)
Message-Id: <3.0.5.32.20000210110056.00991ad0@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Thu, 10 Feb 2000 11:00:56 -0800
To: d.w.chadwick@salford.ac.uk
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Re: RFC2251: RootDSE subschemasubentry issue
Cc: ietf-ldapext@netscape.com, Mark Wahl <M.Wahl@INNOSOFT.COM>
In-Reply-To: <E12IuU8-00070l-00@serv1.is1.u-net.net>
References: <3.0.5.32.20000209115809.00970b70@infidel.boolean.net>
 <E12Icmc-0001pY-00@serv1.is1.u-net.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"6nrhXB.A.KMH.5rwo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 02:22 PM 2/10/00 -0000, David Chadwick wrote:
>
>> At 07:26 PM 2/9/00 -0000, David Chadwick wrote:
>> >Do you agree with this analysis?
>> 
>> Yes.
>
>Good, we are making progress towards resolution.
>
>> 
>> The next questions are:
>> 
>> What other attributes published in RootDSE are naming
>> context specific?
>
>The question should actually be wider than this I believe. i.e. What 
>attributes are NC specific and what attributes are server specific 
>and what attributes are Management Domain specific, since
>
>i) a Man Domain can comprise many servers
>ii) a server can hold many NCs
>iii) a server can hold many Man Domains.

Yes...

>It seems to me like the rootDSE should hold server specific 
>attributes, a subentry under the NC context prefix should hold NC 
>specific attributes (this is in line with the LDUP group I believe), and 
>a subentry under an Admin Point should hold Man Domain specific 
>attributes (this is in line with X.500(93)).
>
>What do you think?

Might be workable... [see below]

> 
>> From the design perpective, I see different ways of
>> providing naming context specific information:
>> 
>> 1) add new attributes which provide the context
>> and the capability as combined value.  (Ie:
>>  1A)	dn:  (root dse)
>>  subschemasubentries: dc=openldap,dc=org $
>>   ( cn=subschema $ cn=openldap-subschema )
>>  subschemasubentries: dc=example,dc=com $ cn=subschema
>>  ...
>> 
>> or:
>>  1B)	dn: (root dse)
>>  subschemasubentries: dc=openldap,dc=org $ cn=subschema
>>  subschemasubentries: dc=openldap,dc=org $ cn=opendlap-subschema
>>  subschemasubentries: dc=example,dc=com $ cn=subschema
>> 
>> 2) provide an attribute which lists naming contexts
>> AND a provides a DN of an entry (or subentry) which
>> contains attributes describing the naming context
>> specific capabilities.
>
>Or, an attribute which lists NCs and have subentries under the NCs, 
>so that no pointer is needed in the rootDSE.

I would like to have attribute type in the NC who's value
named the entry (or subentry) so as to avoid hardcoding the
DN of the subentry.  So, I'd like a pointer... but the
pointer can be in the NC.

If in the RootDSE, then it needs to contain both the DN of
the namingContext and the DN of the subentry.

>Why would you have 2 subschemasubentries for 1 NC?

Separate subschema administrative areas within the NC.
[See Mark Wahl's comment]



From list@netscape.com  Thu Feb 10 14:12:44 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA07992
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 14:12:39 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id LAA22434;
	Thu, 10 Feb 2000 11:08:17 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id LAA06447; Thu, 10 Feb 2000 11:11:48 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 11:11:48 -0800 (PST)
Sender: kristian@netscape.com (John Kristian)
Message-ID: <38A30D72.BEEEC837@netscape.com>
Date: Thu, 10 Feb 2000 11:11:46 -0800
From: John Kristian <kristian@netscape.com>
Organization: iPlanet E-Commerce Solutions
X-Mailer: Mozilla 4.7 [en] (X11; U; SunOS 5.5.1 sun4u)
X-Accept-Language: en-US,en
MIME-Version: 1.0
To: "Mcauliffe Kristin" <mcaulifk@ftm.disa.mil>
CC: ietf-ldapext@netscape.com
Subject: Re: Question on Extensible Match Filter
References: <AAAAD7534DADD3119C4F00204804F0CC52C492@rbmail101.chamb.disa.mil>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"E5-LXD.A.dkB.z1wo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Your query is somewhat off-topic here.  A better forum would be
snews://secnews.netscape.com/netscape.server.directory or
news://news.mozilla.org/netscape.public.mozilla.directory
See also http://help.netscape.com/products/server/directory/index.html

"Mcauliffe, Kristin" wrote:

> I ... cannot seem to get a return from the DS servers (Netscape, Novell NDS
> and MS AD) that I am testing using the Extensible Match string.

http://home.netscape.com/eng/server/directory/4.1/admin/find.htm#1041100
might be helpful.




From list@netscape.com  Thu Feb 10 15:38:39 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA09999
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 15:38:37 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id MAA00319;
	Thu, 10 Feb 2000 12:35:31 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id MAA11588; Thu, 10 Feb 2000 12:37:15 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 12:37:15 -0800 (PST)
Sender: mcs@netscape.com (Mark C Smith)
Message-ID: <38A32174.6E0ECA06@netscape.com>
Date: Thu, 10 Feb 2000 15:37:08 -0500
From: Mark Smith <mcs@netscape.com>
Organization: iPlanet E-Commerce Solutions
X-Mailer: Mozilla 4.7 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en-US,en
MIME-Version: 1.0
To: Mark Meredith <MMEREDIT@novell.com>
CC: M.Wahl@INNOSOFT.COM, Roger Harrison <RHARRISON@novell.com>,
        ietf-ldapext@netscape.com
Subject: Re: please publish draft-mmeredith-rootdse-vendor-info-01.txt
References: <s8a145a8.027@prv-mail20.provo.novell.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"uDo-iC.A.y0C.6Fyo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Mark Meredith wrote:

> I will add your suggestion to section 6  Notes to Client Developers. To read
> something like this.
> 
>  6. Notes to Client Developers
>   
>       The use of vendorName and vendorVersion SHOULD NOT be used to
>       discover features. It is just an informational attribute. If a
>       client relies on a vendorVersion number then that client MUST
>       be coded to work with later versions and not just one version and
>       no other.
>   
>       If the client does not recognize the specific vendorName/vendorVersion as 
>       one it has for its 'bug workaround needed' table, then the client MUST 
>       assume that the server it is talking to is complete and correct. 
>   
>  Does this look ok?

I think this text is an improvement.  But the "Overview" text also
implies that these attributes should be used for discovering some
features:

3. Overview

   The root DSE query is a mechanism used by clients to find out what
   controls, extensions, etc. is available from a given LDAP server. It
   is useful to be able to query an LDAP server to determine the vendor
   of that server and see what version of that vendor's code is
   currently installed. Since vendors can implement X- options for
   attributes, classes, and syntaxes (described in section 4 of
   [RFC2251] and section 4 of [RFC2252] ) that may or may not be
   published, this would allow users or applications to be able to
   determine if these features are available from a given server.

I feel strongly that this document should consistently say that the
vendorName and vendorVersion attribute values must only be used to work
around bugs and shortcomings of a server and for purely informational
(e.g., display) purposes.  If others agree, the overview should be
revised as well.

If there are X- options that are adding real value to subschema values,
let's start a discussion about them (and a document if appropriate).  I
suspect there are, given that several vendors (including
iPlanet/Sun/netscape) are using various X- options today in their
products.

Also, the format for vendorVersion should be more fully specified.  It
is specified as an integer.  But what if I need to publish version
4.11?  I suggest making the value "version multiplied times 100" or
using a string format.

I also wonder if there should be a vendorProductName attribute as well,
given that some vendors produce more than one product that processes
LDAP requests.  I suppose the vendorName field can be overloaded for
that purpose, e.g.,

    vendorName: OpenLDAP / slapd
    vendorName: OpenLDAP / ldapd
    ...

but a separate attribute might be better.

A minor formatting comment: the draft includes at least two non-ASCII
characters (one in the "Overview" section and one in the "Author's
Addresses" section).  I think both were intended to be apostrophes (').

-- 
Mark Smith
Directory Product Development / iPlanet E-Commerce Solutions
My words are my own, not my employer's.            Got LDAP?



From list@netscape.com  Thu Feb 10 15:54:38 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA10403
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 15:54:37 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id MAA06249;
	Thu, 10 Feb 2000 12:47:39 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id MAA15928; Thu, 10 Feb 2000 12:51:11 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 12:51:11 -0800 (PST)
Message-Id: <3.0.5.32.20000210125106.00926100@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Thu, 10 Feb 2000 12:51:06 -0800
To: Mark Smith <mcs@netscape.com>
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Re: please publish draft-mmeredith-rootdse-vendor-info-01.txt
Cc: Mark Meredith <MMEREDIT@novell.com>, M.Wahl@INNOSOFT.COM,
        Roger Harrison <RHARRISON@novell.com>, ietf-ldapext@netscape.com
In-Reply-To: <38A32174.6E0ECA06@netscape.com>
References: <s8a145a8.027@prv-mail20.provo.novell.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"XkXAs.A.W4D.-Syo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 03:37 PM 2/10/00 -0500, Mark Smith wrote:
>Also, the format for vendorVersion should be more fully specified.

I disagree.  Since you state that this should be for
display purposes and/or for working around known bugs specific
to this version, the only match that makes sense is EQUALITY.
I suggest the values of this attribute type have syntax DirectoryString
and that an equality rule of CaseExactMatch be provided.  No
ordering or substrings match, IMO, should be provided these
would promote uses beyond that which is intended.  (this doesn't
disallow some vendor from support such via extended search filters)

>I also wonder if there should be a vendorProductName attribute as well,
>given that some vendors produce more than one product that processes
>LDAP requests.

Or some products might be comprised of software from multiple vendors...
many server implementations support plugin architectures after all.
In many cases, the vendor providing the core implementation is not
the primary vendor providing the end "product".  This is a rat hole.



From list@netscape.com  Thu Feb 10 16:40:22 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA11269
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 16:40:20 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id NAA15096;
	Thu, 10 Feb 2000 13:35:38 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id NAA05398; Thu, 10 Feb 2000 13:39:08 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 13:39:08 -0800 (PST)
Sender: mcs@netscape.com (Mark C Smith)
Message-ID: <38A32FF7.D37AC34B@netscape.com>
Date: Thu, 10 Feb 2000 16:39:03 -0500
From: Mark Smith <mcs@netscape.com>
Organization: iPlanet E-Commerce Solutions
X-Mailer: Mozilla 4.7 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en-US,en
MIME-Version: 1.0
To: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
CC: Mark Meredith <MMEREDIT@novell.com>, M.Wahl@INNOSOFT.COM,
        Roger Harrison <RHARRISON@novell.com>, ietf-ldapext@netscape.com
Subject: Re: please publish draft-mmeredith-rootdse-vendor-info-01.txt
References: <s8a145a8.027@prv-mail20.provo.novell.com> <3.0.5.32.20000210125106.00926100@infidel.boolean.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"6_wG8.A.DUB.7_yo4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

"Kurt D. Zeilenga" wrote:
> 
> At 03:37 PM 2/10/00 -0500, Mark Smith wrote:
> >Also, the format for vendorVersion should be more fully specified.
> 
> I disagree.  Since you state that this should be for
> display purposes and/or for working around known bugs specific
> to this version, the only match that makes sense is EQUALITY.
> I suggest the values of this attribute type have syntax DirectoryString
> and that an equality rule of CaseExactMatch be provided.  No
> ordering or substrings match, IMO, should be provided these
> would promote uses beyond that which is intended.  (this doesn't
> disallow some vendor from support such via extended search filters)

But your comment seems to be in conflict with this text from the
document:

>  6. Notes to Client Developers
>   
>       The use of vendorName and vendorVersion SHOULD NOT be used to
>       discover features. It is just an informational attribute. If a
>       client relies on a vendorVersion number then that client MUST
>       be coded to work with later versions and not just one version and
>       no other.

I'd be happy to see the last sentence removed.  Clients that rely on
this attribute do so at their own risk and they should code the behavior
that they think is best for them.  This draft can't stipulate that an
older client will work correctly with a newer server which, for example,
includes a bug fix that introduces incompatibilities with older clients.



> 
> >I also wonder if there should be a vendorProductName attribute as well,
> >given that some vendors produce more than one product that processes
> >LDAP requests.
> 
> Or some products might be comprised of software from multiple vendors...
> many server implementations support plugin architectures after all.
> In many cases, the vendor providing the core implementation is not
> the primary vendor providing the end "product".  This is a rat hole.

Good point.  I agree.  So we might as well just stick with one value
(vendorName).

-- 
Mark Smith
Directory Product Development / iPlanet E-Commerce Solutions
My words are my own, not my employer's.            Got LDAP?



From list@netscape.com  Thu Feb 10 18:07:41 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA12688
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 18:07:39 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id PAA23686;
	Thu, 10 Feb 2000 15:04:46 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id PAA14884; Thu, 10 Feb 2000 15:06:31 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 15:06:31 -0800 (PST)
From: "David Chadwick" <d.w.chadwick@salford.ac.uk>
Organization: University of Salford
To: Jim Sermersheim <JIMSE@novell.com>,
        Andy Coulbeck <andy.coulbeck@INNOSOFT.COM>
Date: Thu, 10 Feb 2000 23:04:29 -0000
MIME-Version: 1.0
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: 7BIT
Subject: Re: RFC2251: RootDSE subschemasubentry issue
Reply-to: d.w.chadwick@salford.ac.uk
CC: M.Wahl@INNOSOFT.COM, ietf-ldapext@netscape.com, Kurt@OpenLDAP.org,
        d.w.chadwick@salford.ac.uk
Priority: normal
In-reply-to: <38A3046D.FBC7D91D@innosoft.com>
X-mailer: Pegasus Mail for Win32 (v3.12b)
Message-Id: <E12J2eE-0001YS-00@serv1.is1.u-net.net>
Resent-Message-ID: <"ojl5jC.A.OoD.1R0o4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7BIT


> As Thomas Salter has already pointed out, the subschema subentry
> associated with a given naming context can be found by reading the
> naming context entry. 

This is true.

>The root DSE already contains the set of naming
> contexts. Therefore the current model is not broken. 

. Not broken in that way, but it still is, in that a single valued attribute 
is required to hold multiple values

>Also, in the
> current model, a server may have several naming contexts referring to
> a single subschema subentry. This would not be possible if subschema
> subentries were assumed to be under the naming context.

I dealt with this one by saying that in this case the subschema 
subentry would be below the administrative point for the domain, if 
they are all in the same management domain (In fact this is the 
model the NHS are using in the UK).

Hope that helps

David


> 


***************************************************

David Chadwick
IS Institute, University of Salford, Salford M5 4WT
Tel +44 161 295 5351  Fax +44 161 745 8169
Mobile +44 790 167 0359
Email D.W.Chadwick@salford.ac.uk
Home Page  http://www.salford.ac.uk/its024/chadwick.htm
Understanding X.500  http://www.salford.ac.uk/its024/X500.htm
X.500/LDAP Seminars http://www.salford.ac.uk/its024/seminars.htm
Entrust key validation string MLJ9-DU5T-HV8J

***************************************************



From list@netscape.com  Thu Feb 10 18:08:26 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA12689
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 18:07:39 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id PAA05750;
	Thu, 10 Feb 2000 15:03:00 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id PAA14926; Thu, 10 Feb 2000 15:06:32 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 15:06:32 -0800 (PST)
From: "David Chadwick" <d.w.chadwick@salford.ac.uk>
Organization: University of Salford
To: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>, ietf-ldapext@netscape.com,
        Mark Wahl <M.Wahl@INNOSOFT.COM>
Date: Thu, 10 Feb 2000 23:04:27 -0000
MIME-Version: 1.0
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: 7BIT
Subject: Re: RFC2251: RootDSE subschemasubentry issue
Reply-to: d.w.chadwick@salford.ac.uk
Priority: normal
In-reply-to: <3.0.5.32.20000210110056.00991ad0@infidel.boolean.net>
References: <E12IuU8-00070l-00@serv1.is1.u-net.net>
X-mailer: Pegasus Mail for Win32 (v3.12b)
Message-Id: <E12J2eG-0001YS-00@serv1.is1.u-net.net>
Resent-Message-ID: <"8xAQuB.A.roD.3R0o4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7BIT


> >Why would you have 2 subschemasubentries for 1 NC?
> 
> Separate subschema administrative areas within the NC.
> [See Mark Wahl's comment]
> 

I proposed solving this problem by having separate subschema 
subentries below each administrative point (ala X.500), then we still 
can retain single valued attributes. This is what I understood Mark 
was also proposing. Since the NC will probably be (but not 
necessarily) an administrative point anyway, then it will usually have 
a subschema subentry below it. For the few (rare?) cases where the 
NC is not an admin point (e.g. an orgs DIT is distributed across 2 
servers and thus 2 NCs, but both are controlled by the same 
subschema) X.500 proposes having one subentry beneath the 
upper NC, and this would be replicated into the subordinate server. 
LDAP servers could choose instead to hold a copy of this 
subschema subentry beneath the subordinate NC context prefix if 
you wished to, or you could go with the X.500 model).

I dont object to you also holding a pointer in the NC, holding the DN 
of the subschemasubentry directly beneath it, if you want to, 
although it only adds minor efficiency gains since the subentry is 
immediately subordinate to the NC context prefix entry anyway.

David

> 


***************************************************

David Chadwick
IS Institute, University of Salford, Salford M5 4WT
Tel +44 161 295 5351  Fax +44 161 745 8169
Mobile +44 790 167 0359
Email D.W.Chadwick@salford.ac.uk
Home Page  http://www.salford.ac.uk/its024/chadwick.htm
Understanding X.500  http://www.salford.ac.uk/its024/X500.htm
X.500/LDAP Seminars http://www.salford.ac.uk/its024/seminars.htm
Entrust key validation string MLJ9-DU5T-HV8J

***************************************************



From list@netscape.com  Thu Feb 10 18:23:33 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA12849
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 18:23:32 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id PAA08868;
	Thu, 10 Feb 2000 15:18:45 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id PAA22063; Thu, 10 Feb 2000 15:22:13 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 15:22:13 -0800 (PST)
Message-Id: <3.0.5.32.20000210152203.00986150@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Thu, 10 Feb 2000 15:22:03 -0800
To: Mark Smith <mcs@netscape.com>
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Re: please publish draft-mmeredith-rootdse-vendor-info-01.txt
Cc: Mark Meredith <MMEREDIT@novell.com>, M.Wahl@INNOSOFT.COM,
        Roger Harrison <RHARRISON@novell.com>, ietf-ldapext@netscape.com
In-Reply-To: <38A32FF7.D37AC34B@netscape.com>
References: <s8a145a8.027@prv-mail20.provo.novell.com>
 <3.0.5.32.20000210125106.00926100@infidel.boolean.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"rlSd8D.A.aYF.kg0o4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

My basic option on this proposal as a whole:

I think implementations that needs such specific vendor/version
information are fundamentally broken.  That is, a client should
be liberal enough to workaround any reasonable non-strict behavior
of the servers (and vice versa).  Clients SHOULD NOT be modified
to support servers who's behavior is not reasonable (and vice
versa).

As such, I can only support such attributes if their use is
is restricted to DISPLAY PURPOSES ONLY.


At 04:39 PM 2/10/00 -0500, Mark Smith wrote:
>But your comment seems to be in conflict with this text from the
>document:

That might be true.  My point is that if the intent is to
work around bugs in a specific version, then only an equality
test for specific versions (known by the client to have bugs)
is needed.  All other versions should be considered to properly
implement specifications.

>
>>  6. Notes to Client Developers
>>   
>>       The use of vendorName and vendorVersion SHOULD NOT be used to
>>       discover features. It is just an informational attribute. If a
>>       client relies on a vendorVersion number then that client MUST
>>       be coded to work with later versions and not just one version and
>>       no other.

>Clients that rely on this attribute do so at their own risk

I concur with this statement.

>and they should code the behavior that they think is best for them.

>This draft can't stipulate that an
>older client will work correctly with a newer server which, for example,
>includes a bug fix that introduces incompatibilities with older clients.

Right... so next folks will ask that we extend the protocol
so that servers will know the vendorName/vendorVersion of
CLIENTS so servers can adapt to clients.

One-off workarounds lead to future inoperability problems.

>
>
>
>> 
>> >I also wonder if there should be a vendorProductName attribute as well,
>> >given that some vendors produce more than one product that processes
>> >LDAP requests.
>> 
>> Or some products might be comprised of software from multiple vendors...
>> many server implementations support plugin architectures after all.
>> In many cases, the vendor providing the core implementation is not
>> the primary vendor providing the end "product".  This is a rat hole.
>
>Good point.  I agree.  So we might as well just stick with one value
>(vendorName).

Again, who's the vendor?  Is the implementor core server the vendor?
Is the packager who screwed their build the vendor?  Is the
implementor of the buggy syntax plugin the vendor?  Is the OS
vendor who shipped a buggy support library?  Is the support
contractor the vendor?

This is a rat hole.




From list@netscape.com  Thu Feb 10 18:33:44 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA12955
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 18:33:43 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id PAA28089;
	Thu, 10 Feb 2000 15:30:55 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id PAA28545; Thu, 10 Feb 2000 15:32:41 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 15:32:41 -0800 (PST)
X-Authentication-Warning: perq.cac.washington.edu: rlmorgan owned process doing -bs
Date: Thu, 10 Feb 2000 16:33:11 -0700 (MST)
From: "RL 'Bob' Morgan" <rlmorgan@washington.edu>
X-Sender: rlmorgan@perq.cac.washington.edu
Reply-To: "RL 'Bob' Morgan" <rlmorgan@washington.edu>
To: Jim Sermersheim <JIMSE@novell.com>
cc: ietf-ldapext@netscape.com
Subject: Re: LDAP subtree search with zero-length DN for baseObject?
In-Reply-To: <s8a29906.085@prv-mail20.provo.novell.com>
Message-ID: <Pine.LNX.4.19.99.0002101551290.19935-100000@perq.cac.washington.edu>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Resent-Message-ID: <"s3J3t.A.V9G.Xq0o4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


On Thu, 10 Feb 2000, Jim Sermersheim wrote:

> Our server follows the "search all the naming contexts you have
> locally" model which I think is reasonable.

So, in the terms Mark and Kurt use, a Novell directory always acts like a
top-level or global-root server?

 - RL "Bob"




From list@netscape.com  Thu Feb 10 19:20:41 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA13282
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 19:20:40 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id QAA04451;
	Thu, 10 Feb 2000 16:17:36 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id QAA20390; Thu, 10 Feb 2000 16:19:21 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 16:19:21 -0800 (PST)
X-Authentication-Warning: perq.cac.washington.edu: rlmorgan owned process doing -bs
Date: Thu, 10 Feb 2000 16:19:53 -0800 (PST)
From: "RL 'Bob' Morgan" <rlmorgan@washington.edu>
X-Sender: rlmorgan@perq.cac.washington.edu
Reply-To: "RL 'Bob' Morgan" <rlmorgan@washington.edu>
To: IETF ldapext WG <ietf-ldapext@netscape.com>
Subject: proposed mods to draft-ietf-ldapext-locate-01.txt
Message-ID: <Pine.LNX.4.19.99.0002101611370.23050-100000@perq.cac.washington.edu>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Resent-Message-ID: <"7FImQB.A.U-E.IW1o4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


Here are modifications I propose to draft-ietf-ldapext-locate-01.txt,
based on my note of 20 Jan 2000, and some other stuff.

 - RL "Bob"

---

[ This section 2 replaces the current section 2. ]

2. Introduction

The LDAPv3 protocol [1] is designed to be a lightweight access
protocol for directory services supporting X.500 models.  As a
distributed directory service, the complete set of directory
information (known as the Directory Information Base) is spread across
many different servers.  Hence there is the need to determine, when
initiating or processing a request, which servers hold the relevant
information.  In LDAP, the Search, Modify, Add, Delete, ModifyDN, and
Compare operations all specify a Distinguished Name (DN) on which the
operation is performed.  A client, or a server acting on behalf of a
client, must be able to determine the server(s) that hold the naming
context containing that DN, since that server (or one of that set of
servers) must receive and process the request.  This determination
process is called "server location".  To support dynamic distributed
operation, the information needed to support server location must be
available via lookups done at request processing time, rather than,
for example, as static data configured into each client or server.

It is possible to maintain the information needed to support server
location in the directory itself, and X.500 directory deployments
typically do so.  In practice, however, this only permits location of
servers within a limited X.500-connected set.  LDAP-specific methods
of maintaining server location information in the directory have not
yet been standardized.  This document defines an alternative method of
managing server location information using the Domain Name System.
This method takes advantage of the global deployment of the DNS, by
allowing LDAP server location information for any existing DNS domain
to be published by creating the records described below.  A full
discussion of the benefits and drawbacks of the various directory
location and naming methods is beyond the scope of this document.

RFC 2247 defines an algorithm for mapping DNS domain names into DNs.
This document defines the inverse mapping, from DNs to DNS domain
names, based on the RFC 2247 conventions, for use in this server
location method.  The server location method described in this
document is only defined for DNs that can be so mapped, i.e., those
DNs that are based on domain names.  In practice this is reasonable
because many objects of interest are named with domain names, and use
of domain-name-based DNs is becoming common.

===

[ This is a new section. ]

N.  Mapping Distinguished Names into Domain Names

This section defines a method of converting a DN into a DNS domain
name for use in the server location method described below.  Some DNs
cannot be converted into a domain name.

The output domain name is initially empty.  For each RDN component of
the DN, beginning with the first, if the attribute type is "DC", then
the attribute value is used as a domain name component (label).  The
first such value becomes the most significant (i.e., rightmost) domain
name component, and successive values occupy less significant
positions (i.e., extending leftward), in order.  If the attribute type
is not "DC", then processing stops.  If the first RDN component of the
DN is not of type "DC" then the DN cannot be converted to a domain
name.

[ At first I wrote that the conversion should include converting the
RDN attribute value to a string as per RFC 2253, but upon reflection I
think it should just use the bits, since of course DNS can in theory
handle binary labels just as well as X.500 can.  I'm not a charset
expert so I don't know if in reality an IA5 RDN value will just drop
in and become a nice ASCII DNS name.  I think, though, that RFC 2247
is deficient in that it assumes that a DNS name being converted into a
DN will always be just ASCII/IA5 strings. ]

===

Mods to items in the current section 3:

  The name of this record always has the following format:

   _<Service>._<Proto>.<Domain>

   where <Service> is always "ldap", <Proto> is a protocol that can 
   be either "udp" or "tcp", and <Domain> is the domain hosted by the 
   LDAP Server.

I think this is too loose about the relationship between the info on
the LDAP server and the name of the SRV record used to locate it.  So
change the last bit to:

 where <Service> is always "ldap", and <Proto> is a protocol that can
 be either "udp" or "tcp".  <Domain> is the domain name formed by
 converting the DN of a naming context mastered by the LDAP Server into
 a domain name using the algorithm in section N.

Also:

   Presence of such records enables clients to find the LDAP servers 
   using standard DNS query [3].

I think it's worthwhile to write down the algorithm in detail, hence
follow this with:

 A client (or server) seeking an LDAP server for a particular DN
 converts that DN to a domain name using the algorithm of section N,
 does a SRV record query using the DNS name formed as described above:

    _ldap._tcp.<Domain>

 and interprets the response as described in [6] to determine a host
 (or hosts) to contact.

This continues with:

                                  As an example, a client that searches 
   for an LDAP server in the example.net domain that supports TCP protocol 

But the LDAP client, for purposes of this document, starts with a DN,
not a domain name, so make this:

 As an example, a client that searches for an LDAP server for the DN
 "dc=example,dc=net" that supports the TCP protocol ...
 



From list@netscape.com  Thu Feb 10 21:37:22 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA14632
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 21:37:18 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id SAA05242;
	Thu, 10 Feb 2000 18:32:31 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id SAA09923; Thu, 10 Feb 2000 18:36:02 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 18:36:02 -0800 (PST)
Message-ID: <E9BC216C06E3D2118F1A00105AC75B6A9D5502@mail.netpro.com>
From: Gil Kirkpatrick <gilk@netpro.com>
To: "'d.w.chadwick@salford.ac.uk'" <d.w.chadwick@salford.ac.uk>,
        "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>, ietf-ldapext@netscape.com,
        Mark Wahl <M.Wahl@INNOSOFT.COM>
Subject: RE: RFC2251: RootDSE subschemasubentry issue
Date: Thu, 10 Feb 2000 19:33:06 -0700
X-Mailer: Internet Mail Service (5.5.2650.21)
Resent-Message-ID: <"FPkKyD.A.paC.QW3o4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

David,

Why does the rootDSE need to contain subschemaSubentrys for each NC hosted
by the server? Why is not sufficient to maintain the subschemaSubentrys in
the NCs themselves?

-gil

Gil Kirkpatrick
Director of Engineering
Netpro


> -----Original Message-----
> From:	David Chadwick [SMTP:d.w.chadwick@salford.ac.uk]
> Sent:	Wednesday, February 09, 2000 12:27 PM
> To:	Kurt D. Zeilenga; ietf-ldapext@netscape.com; Mark Wahl
> Subject:	Re: RFC2251: RootDSE subschemasubentry issue
> 
> Mark, Kurt
> 
> I think I have an answer to the problem(s) being posed by Kurt.
> 
> The model as it stands is OK if a server only masters one naming 
> context. Everything works fine. All the entries in the NC and the 
> rootDSE can contain the subschemaSubentry attribute which points 
> to the single subschema subentry.
> 
> The problem arises once we have multiple NCs in a server. The 
> subschemaSubentry attribute can still be single valued and exist in 
> each entry in each NC and point to the correct subschema 
> subentry. However, the attribute in the root DSE no longer works, for 
> two reasons.
> 
> Firstly it is supposed to be single valued (as Kurt pointed out) and 
> now it needs to have multiple values.
> 
> Secondly, (again as Kurt pointed out) there is no way for the user to 
> know from the multivalued attribute in the rootDSE which value 
> points to which subschema subentry for which NC. THis of course is 
> not a problem for the entries within the NC, as they only still need a 
> single pointer to their one and only subschema subentry.
> 
> Thus I conclude that the model is broken for multiple naming 
> contexts, and that the subschemaSubentry attribute in the rootDSE 
> needs to be replaced by a multivalued attribute, having two 
> components - the context prefix of an NC (an LDAP DN), and the 
> pointer to the subschemaSubentry.
> 
> Do you agree with this analysis?
> 
> David
> 
> ***************************************************
> 
> David Chadwick
> IS Institute, University of Salford, Salford M5 4WT
> Tel +44 161 295 5351  Fax +44 161 745 8169
> Mobile +44 790 167 0359
> Email D.W.Chadwick@salford.ac.uk
> Home Page  http://www.salford.ac.uk/its024/chadwick.htm
> Understanding X.500  http://www.salford.ac.uk/its024/X500.htm
> X.500/LDAP Seminars http://www.salford.ac.uk/its024/seminars.htm
> Entrust key validation string MLJ9-DU5T-HV8J
> 
> ***************************************************



From list@netscape.com  Thu Feb 10 23:24:47 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA17732
	for <ldapext-archive@odin.ietf.org>; Thu, 10 Feb 2000 23:24:44 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id UAA28075;
	Thu, 10 Feb 2000 20:21:48 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id UAA04532; Thu, 10 Feb 2000 20:23:34 -0800 (PST)
Resent-Date: Thu, 10 Feb 2000 20:23:34 -0800 (PST)
From: "Peter Strong" <pestrong@nortelnetworks.com>
To: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>, Mark Smith <mcs@netscape.com>
Cc: Mark Meredith <MMEREDIT@novell.com>, "M.Wahl" <M.Wahl@INNOSOFT.COM>,
        Roger Harrison <RHARRISON@novell.com>,
        ietf-ldapext <ietf-ldapext@netscape.com>
Subject: RE: please publish draft-mmeredith-rootdse-vendor-info-01.txt
Date: Thu, 10 Feb 2000 23:25:58 -0500
Message-ID: <001a01bf7448$185f2860$3750fb8d@net-pstrong.corpnorth.baynetworks.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook 8.5, Build 4.71.2173.0
In-Reply-To: <3.0.5.32.20000210152203.00986150@infidel.boolean.net>
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V4.72.3110.3
Resent-Message-ID: <"Z0RXrB.A.iGB.F74o4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Hi,

> -----Original Message-----
> From: Kurt D. Zeilenga [mailto:Kurt@OpenLDAP.org]
> Sent: Thursday, February 10, 2000 6:22 PM
> To: Mark Smith
> Cc: Mark Meredith; M.Wahl@INNOSOFT.COM; Roger Harrison;
> ietf-ldapext@netscape.com
> Subject: Re: please publish draft-mmeredith-rootdse-vendor-info-01.txt
>
>
> My basic option on this proposal as a whole:
>
> I think implementations that needs such specific vendor/version
> information are fundamentally broken.

My basic opinion is that you are not living in the real world!

I challenge you to modify the schema of a Netscape directory server,
a Novell directory server and an MS Active Directory server without
knowing the type of server to which you are connected.

When we install our products against different directory implementations,
we need to know the vendor - they all have quirks and irregularities
that make such things as schema modification tricky.

It would be ideal if this weren't the case, but it is, and probably
always will be.


> That is, a client should
> be liberal enough to workaround any reasonable non-strict behavior
> of the servers (and vice versa).  Clients SHOULD NOT be modified
> to support servers who's behavior is not reasonable (and vice
> versa).

For most basic operations, clients shouldn't experience difficulties.
However, for things like schema modification, access control specification,
creation of new naming roots or subtrees, I know that significant
differences exist and that these differences won't go away any time
soon.

> As such, I can only support such attributes if their use is
> is restricted to DISPLAY PURPOSES ONLY.

Again, I have to disagree - we'll have to use this information to make
appropriate choices in how to deal with particular server implementations.
If we screw something up while doing this, well, that's our fault. But
at least these small scraps of information give us a small chance of
overcoming implementation descrepancies.

> At 04:39 PM 2/10/00 -0500, Mark Smith wrote:
> >But your comment seems to be in conflict with this text from the
> >document:
>
> That might be true.  My point is that if the intent is to
> work around bugs in a specific version, then only an equality
> test for specific versions (known by the client to have bugs)
> is needed.  All other versions should be considered to properly
> implement specifications.

Actually, the instances that I mentioned above don't appear to bugs. They
appear to be cases where vendors have knowingly strayed from the standards
(for whatever reason). More than likely, they haven't made these decisions
without reason, and, when confronted about it, will likely indicate that
they will "probably fix it in a future release". Yeah, right!

In the mean time, I have to get product out the door.

> >
> >>  6. Notes to Client Developers
> >>
> >>       The use of vendorName and vendorVersion SHOULD NOT be used to
> >>       discover features. It is just an informational attribute. If a
> >>       client relies on a vendorVersion number then that client MUST
> >>       be coded to work with later versions and not just one version and
> >>       no other.
>
> >Clients that rely on this attribute do so at their own risk
>
> I concur with this statement.
>

As do I.

> >and they should code the behavior that they think is best for them.
>
> >This draft can't stipulate that an
> >older client will work correctly with a newer server which, for example,
> >includes a bug fix that introduces incompatibilities with older clients.
>
> Right... so next folks will ask that we extend the protocol
> so that servers will know the vendorName/vendorVersion of
> CLIENTS so servers can adapt to clients.
>
> One-off workarounds lead to future inoperability problems.

Yes, but lack of any workaround leads to products that don't work AT ALL!

We will always have interoperability problems. That's not being pessimistic,
that's being realistic. I'm all for promoting as much interoperability and
adherence to standards as possible, but I'm under no delusions that we'll
ever achieve 100% interoperability for all directory implementations all
the time.

> >
> >
> >
> >>
> >> >I also wonder if there should be a vendorProductName
> attribute as well,
> >> >given that some vendors produce more than one product that processes
> >> >LDAP requests.
> >>
> >> Or some products might be comprised of software from multiple
> vendors...
> >> many server implementations support plugin architectures after all.
> >> In many cases, the vendor providing the core implementation is not
> >> the primary vendor providing the end "product".  This is a rat hole.
> >
> >Good point.  I agree.  So we might as well just stick with one value
> >(vendorName).
>

Sounds fine.

> Again, who's the vendor?  Is the implementor core server the vendor?
> Is the packager who screwed their build the vendor?  Is the
> implementor of the buggy syntax plugin the vendor?  Is the OS
> vendor who shipped a buggy support library?  Is the support
> contractor the vendor?
>
> This is a rat hole.
>

The only rat hole appears to be the argument against having a couple
of simple attributes available to the poor bastards who have to actually
build products on top of directory technology as it exists today!


Regards,

  Peter

------------------------------------------------------------------------
Peter Strong
Software Architect
Nortel Networks - Optivity Policy Services (OPS) and NetID
pestrong@nortelnetworks.com <mailto:pestrong@nortelnetworks.com>
(613) 831-6615





From list@netscape.com  Fri Feb 11 06:33:01 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA03828
	for <ldapext-archive@odin.ietf.org>; Fri, 11 Feb 2000 06:33:00 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id DAA03987;
	Fri, 11 Feb 2000 03:28:17 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id DAA10680; Fri, 11 Feb 2000 03:31:48 -0800 (PST)
Resent-Date: Fri, 11 Feb 2000 03:31:48 -0800 (PST)
Message-Id: <200002111131.GAA03779@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ietf-ldapext@netscape.com
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-ldapext-ldapv3-tls-06.txt
Date: Fri, 11 Feb 2000 06:31:40 -0500
Sender: nsyracus@cnri.reston.va.us
Resent-Message-ID: <"d57ARB.A.mmC.jM_o4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the LDAP Extension Working Group of the IETF.

	Title		: Lightweight Directory Access Protocol (v3):  Extension
                          for Transport Layer Security
	Author(s)	: J. Hodges, B. Morgan, M. Wahl
	Filename	: draft-ietf-ldapext-ldapv3-tls-06.txt
	Pages		: 11
	Date		: 10-Feb-00
	
This document defines the 'Start Transport Layer Security (TLS) Opera-
tion' for LDAP [LDAPv3, TLS]. This operation provides for TLS establish-
ment in an LDAP association and is defined in terms of an LDAP extended
request.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ldapext-ldapv3-tls-06.txt

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ldapext-ldapv3-tls-06.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ldapext-ldapv3-tls-06.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20000210122219.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ldapext-ldapv3-tls-06.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ldapext-ldapv3-tls-06.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20000210122219.I-D@ietf.org>

--OtherAccess--

--NextPart--




From list@netscape.com  Fri Feb 11 09:37:25 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA09973
	for <ldapext-archive@odin.ietf.org>; Fri, 11 Feb 2000 09:37:17 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id GAA14696;
	Fri, 11 Feb 2000 06:32:29 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id GAA11600; Fri, 11 Feb 2000 06:36:01 -0800 (PST)
Resent-Date: Fri, 11 Feb 2000 06:36:01 -0800 (PST)
Message-ID: <EB21C070AA75D311A0AC0090271EC45C014D1BB5@us-tr-exch-1.tr.unisys.com>
From: "Salter, Thomas A" <Thomas.Salter@unisys.com>
To: ietf-ldapext <ietf-ldapext@netscape.com>
Subject: RE: please publish draft-mmeredith-rootdse-vendor-info-01.txt
Date: Fri, 11 Feb 2000 09:37:01 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.21)
Content-Type: text/plain;
	charset="iso-8859-1"
Resent-Message-ID: <"5_-JUD.A.90C.Q5Bp4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

I agree that clients need to determine what server they are talking to.  It
wasn't that long ago that servers didn't even agree on the character set.
In V2 you could find servers using UTF8, T.61 and Latin-1.  Granted that
problem should be solved by now, but there are still many ambiguities in the
RFCs and probably a number of "a server MAY ... " clauses that are not
otherwise resolvable.

These attributes are easy to implement and allow client writers to solve
real world problems.



From list@netscape.com  Fri Feb 11 10:50:29 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA12151
	for <ldapext-archive@odin.ietf.org>; Fri, 11 Feb 2000 10:50:20 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id HAA08780;
	Fri, 11 Feb 2000 07:47:11 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id HAA04917; Fri, 11 Feb 2000 07:48:57 -0800 (PST)
Resent-Date: Fri, 11 Feb 2000 07:48:57 -0800 (PST)
Message-ID: <38A4158C.102DDB73@netscape.com>
Date: Fri, 11 Feb 2000 08:58:36 -0500
From: mcs@netscape.com (Mark C Smith)
Organization: Netscape Communications
X-Mailer: Mozilla 4.7 [en] (WinNT; U)
X-Accept-Language: en
MIME-Version: 1.0
To: d.w.chadwick@salford.ac.uk
CC: ietf-ldapext@netscape.com
Subject: Re: RFC2251: RootDSE subschemasubentry issue
References: <E12J2eE-0001YS-00@serv1.is1.u-net.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"9jNPEB.A.jMB.o9Cp4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

David Chadwick wrote:
> 
> > As Thomas Salter has already pointed out, the subschema subentry
> > associated with a given naming context can be found by reading the
> > naming context entry.
> 
> This is true.
> 
> >The root DSE already contains the set of naming
> > contexts. Therefore the current model is not broken.
> 
> . Not broken in that way, but it still is, in that a single valued attribute
> is required to hold multiple values

I'd really prefer we choose the simple solution to this problem: 
change the subschemasubentry attribute to multivalued, but stipulate
that it can only have one value when it appears outside the rootDSE.
Does that solve the problem at hand?


> 
> >Also, in the
> > current model, a server may have several naming contexts referring to
> > a single subschema subentry. This would not be possible if subschema
> > subentries were assumed to be under the naming context.
> 
> I dealt with this one by saying that in this case the subschema
> subentry would be below the administrative point for the domain, if
> they are all in the same management domain (In fact this is the
> model the NHS are using in the UK).

But as far as I know LDAPv3 doesn't require that servers support
administrative domains at all.  Some servers do, some do not.  Also,
what if the naming contexts are disjoint yet all share the same schema?
That is a very common situation today.

-- 
Mark Smith
iPlanet Directory Architect / Sun-Netscape Alliance
My words are my own, not my employer's.   Got LDAP?




From list@netscape.com  Fri Feb 11 12:00:14 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA14458
	for <ldapext-archive@odin.ietf.org>; Fri, 11 Feb 2000 12:00:07 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id IAA18117;
	Fri, 11 Feb 2000 08:57:12 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id IAA28622; Fri, 11 Feb 2000 08:58:59 -0800 (PST)
Resent-Date: Fri, 11 Feb 2000 08:58:59 -0800 (PST)
Message-Id: <3.0.5.32.20000211085848.009b4dd0@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Fri, 11 Feb 2000 08:58:48 -0800
To: mcs@netscape.com (Mark C Smith)
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Re: RFC2251: RootDSE subschemasubentry issue
Cc: d.w.chadwick@salford.ac.uk, ietf-ldapext@netscape.com
In-Reply-To: <38A4158C.102DDB73@netscape.com>
References: <E12J2eE-0001YS-00@serv1.is1.u-net.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"kJavuD.A.8-G.S_Dp4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 08:58 AM 2/11/00 -0500, Mark C Smith wrote:
>David Chadwick wrote:
>> 
>> > As Thomas Salter has already pointed out, the subschema subentry
>> > associated with a given naming context can be found by reading the
>> > naming context entry.
>> 
>> This is true.
>> 
>> >The root DSE already contains the set of naming
>> > contexts. Therefore the current model is not broken.
>> 
>> . Not broken in that way, but it still is, in that a single valued attribute
>> is required to hold multiple values
>
>I'd really prefer we choose the simple solution to this problem: 
>change the subschemasubentry attribute to multivalued, but stipulate
>that it can only have one value when it appears outside the rootDSE.

Sounds simple... but one cannot generally redefine an attribute
type, one must introduce a replacement attribute type.

>Does that solve the problem at hand?

No, because the client doesn't which subset of entries may
be controlled by a given value.   Additional information
is needed, such as a DN indicing the subtree of applicability,
to make the information generally useful.

>
>> 
>> >Also, in the
>> > current model, a server may have several naming contexts referring to
>> > a single subschema subentry. This would not be possible if subschema
>> > subentries were assumed to be under the naming context.
>> 
>> I dealt with this one by saying that in this case the subschema
>> subentry would be below the administrative point for the domain, if
>> they are all in the same management domain (In fact this is the
>> model the NHS are using in the UK).
>
>But as far as I know LDAPv3 doesn't require that servers support
>administrative domains at all.  Some servers do, some do not.  Also,
>what if the naming contexts are disjoint yet all share the same schema?
>That is a very common situation today.

I agree this is common and the information model should support
sharing of subschema across multiple naming contexts.   I suggest
we don't adopt a means which "hardcodes" the name and/or
location of subschema subentries so as to maintain the greatest
amount of flexibility possible.



From list@netscape.com  Fri Feb 11 12:02:42 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA14654
	for <ldapext-archive@odin.ietf.org>; Fri, 11 Feb 2000 12:02:36 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id IAA00505;
	Fri, 11 Feb 2000 08:57:32 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id JAA00290; Fri, 11 Feb 2000 09:01:06 -0800 (PST)
Resent-Date: Fri, 11 Feb 2000 09:01:06 -0800 (PST)
Message-Id: <3.0.5.32.20000211090053.00925c90@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Fri, 11 Feb 2000 09:00:53 -0800
To: "Salter, Thomas A" <Thomas.Salter@unisys.com>
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: RE: please publish draft-mmeredith-rootdse-vendor-info-01.txt
Cc: ietf-ldapext <ietf-ldapext@netscape.com>
In-Reply-To: <EB21C070AA75D311A0AC0090271EC45C014D1BB5@us-tr-exch-1.tr.u
 nisys.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"PfDVBC.A.PE.RBEp4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 09:37 AM 2/11/00 -0500, Salter, Thomas A wrote:
>These attributes are easy to implement and allow client writers to solve
>real world problems.

If clients are allowed to derive their behavior from these
attributes than servers must be allowed to spoof their
values to obtain desired behavior.

	Kurt



From list@netscape.com  Fri Feb 11 12:22:00 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA15091
	for <ldapext-archive@odin.ietf.org>; Fri, 11 Feb 2000 12:21:52 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id JAA02862;
	Fri, 11 Feb 2000 09:17:08 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id JAA09889; Fri, 11 Feb 2000 09:20:41 -0800 (PST)
Resent-Date: Fri, 11 Feb 2000 09:20:41 -0800 (PST)
Message-Id: <3.0.5.32.20000211092029.00995960@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Fri, 11 Feb 2000 09:20:29 -0800
To: "Mark Meredith" <MMEREDIT@novell.com>
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: draft-mmeredith-rootdse-vendor-info-01.txt
Cc: <ietf-ldapext@netscape.com>
In-Reply-To: <s8a145a8.027@prv-mail20.provo.novell.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"W590QC.A.9ZC.oTEp4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 10:46 AM 2/9/00 -0700, Mark Meredith wrote: 
>The use of vendorName and vendorVersion SHOULD NOT be used to
>discover features. It is just an informational attribute. 
 
Mark,

I believe you should clarify the intented use of these attributes.
I recommend you state your intent in your abstract, or add
a "Background and Intended Use" section.  Then rework rest
of document to be consistent with this intent.

In particular, you state that may be used discover X- features
in the overview.  And in the security section:
   The vendorName and vendorVersion attributes are provided only as an
   aid to help client implementers assess what features may or may not
   exist in a given server implementation.

This in inconsistent with Section 6.  If this section is
consistent with your intent, I suggest the following wording
be added someone early on in the document:
	Attributes defined by this specification are intended
	for informational purposes only and SHOULD NOT be
	used for feature discovery.

You also note that you intend that these attributes be used
to allow clients to workaround implementation bugs based
upon vendor specific information.  Though I believe it quite
appropriate to encourage clients to be "liberal in what they
accept", I believe we must be very careful not to encourage
one peer to violate the specification because they assume
the other has.  We must be very careful in the wording which
allows any non-informational use of these attributes.

Kurt



From list@netscape.com  Fri Feb 11 14:56:08 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA18359
	for <ldapext-archive@odin.ietf.org>; Fri, 11 Feb 2000 14:56:02 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id LAA01657;
	Fri, 11 Feb 2000 11:51:18 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id LAA28622; Fri, 11 Feb 2000 11:54:35 -0800 (PST)
Resent-Date: Fri, 11 Feb 2000 11:54:35 -0800 (PST)
Message-Id: <s8a40674.045@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.2.1
Date: Fri, 11 Feb 2000 12:54:03 -0700
From: "Mark Meredith" <MMEREDIT@novell.com>
To: <Kurt@OpenLDAP.org>
Cc: <ietf-ldapext@netscape.com>
Subject: Re: draft-mmeredith-rootdse-vendor-info-01.txt
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Resent-Message-ID: <"5nrZfC.A.6-G.6jGp4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ietf.org id OAA18359

Kurt,

I am taking all of the responses and rewriting alot of the draft, I will try to get a new revision out today or Monday.

Thanks to all of you for your input.

-Mark

>>> "Kurt D. Zeilenga" <Kurt@OpenLDAP.org> 02/11/00 10:20AM >>>
At 10:46 AM 2/9/00 -0700, Mark Meredith wrote: 
>The use of vendorName and vendorVersion SHOULD NOT be used to
>discover features. It is just an informational attribute. 
 
Mark,

I believe you should clarify the intented use of these attributes.
I recommend you state your intent in your abstract, or add
a "Background and Intended Use" section.  Then rework rest
of document to be consistent with this intent.

In particular, you state that may be used discover X- features
in the overview.  And in the security section:
   The vendorName and vendorVersion attributes are provided only as an
   aid to help client implementers assess what features may or may not
   exist in a given server implementation.

This in inconsistent with Section 6.  If this section is
consistent with your intent, I suggest the following wording
be added someone early on in the document:
	Attributes defined by this specification are intended
	for informational purposes only and SHOULD NOT be
	used for feature discovery.

You also note that you intend that these attributes be used
to allow clients to workaround implementation bugs based
upon vendor specific information.  Though I believe it quite
appropriate to encourage clients to be "liberal in what they
accept", I believe we must be very careful not to encourage
one peer to violate the specification because they assume
the other has.  We must be very careful in the wording which
allows any non-informational use of these attributes.

Kurt



From list@netscape.com  Fri Feb 11 18:29:25 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA26028
	for <ldapext-archive@odin.ietf.org>; Fri, 11 Feb 2000 18:29:21 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id PAA16970;
	Fri, 11 Feb 2000 15:26:24 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id PAA26300; Fri, 11 Feb 2000 15:28:10 -0800 (PST)
Resent-Date: Fri, 11 Feb 2000 15:28:10 -0800 (PST)
Message-Id: <s8a4388e.047@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.2.1
Date: Fri, 11 Feb 2000 16:27:38 -0700
From: "Mark Meredith" <MMEREDIT@novell.com>
To: "<"<internet-drafts@ietf.org>
Cc: "<"<ietf-ldapext@netscape.com>
Subject: Please publish draft-mmeredith-rootdse-vendor-info-02.txt
Mime-Version: 1.0
Content-Type: multipart/mixed; boundary="=_80D911EE.8EEFD8E6"
Resent-Message-ID: <"RfuJiB.A.gaG.JsJp4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

This is a MIME message. If you are reading this text, you may want to 
consider changing to a mail reader or gateway that understands how to 
properly handle MIME multipart messages.

--=_80D911EE.8EEFD8E6
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Please publish - this refelcts the changes via feedback on draft-mmeredith-=
rootdse-vendor-info-01.txt

Please review this draft and submit comments.

-Mark


Mark Meredith
Novell Inc
122 E. 1700 S. Provo UT 84606
mark_meredith@novell.com
801-861-2645
---------------------
A boat in the harbor is safe,=20
but that is not what boats are for.
--John A. Shed
---------------------


--=_80D911EE.8EEFD8E6
Content-Type: text/plain
Content-Disposition: attachment; filename="draft-mmeredith-rootdse-vendor-info-02.txt"



Individual Submission to the LDAPExt Working Group        Mark Meredith
Internet Draft                                              Novell Inc.
Document: draft-mmeredith-rootdse-vendor-info-02.txt  February 11, 2000
Category: Proposed Standard


            Storing Vendor Information in the LDAP root DSE


Status of this Memo

   This document is an Internet-Draft and is in full conformance with
   all provisions of Section 10 of [RFC2026].

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups. Note that
   other groups may also distribute working documents as Internet-
   Drafts. Internet-Drafts are draft documents valid for a maximum of
   six months and may be updated, replaced, or made obsolete by other
   documents at any time. It is inappropriate to use Internet-Drafts as
   reference material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   Comments and suggestions on this document are encouraged.
   Comments on this document should be sent to the LDAPEXT working
   group discussion list ietf-ldapext@netscape.com or the author.

1. Abstract

   This document specifies two LDAP attributes, vendorName and
   vendorVersion that MAY be included in the root DSE to advertise
   vendor-specific information. These two attributes supplement the
   attributes defined in section 3.4 of [RFC-2251].

   The information held in these attributes MAY be used for display and
   informational purposes and MUST NOT be used for feature
   advertisement or discovery.

2. Conventions used in this document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED",  "MAY", and "OPTIONAL" in
   this document are to be interpreted as described in [RFC-2219]

3. Overview

   LDAP clients discover server-specific data--such as available
   controls, extensions, etc.-- by reading the root DSE. See section
   3.4 of [RFC-2251] for details.



M. Meredith               Expires June-2000                         1

    LDAP root DSE to display vendor information          December 1999


   For display, information, and limited function discovery, it is
   desirable to be able to query an LDAP server to determine the vendor
   name of that server and also to see what version of that vendor's
   code is currently installed.

3.1 Function discovery

   There are many ways in which a particular version of a vendor's LDAP
   server implementation may be functionally incomplete, or may contain
   software anomalies. It is impossible to identify every known
   shortcoming of an LDAP server with the given set of server data
   advertisement attributes. Furthermore, often times, the anomalies of
   an implementation are not found until after the implementation has
   been distributed, deployed, and is in use.

   The attributes defined in this document MAY be used by client
   implementations in order to identify a particular server
   implementation so that it can 'work around' such anomalies.

   The attributes defined in this document MUST NOT be used to gather
   information related to supported features of an LDAP implementation.
   All LDAP features, mechanisms, and capabilities--if advertised--MUST
   be advertised through other mechanisms, preferably advertisement
   mechanisms defined in concert with said features, mechanisms, and
   capabilities.

4. Attribute Types

   These attributes are an addition to the Server-specific Data
   Requirements defined in section 3.4 of [RFC-2251]. The associated
   syntaxes are defined in section 4 of [RFC-2252].

   Servers MAY restrict access to vendorName or vendorVersion and
   clients MUST NOT expect these attributes to be available.

4.1 vendorName

   This attribute contains a single string, which represents the name
   of the LDAP server implementer.

   All LDAP server implementations SHOULD maintain a vendorName, which
   is generally the name of the company that wrote the LDAP Server code
   like "Novell, Inc."

     ( 2.16.840.1.113719.1.27.4.43 NAME 'vendorName' EQUALITY
     1.3.6.1.4.1.1466.109.114.1 SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
     NO-USER-MODIFICATION SINGLE-VALUE USAGE dSAOperation )

4.2 vendorVersion

   This attribute contains a string which represents the version of the
   LDAP server implementation.


M. Meredith               Expires June-2000                         2

    LDAP root DSE to display vendor information          December 1999


   All LDAP server implementations SHOULD maintain a vendorVersion.
   Note that this value is typically a release value--comprised of a
   string and/or a string of numbers--used by the developer of the LDAP
   server product (as opposed to the supportedLDAPVersion, which
   specifies the version of the LDAP protocol supported by this
   server). This is single-valued so that it will only have one version
   value.

     ( 2.16.840.1.113719.1.27.4.44 NAME 'vendorVersion' EQUALITY
     1.3.6.1.4.1.1466.109.114.1 SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
     NO-USER-MODIFICATION SINGLE-VALUE USAGE dSAOperation )
5. Notes to Server Implementers

   Server implementers may consider tying the vendorVersion attribute
   value to the build mechanism so that it is automatically updated
   when the version value changes.

6. Notes to Client Developers

   As mentioned in section 3.1, the use of vendorName and vendorVersion
   MUST NOT be used to discover features.

   Client implementations SHOULD be written in such a way as to accept
   any value in the vendorName and vendorVersion attributes. If a
   client implementation does not recognize the specific vendorName or
   vendorVersion as one it recognizes, then for the purposes of
   'working around' anomalies, the client MUST assume that the server
   is complete and correct. The client SHOULD work with implementations
   that do not publish these attributes.

7. Security Considerations

   The vendorName and vendorVersion attributes are provided only as
   display or informational mechanisms, or as anomaly identifying
   mechanisms. Client and application implementers must consider that
   the existence of a given value in the vendorName or vendorVersion
   attribute is no guarantee that the server was actually built by the
   asserted vendor or that its version is the asserted version and
   should act accordingly.

   Server implementers should be aware that this information could be
   used to exploit a security hole a server provides either by feature
   or flaw.

8. References

   RFC-2219
     Bradner, S., "Key words for use in RFCs to Indicate Requirement
     Levels", BCP 14, RFC 2119, March 1997

   RFC-2026



M. Meredith               Expires June-2000                         3

    LDAP root DSE to display vendor information          December 1999


     Bradner, S., "The Internet Standards Process—Revision 3", BCP 9,
     RFC 2026, October 1996.

   RFC-2251
     Wahl, M., Howes, T., Kille, S., "Lightweight Directory Access
     Protocol (v3)", RFC 2251, December 1997

   RFC-2252
     Wahl, M., Coulbeck, A., Howes, T., Kille, S., "Lightweight
     Directory Access Protocol (v3): Attribute Syntax Definitions", RFC
     2252, December 1997

9. Acknowledgments

   The author would like to thank the generous input and review by
   individuals at Novell including but not limited to Jim Sermersheim,
   Mark Hinckley, Renea Campbell, and Roger Harrison. Also IETF
   contributors Kurt Zeilenga, Mark Smith, Mark Wahl, Peter Strong,
   Thomas Salter, Gordon Good, Paul Leach, Helmut Volpers.

10. Author's Addresses

   Mark Meredith
   Novell Inc.
   122 E. 1700 S. Provo, UT 84606
   Phone: 801-861-2645
   Email: mark_meredith@novell.com

Full Copyright Statement
   Copyright (c) The Internet Society (1999). All Rights Reserved. This
   document and translations of it may be copied and furnished to
   others, and derivative works that comment on or otherwise explain it
   or assist in its implementation may be prepared, copied, published
   and distributed, in whole or in part, without restriction of any
   kind, provided that the above copyright notice and this paragraph
   are included on all such copies and derivative works. However, this
   document itself may not be modified in any way, such as by removing
   the copyright notice or references to the Internet Society or other
   Internet organizations, except as needed for the purpose of
   developing Internet standards in which case the procedures for
   copyrights defined in the Internet Standards process must be
   followed, or as required to translate it into languages other than
   English.

   The limited permissions granted above are perpetual and will not be
   revoked by the Internet Society or its successors or assigns.

   This document and the information contained herein is provided on an
   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
   MER-CHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

M. Meredith               Expires June-2000                         4

--=_80D911EE.8EEFD8E6--



From list@netscape.com  Fri Feb 11 19:24:50 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA27166
	for <ldapext-archive@odin.ietf.org>; Fri, 11 Feb 2000 19:24:49 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id QAA05525;
	Fri, 11 Feb 2000 16:20:10 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id QAA16917; Fri, 11 Feb 2000 16:23:37 -0800 (PST)
Resent-Date: Fri, 11 Feb 2000 16:23:37 -0800 (PST)
Message-Id: <s8a44595.084@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.2.1
Date: Fri, 11 Feb 2000 17:23:24 -0700
From: "Jim Sermersheim" <JIMSE@novell.com>
To: <rlmorgan@washington.edu>
Cc: <ietf-ldapext@netscape.com>
Subject: Re: LDAP subtree search with zero-length DN for baseObject?
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Resent-Message-ID: <"lKohv.A.DIE.HgKp4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ietf.org id TAA27166

Yes.

An NDS directory always has a naming context rooted at the root of the tree. Any NDS server either holds this root NC or it has a superior reference.

If the server holds the root NC, it will begin the search at the root, returning referrals as needed.

If the server does not hold the root NC, it will return a referral.

(this is a better and more accurate description of what NDS does than what I said earlier)

Jim
 

>>> "RL 'Bob' Morgan" <rlmorgan@washington.edu> 2/10/00 4:33:11 PM >>>

On Thu, 10 Feb 2000, Jim Sermersheim wrote:

> Our server follows the "search all the naming contexts you have
> locally" model which I think is reasonable.

So, in the terms Mark and Kurt use, a Novell directory always acts like a
top-level or global-root server?

 - RL "Bob"





From list@netscape.com  Sat Feb 12 08:58:50 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA22367
	for <ldapext-archive@odin.ietf.org>; Sat, 12 Feb 2000 08:58:50 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id FAA00901;
	Sat, 12 Feb 2000 05:55:45 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id FAA21736; Sat, 12 Feb 2000 05:57:32 -0800 (PST)
Resent-Date: Sat, 12 Feb 2000 05:57:32 -0800 (PST)
From: "David Chadwick" <d.w.chadwick@salford.ac.uk>
Organization: University of Salford
To: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>, ietf-ldapext@netscape.com
Date: Sat, 12 Feb 2000 13:57:15 -0000
MIME-Version: 1.0
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: 7BIT
Subject: Re: RFC2251: RootDSE subschemasubentry issue
Reply-to: d.w.chadwick@salford.ac.uk
Priority: normal
In-reply-to: <3.0.5.32.20000211085848.009b4dd0@infidel.boolean.net>
References: <38A4158C.102DDB73@netscape.com>
X-mailer: Pegasus Mail for Win32 (v3.12b)
Message-Id: <E12Jd28-000729-00@serv1.is1.u-net.net>
Resent-Message-ID: <"Scj4XD.A.WTF.LbWp4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7BIT


> >I'd really prefer we choose the simple solution to this problem:
> >change the subschemasubentry attribute to multivalued, but stipulate
> >that it can only have one value when it appears outside the rootDSE.
> 
> Sounds simple... but one cannot generally redefine an attribute
> type, one must introduce a replacement attribute type.
> 

I agree with Kurt on this.

> >Does that solve the problem at hand?
> 
> No, because the client doesn't which subset of entries may
> be controlled by a given value.   Additional information
> is needed, such as a DN indicing the subtree of applicability,
> to make the information generally useful.
> 

This is true if the subentries can be held anywhere. The alternative 
is to have a defined set of positions for them (as X.500 and LDUP 
have done).  In the latter case, pointers are not essential (but may 
be an aid to efficiency).

>
> >But as far as I know LDAPv3 doesn't require that servers support
> >administrative domains at all.  Some servers do, some do not.  Also,

Administrative domains always exist. (Someone has to administer 
the DIT subtrees). So a product that supports this element of reality 
is better than one that does not

> >what if the naming contexts are disjoint yet all share the same
> >schema? That is a very common situation today.
> 
> I agree this is common and the information model should support
> sharing of subschema across multiple naming contexts.   I suggest we
> don't adopt a means which "hardcodes" the name and/or location of
> subschema subentries so as to maintain the greatest amount of
> flexibility possible.
> 
> 

This is arguing for pointers rather than fixed positions. Basically you 
pays your money and takes your choice. I dont have a strong 
preference for either. But once the decision is made then the model 
has to be made to fully support it. We are currently in the position 
where the model does not fully support fixed positions or pointers, 
without some modification to it. And it is quite complex given the 
multiple combinations you can have of administrative domains and 
naming contexts.

David


David



***************************************************

David Chadwick
IS Institute, University of Salford, Salford M5 4WT
Tel +44 161 295 5351  Fax +44 161 745 8169
Mobile +44 790 167 0359
Email D.W.Chadwick@salford.ac.uk
Home Page  http://www.salford.ac.uk/its024/chadwick.htm
Understanding X.500  http://www.salford.ac.uk/its024/X500.htm
X.500/LDAP Seminars http://www.salford.ac.uk/its024/seminars.htm
Entrust key validation string MLJ9-DU5T-HV8J

***************************************************



From list@netscape.com  Sat Feb 12 08:58:58 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA22377
	for <ldapext-archive@odin.ietf.org>; Sat, 12 Feb 2000 08:58:57 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id FAA01109;
	Sat, 12 Feb 2000 05:56:04 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id FAA22068; Sat, 12 Feb 2000 05:57:51 -0800 (PST)
Resent-Date: Sat, 12 Feb 2000 05:57:51 -0800 (PST)
From: "David Chadwick" <d.w.chadwick@salford.ac.uk>
Organization: University of Salford
To: ietf-ldapext@netscape.com, Mark Wahl <M.Wahl@INNOSOFT.COM>,
        Gil Kirkpatrick <gilk@netpro.com>
Date: Sat, 12 Feb 2000 13:57:14 -0000
MIME-Version: 1.0
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: 7BIT
Subject: RE: RFC2251: RootDSE subschemasubentry issue
Reply-to: d.w.chadwick@salford.ac.uk
Priority: normal
In-reply-to: <E9BC216C06E3D2118F1A00105AC75B6A9D5502@mail.netpro.com>
X-mailer: Pegasus Mail for Win32 (v3.12b)
Message-Id: <E12Jd2T-000729-00@serv1.is1.u-net.net>
Resent-Message-ID: <"12XYQ.A.NYF.ebWp4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7BIT

Date forwarded: 	Thu, 10 Feb 2000 18:36:03 -0800 (PST)
From:           	Gil Kirkpatrick <gilk@netpro.com>
To:             	"'d.w.chadwick@salford.ac.uk'" <d.w.chadwick@salford.ac.uk>,
       	"Kurt D. Zeilenga" <Kurt@OpenLDAP.org>, ietf-ldapext@netscape.com,
       	Mark Wahl <M.Wahl@INNOSOFT.COM>
Subject:        	RE: RFC2251: RootDSE subschemasubentry issue
Date sent:      	Thu, 10 Feb 2000 19:33:06 -0700
Forwarded by:   	ietf-ldapext@netscape.com

> David,
> 
> Why does the rootDSE need to contain subschemaSubentrys for each NC
> hosted by the server? Why is not sufficient to maintain the
> subschemaSubentrys in the NCs themselves?
> 

The original reason (if I remember correctly) was because the 
subschema subentries could be held anywhere in the DIT by an 
LDAP server, and not necessarily within the NCs. Thus pointers to 
them were needed, and the rootDSE was the obvious place to put a 
pointer that everyone would know how to get at. It was the LDUP 
group that first defined subentries beneath the NC context prefix, 
and this came way after the LDAP RFCs were published. I dont 
know if this has yet been widely accepted as a way of stroring 
subschema entries or not. If not, then pointers are still needed to the 
entries, where ever they may be in the NC.

David


> -gil
> 
> Gil Kirkpatrick
> Director of Engineering
> Netpro
> 
> 
> > -----Original Message-----
> > From:	David Chadwick [SMTP:d.w.chadwick@salford.ac.uk]
> > Sent:	Wednesday, February 09, 2000 12:27 PM
> > To:	Kurt D. Zeilenga; ietf-ldapext@netscape.com; Mark Wahl
> > Subject:	Re: RFC2251: RootDSE subschemasubentry issue
> > 
> > Mark, Kurt
> > 
> > I think I have an answer to the problem(s) being posed by Kurt.
> > 
> > The model as it stands is OK if a server only masters one naming
> > context. Everything works fine. All the entries in the NC and the
> > rootDSE can contain the subschemaSubentry attribute which points to
> > the single subschema subentry.
> > 
> > The problem arises once we have multiple NCs in a server. The 
> > subschemaSubentry attribute can still be single valued and exist in
> > each entry in each NC and point to the correct subschema subentry.
> > However, the attribute in the root DSE no longer works, for two
> > reasons.
> > 
> > Firstly it is supposed to be single valued (as Kurt pointed out) and
> > now it needs to have multiple values.
> > 
> > Secondly, (again as Kurt pointed out) there is no way for the user
> > to know from the multivalued attribute in the rootDSE which value
> > points to which subschema subentry for which NC. THis of course is
> > not a problem for the entries within the NC, as they only still need
> > a single pointer to their one and only subschema subentry.
> > 
> > Thus I conclude that the model is broken for multiple naming 
> > contexts, and that the subschemaSubentry attribute in the rootDSE
> > needs to be replaced by a multivalued attribute, having two
> > components - the context prefix of an NC (an LDAP DN), and the
> > pointer to the subschemaSubentry.
> > 
> > Do you agree with this analysis?
> > 
> > David
> > 
> > ***************************************************
> > 
> > David Chadwick
> > IS Institute, University of Salford, Salford M5 4WT
> > Tel +44 161 295 5351  Fax +44 161 745 8169
> > Mobile +44 790 167 0359
> > Email D.W.Chadwick@salford.ac.uk
> > Home Page  http://www.salford.ac.uk/its024/chadwick.htm
> > Understanding X.500  http://www.salford.ac.uk/its024/X500.htm
> > X.500/LDAP Seminars http://www.salford.ac.uk/its024/seminars.htm
> > Entrust key validation string MLJ9-DU5T-HV8J
> > 
> > ***************************************************
> 
> 


***************************************************

David Chadwick
IS Institute, University of Salford, Salford M5 4WT
Tel +44 161 295 5351  Fax +44 161 745 8169
Mobile +44 790 167 0359
Email D.W.Chadwick@salford.ac.uk
Home Page  http://www.salford.ac.uk/its024/chadwick.htm
Understanding X.500  http://www.salford.ac.uk/its024/X500.htm
X.500/LDAP Seminars http://www.salford.ac.uk/its024/seminars.htm
Entrust key validation string MLJ9-DU5T-HV8J

***************************************************



From list@netscape.com  Sun Feb 13 08:42:22 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA09393
	for <ldapext-archive@odin.ietf.org>; Sun, 13 Feb 2000 08:42:21 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id FAA17067;
	Sun, 13 Feb 2000 05:38:36 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id FAA08041; Sun, 13 Feb 2000 05:40:24 -0800 (PST)
Resent-Date: Sun, 13 Feb 2000 05:40:24 -0800 (PST)
X-Envelope-Sender-Is: helmut.volpers@icn.siemens.de (at relayer david.siemens.de)
Message-ID: <38A6B370.EADDB9CC@icn.siemens.de>
Date: Sun, 13 Feb 2000 14:36:48 +0100
From: Helmut Volpers <helmut.volpers@icn.siemens.de>
Organization: Siemens
X-Mailer: Mozilla 4.6 [de] (WinNT; I)
X-Accept-Language: de
MIME-Version: 1.0
To: "RL 'Bob' Morgan" <rlmorgan@washington.edu>
CC: IETF ldapext WG <ietf-ldapext@netscape.com>
Subject: Re: LDAP subtree search with zero-length DN for baseObject?
References: <Pine.LNX.4.19.99.0002080043140.19935-100000@perq.cac.washington.edu>
Content-Type: multipart/mixed;
 boundary="------------F6BA5C4DFDF4CA69BE4275F1"
Resent-Message-ID: <"toq0cB.A.X9B.FRrp4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Dies ist eine mehrteilige Nachricht im MIME-Format.
--------------F6BA5C4DFDF4CA69BE4275F1
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

I have seen a lot of simple clients which doesn't read the root
to get information about the server. They make a subtree search with
root 
as base object and they can live with a result which doesn't include the 
root but all the local entries in the server which match the filter.

So for a standalone server you can configure ROOT as CP in our DSA and
you 
can use root as base in every search. The root is only returned
in a base-level search (read).
In all the other cases we use the modell that the name resolution 
is finished and "search all the naming contexts you have locally" plus
referralls to all the references the server holds.

Can all your LDAP enabled applications can work with "noSuchObject"
for a search with ROOT as BaseObject ?

Helmut

RL 'Bob' Morgan schrieb:
> 
> RFC 2251 says, in section 3.4:
> 
>    An LDAP server MUST provide information about itself and other
>    information that is specific to each server.  This is represented as
>    a group of attributes located in the root DSE (DSA-Specific Entry),
>    which is named with the zero-length LDAPDN.  These attributes are
>    retrievable if a client performs a base object search of the root
>    with filter "(objectClass=*)", however they are subject to access
>    control restrictions.  The root DSE MUST NOT be included if the
>    client performs a subtree search starting from the root.
> 
> It isn't clear to me, though, what the expected result should be from a
> subtree search where the baseObject is the zero-length DN.  It mustn't
> include the root DSE info, but what should it include?  Should this mean
> "the subtree rooted at root of the global DIT"?  Presumably, if so, in
> existing cases this would typically fail since the DSA doesn't know how to
> contact a DSA for "the root".  Or can a DSA interpret it as "search all
> the naming contexts you have locally?"  By experiment I find that servers
> I've tried this on report "no such object".
> 
> Thanks,
> 
>  - RL "Bob"
--------------F6BA5C4DFDF4CA69BE4275F1
Content-Type: text/x-vcard; charset=us-ascii;
 name="helmut.volpers.vcf"
Content-Description: Visitenkarte für Helmut Volpers
Content-Disposition: attachment;
 filename="helmut.volpers.vcf"
Content-Transfer-Encoding: 7bit

begin:vcard 
n:Volpers;Helmut
tel;fax:+49-89-636-45860
tel;work:+49-89-636-46713
x-mozilla-html:FALSE
url:http://www.siemens.com/bus-com
org:Siemens AG
adr:;;;Munich;;81730;Germany
version:2.1
email;internet:Helmut.Volpers@icn.siemens.de
title:Directory Server Architect
fn:Helmut Volpers
end:vcard

--------------F6BA5C4DFDF4CA69BE4275F1--



From list@netscape.com  Sun Feb 13 20:08:58 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA14975
	for <ldapext-archive@odin.ietf.org>; Sun, 13 Feb 2000 20:08:57 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id RAA10877;
	Sun, 13 Feb 2000 17:05:47 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id RAA02965; Sun, 13 Feb 2000 17:07:35 -0800 (PST)
Resent-Date: Sun, 13 Feb 2000 17:07:35 -0800 (PST)
From: s.scott5349@belgium.com
Date: Sun, 13 Feb 2000 17:07:30 -0800 (PST)
Message-Id: <200002140107.RAA13467@xwing.netscape.com>
To: any5one@gte.net
Subject: No Suit No Commute!  Wk from Home!
MIME-Version: 1.0
Content-Type: text/plain; charset=unknown-8bit
Resent-Message-ID: <"zEPTOC.A.2t.WV1p4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


 
 LOOKING FOR GEMS!
 
 It's So Simple To Earn $2,000 - $5,000 Per Week Nowadays...
 We're searching for only 10 elite individuals with the work ethic
 necessary to generate a cash-flow for themselves of $2,000 - $5,000per
 week, and to increase that to over $20,000 per month, in as little as
 four to six months. And you know what? If you really have a burning
 desire and commitment, we guarantee you that you'll reach this  explosive
 income!
 
 Can you read a short script to our qualified leads, and then turn the
 interested prospects over to our electronic sales medium? (you will
 not be required to do any selling.)Do you have the self-discipline to
 ignore the TV for a couple of hours per day? Are you looking for a
 legitimate home-based business opportunity, that is not multi-level
 marketing, or a chain-letter scheme?
 
 If you would like to build an amazing income that will grow
 lightning-fast and have you profit $1,000.00 every time only one
 prospect  makes a purchase, then this is for you! You can build the  business under our guidance and support without having to attend  meetings or sell people things they don't need.
 
 Call NOW our TOLL FREE, PRE-RECORDED Message:
 1-800-320-9895 ext. 2375
 
 We market a real product, that pays real commissions to you,$1,000.00
 per sale, just for making the initial contacts. With our turn-key
 lead generation systems you'll always talk to people who actually WANT
 to talk to you.
 
 You have nothing to lose, there's no risk involved, nor is there any
 obligation whatsoever, and you may be qualified to earn thousands of
 extra dollars per month! So call now!
 
 The call is FREE, and there is absolutely no obligation, So what have
 you got to lose?
 
 Call Toll Free 1-800-320-9895 ext. 2375
 
 P.S. You literally have a once-in-a-lifetime opportunity to GET   INVOLVED NOW! Don't let this one go by. You have absolutely nothing
 to lose! This could be the most fascinating and profitable business
 of your life!
 
 Please, serious inquiries only.
 

To be removed reply to this email with remove in the subject.
Thank you!
 
 



From list@netscape.com  Mon Feb 14 10:19:22 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA14177
	for <ldapext-archive@odin.ietf.org>; Mon, 14 Feb 2000 10:19:21 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id HAA08153;
	Mon, 14 Feb 2000 07:14:58 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id HAA28805; Mon, 14 Feb 2000 07:18:27 -0800 (PST)
Resent-Date: Mon, 14 Feb 2000 07:18:27 -0800 (PST)
Message-ID: <604BBD28BC0AD311AE760008C7B2721D2E5797@exchange03.jhancock.com>
From: "Buonora, Peter" <pbuonora@jhancock.com>
To: "'ietf-ldapext@netscape.com'" <ietf-ldapext@netscape.com>
Subject: FW: LDAP in a 24x7 NAS environment?
Date: Mon, 14 Feb 2000 10:18:16 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.21)
Content-Type: text/plain
Resent-Message-ID: <"EEZgtC.A.xBH.9yBq4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


Hello,

Here at John Hancock we are in the process of moving to the new version of
NAS which requires LDAP registry. There is no clear way to make this
architecture work in a 24x7 environment since NAS requires reads and writes
while Netscape Directory 4.x server does not support Multi-Mastering. I know
that someone else must have faced these issues already and any help at all
would be greatly appreciated. (We would prefer to avoid HA failover type
solutions)

We do have a platinum support contract, but Tech support has not been a
great help as of yet..

Thanks,

Peter Buonora
Web Infrastructure Architect
John Hancock
617-572-5130



From list@netscape.com  Mon Feb 14 11:43:07 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA16676
	for <ldapext-archive@odin.ietf.org>; Mon, 14 Feb 2000 11:43:04 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id IAA05484;
	Mon, 14 Feb 2000 08:39:49 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id IAA23870; Mon, 14 Feb 2000 08:41:37 -0800 (PST)
Resent-Date: Mon, 14 Feb 2000 08:41:37 -0800 (PST)
Message-Id: <3.0.5.32.20000214084123.0096f7e0@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Mon, 14 Feb 2000 08:41:23 -0800
To: ietf-ldapext@netscape.com
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: RFC2251: unbind
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"v5tf8B.A.s0F.BBDq4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

It seems that some folks are confused about the function of
unbind.  We've likely have all heard the "don't I need to unbind
before rebinding" enquiry.   Some have even noted that the
disconnection requirements are MAY, not MUSTs.  Some have any
stated that some servers do not terminate the connection upon
receipt of an unbind request.

It seems that some implementors don't take "The function of the
Unbind Operation is to terminate a protocol session" as an absolute.

I would suggest that the paragraph following this sentence
for clarification:
	A client SHALL NOT submit further requests after
	sending an unbind request.  A client SHOULD terminate
	the underlying TCP session after making the unbind
	request.
	A server SHALL NOT process nor respond to further
	requests received after an unbind requests.  A
	server SHOULD terminate the underlying TCP session
	after receiving the unbind request.


	



From list@netscape.com  Mon Feb 14 11:52:44 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA17067
	for <ldapext-archive@odin.ietf.org>; Mon, 14 Feb 2000 11:52:43 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id IAA19172;
	Mon, 14 Feb 2000 08:47:58 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id IAA00549; Mon, 14 Feb 2000 08:51:37 -0800 (PST)
Resent-Date: Mon, 14 Feb 2000 08:51:37 -0800 (PST)
Message-ID: <38A832D2.6857F054@netscape.com>
Date: Mon, 14 Feb 2000 08:52:35 -0800
From: dboreham@netscape.com (David Boreham)
X-Mailer: Mozilla 4.7 [en] (WinNT; U)
X-Accept-Language: en
MIME-Version: 1.0
To: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
CC: ietf-ldapext@netscape.com
Subject: Re: RFC2251: unbind
References: <3.0.5.32.20000214084123.0096f7e0@infidel.boolean.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"rmMPD.A.TI.YKDq4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit


FWIW the Netscape/iPlanet server closes the connection
immediately it sees an unbind. The Netscape SDK also closes
the connection immediately after sending the unbind PDU.
This, of course, leads to many interesting race conditions
in the server code, but I think it complies with your clarified
requirements.

"Kurt D. Zeilenga" wrote:

> It seems that some folks are confused about the function of
> unbind.  We've likely have all heard the "don't I need to unbind
> before rebinding" enquiry.   Some have even noted that the
> disconnection requirements are MAY, not MUSTs.  Some have any
> stated that some servers do not terminate the connection upon
> receipt of an unbind request.
>
> It seems that some implementors don't take "The function of the
> Unbind Operation is to terminate a protocol session" as an absolute.
>
> I would suggest that the paragraph following this sentence
> for clarification:
>         A client SHALL NOT submit further requests after
>         sending an unbind request.  A client SHOULD terminate
>         the underlying TCP session after making the unbind
>         request.
>         A server SHALL NOT process nor respond to further
>         requests received after an unbind requests.  A
>         server SHOULD terminate the underlying TCP session
>         after receiving the unbind request.
>
>



From list@netscape.com  Mon Feb 14 16:50:15 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA24692
	for <ldapext-archive@odin.ietf.org>; Mon, 14 Feb 2000 16:50:09 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id NAA29376;
	Mon, 14 Feb 2000 13:46:43 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id NAA27814; Mon, 14 Feb 2000 13:48:33 -0800 (PST)
Resent-Date: Mon, 14 Feb 2000 13:48:33 -0800 (PST)
Message-Id: <3.0.5.32.20000214134825.0092dcd0@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Mon, 14 Feb 2000 13:48:25 -0800
To: mark_meredith@novell.com
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Vendor Info
Cc: ietf-ldapext@netscape.com
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"-k1_5.A._xG.wgHq4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Mark,

Section 4.

What is the intent of this statement:
   These attributes are an addition to the Server-specific Data
   Requirements defined in section 3.4 of [RFC-2251].

Do you mean to imply that servers MUST provide these values?  You
later say SHOULD maintain these attributes types.  As noted previously,
I believe the publication of these attributes should be elective.
That is, a server MAY provide these attributes.

Section 5.

If a server supports these attribute types, the values should
be overwritable by configuration.  This allows a server to
"spoof" clients to obtain desired behavior.

Section 6.

A client must not assume that all servers advertising a particular
version string behave in a like manner.  The apparent flaw may
only be exhibited in a subset of the servers advertising a
particular version.  This may be due to any number of environmental
factors.

Clients should not attempt fuzzy matching.  They must only
enable workarounds when the server presents a vendor strings
known to evident of specific flaws.  They must assume that all
unknown vendor strings behavior per standard track specifications.

	Kurt




From list@netscape.com  Mon Feb 14 17:21:06 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA25396
	for <ldapext-archive@odin.ietf.org>; Mon, 14 Feb 2000 17:21:05 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id OAA09122;
	Mon, 14 Feb 2000 14:16:21 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id OAA13082; Mon, 14 Feb 2000 14:19:59 -0800 (PST)
Resent-Date: Mon, 14 Feb 2000 14:19:59 -0800 (PST)
Message-ID: <EB21C070AA75D311A0AC0090271EC45C01550235@us-tr-exch-1.tr.unisys.com>
From: "Salter, Thomas A" <Thomas.Salter@unisys.com>
To: ietf-ldapext@netscape.com
Subject: RE: please publish draft-mmeredith-rootdse-vendor-info-01.txt
Date: Mon, 14 Feb 2000 17:19:58 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.21)
Content-Type: text/plain;
	charset="iso-8859-1"
Resent-Message-ID: <"ehQ3tB.A.IMD.O-Hq4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


I just noticed that the EQUALITY matching rule for these attributes in
caseExactIA5Match, but the syntaxes are now DirectoryString.

This led me back to RFC2252 which includes the definition for
caseIgnoreMatch (borrowed from X.520), but not caseExactMatch.

What happened to:
    ( 2.5.13.5 NAME 'caseExactMatch'
      SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )

And now that I've started down this path, what about:
caseExactOrderingMatch, caseExactSubstringsMatch,
numericStringOrderingMatch, telephoneNumberOrderingMatch, and a whole lot
more that X.520 defines?  Are these assumed to be inherited from X.520, but
not included in the "Servers SHOULD be capable ... " clause?  Or is this the
complete list that other RFCs may reference?

To get back to the subject, can vendor info draft include "EQUALITY
2.5.13.5" in the attribute definitions, or must it also define
caseExactMatch.



From list@netscape.com  Mon Feb 14 17:42:06 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA25756
	for <ldapext-archive@odin.ietf.org>; Mon, 14 Feb 2000 17:42:05 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id OAA12728;
	Mon, 14 Feb 2000 14:37:13 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id OAA23095; Mon, 14 Feb 2000 14:40:51 -0800 (PST)
Resent-Date: Mon, 14 Feb 2000 14:40:51 -0800 (PST)
Message-Id: <3.0.5.32.20000214144047.0094c830@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Mon, 14 Feb 2000 14:40:47 -0800
To: ietf-ldapext@netscape.com
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Re: RFC2251: unbind
In-Reply-To: <3.0.5.32.20000214084123.0096f7e0@infidel.boolean.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"ZS3uhC.A.joF.yRIq4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 08:41 AM 2/14/00 -0800, Kurt D. Zeilenga wrote:
>It seems that some folks are confused about the function of
>unbind.  We've likely have all heard the "don't I need to unbind
>before rebinding" enquiry.   Some have even noted that the
>disconnection requirements are MAY, not MUSTs.  Some have any
>stated that some servers do not terminate the connection upon
>receipt of an unbind request.
>
>It seems that some implementors don't take "The function of the
>Unbind Operation is to terminate a protocol session" as an absolute.
>
>I would suggest that the paragraph following this sentence
>for clarification:
>	A client SHALL NOT submit further requests after
>	sending an unbind request.  A client SHOULD terminate
>	the underlying TCP session after making the unbind
>	request.
>	A server SHALL NOT process nor respond to further
>	requests received after an unbind requests.  A
>	server SHOULD terminate the underlying TCP session
>	after receiving the unbind request.

Note that the existing paragraph allows the client to wait
for the server to initiate the TCP shutdown AND allows the
server to wait for the client to initiate the TCP shutdown.
There really should be at least one SHALL detailing who
must shutdown the connection and when. 

I revise my suggestion:
	The client SHALL terminate the underlying connection
	after submitting an unbind request.

	The server SHALL terminate the underlying connection
	upon receipt of an unbind request.

Comments?



From list@netscape.com  Mon Feb 14 18:45:50 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA26557
	for <ldapext-archive@odin.ietf.org>; Mon, 14 Feb 2000 18:45:50 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id PAA18340;
	Mon, 14 Feb 2000 15:42:54 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id PAA20645; Mon, 14 Feb 2000 15:44:45 -0800 (PST)
Resent-Date: Mon, 14 Feb 2000 15:44:45 -0800 (PST)
Message-Id: <200002142337.SAA00271@astro.cs.utk.edu>
X-URI: http://www.cs.utk.edu/~moore/
X-PGP-Key: 2F07A741 ; 78 15 8E 8B C0 06 5D D1  BC 08 05 7F 42 81 7E 90 
To: apps area chairs and working groups: ;
cc: ietf@ietf.org
reply-to: ietf@ietf.org
From: Keith Moore <moore@cs.utk.edu>
Subject: IETF Adelaide and interim meetings for APPS WGs
Date: Mon, 14 Feb 2000 18:37:05 -0500
Sender: moore@cs.utk.edu
Resent-Message-ID: <"MufV9B.A.NCF.rNJq4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

It has come to the attention of the Applications Area Directors
that one or more Applications area working groups have elected
to not meet in Adelaide, and instead to hold an "interim meeting"
in the United States, presumably because of distance and/or cost issues.

IETF is an international organization, and it is IETF's longstanding 
practice to hold its meetings in various locations around the planet.
This serves both to encourage wider participation in IETF and also
to more fairly distribute travel costs and inconvenience (over time) 
among all participants.  The scheduleing of an interim WG meeting in 
the US in lieu of a WG meeting in Adelaide undermines this policy.  
This is insulting to non-US participants of IETF (many of whom have 
attended meetings in the US for years), embarassing to IETF as 
a whole, and a threat to IETF's international stature.

Even if a working group has few participants outside the United
States, a working group does not work in isolation from other
working groups.  Attendance at IETF meetings is an invaluable 
mechanism for cross-group collaboration.  

RFC 2418 states:

   Interim meetings are subject to the
   same rules for advance notification, reporting, open participation,
   and process, which apply to other working group meetings.

Since normal working group meetings require advance notification
via email to the entire IETF list, and the process for getting a meeting
slot involves prior approval of the Area Directors, the same
requirements apply to interim working group meetings.  Part of the 
reason for prior approval being required is to ensure that the 
locations of the meetings are not being chosen to favor certain 
participants over others.  

There have been several violations of this policy since publication
of RFC 2418.

Therefore,

- All interim meetings within the Applications Area which were not
  previously and explicitly approved by the Applications Area Directors, 
  are hereby cancelled.

- No Applications Area group will hold any interim meeting prior
  to April 15.

- No Applications Area group which does not hold a meeting in 
  Adelaide, will hold any interim meeting prior to July 31.
  (i.e. prior to the Pittsburg IETF meeting)

- This applies to all face to face meetings held for the purpose 
  of conducting working group discussion and to which the working 
  group is invited, even if labelled "informal" or otherwise 
  labelled to distinguish them from official working group meetings.

- Exceptions to this policy may be made for recently chartered groups,
  but Area Director approval is still required for such groups to
  schedule interim meetings.


for the Applications Area Directors,

Keith Moore



From list@netscape.com  Mon Feb 14 20:56:34 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA29566
	for <ldapext-archive@odin.ietf.org>; Mon, 14 Feb 2000 20:56:34 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id RAA08977;
	Mon, 14 Feb 2000 17:53:39 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id RAA13714; Mon, 14 Feb 2000 17:55:22 -0800 (PST)
Resent-Date: Mon, 14 Feb 2000 17:55:22 -0800 (PST)
Message-Id: <s8a84f91.071@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.2.1
Date: Mon, 14 Feb 2000 18:54:56 -0700
From: "Jim Sermersheim" <JIMSE@novell.com>
To: <ietf-ldapext@netscape.com>, <Thomas.Salter@unisys.com>
Subject: RE: please publish draft-mmeredith-rootdse-vendor-info-01.txt
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Resent-Message-ID: <"v-GE_B.A.AWD.JILq4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ietf.org id UAA29566

I think Mark's intention was to change the EQUALITY matching rule to caseIgnoreMatch when he changed the syntax but it slipped by.

OTOH, if he *did* want caseExactMatch, I think it would be confusing to reference it without it being formally defined somewhere (in LDAP land). I also think it would be a little funky to define it in this document. It seems like it should be grouped with the others you mention in some other place.

Jim

>>> "Salter, Thomas A" <Thomas.Salter@unisys.com> 2/14/00 3:20:21 PM >>>

I just noticed that the EQUALITY matching rule for these attributes in
caseExactIA5Match, but the syntaxes are now DirectoryString.

This led me back to RFC2252 which includes the definition for
caseIgnoreMatch (borrowed from X.520), but not caseExactMatch.

What happened to:
    ( 2.5.13.5 NAME 'caseExactMatch'
      SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )

And now that I've started down this path, what about:
caseExactOrderingMatch, caseExactSubstringsMatch,
numericStringOrderingMatch, telephoneNumberOrderingMatch, and a whole lot
more that X.520 defines?  Are these assumed to be inherited from X.520, but
not included in the "Servers SHOULD be capable ... " clause?  Or is this the
complete list that other RFCs may reference?

To get back to the subject, can vendor info draft include "EQUALITY
2.5.13.5" in the attribute definitions, or must it also define
caseExactMatch.




From list@netscape.com  Mon Feb 14 21:13:54 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA00228
	for <ldapext-archive@odin.ietf.org>; Mon, 14 Feb 2000 21:13:54 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id SAA11543;
	Mon, 14 Feb 2000 18:10:55 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id SAA20180; Mon, 14 Feb 2000 18:12:46 -0800 (PST)
Resent-Date: Mon, 14 Feb 2000 18:12:46 -0800 (PST)
Message-Id: <s8a853a3.052@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.2.1
Date: Mon, 14 Feb 2000 19:12:29 -0700
From: "Jim Sermersheim" <JIMSE@novell.com>
To: "Mark Meredith" <MMEREDIT@novell.com>, <Kurt@OpenLDAP.org>
Cc: <ietf-ldapext@netscape.com>
Subject: Re: Vendor Info
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Resent-Message-ID: <"pZrbtC.A.C7E.dYLq4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ietf.org id VAA00228

>>> "Kurt D. Zeilenga" <Kurt@OpenLDAP.org> 2/14/00 2:48:50 PM >>>
>What is the intent of this statement:
>   These attributes are an addition to the Server-specific Data
>   Requirements defined in section 3.4 of [RFC-2251].
>
>Do you mean to imply that servers MUST provide these values?  You
>later say SHOULD maintain these attributes types.  As noted previously,
>I believe the publication of these attributes should be elective.
>That is, a server MAY provide these attributes.

I think the intention was to simply point out that these are attributes in the root DSE, much like those found in section 3.4 of RFC 2251. I don't think there's any implication that these are mandatory.

>Section 5.
>
>If a server supports these attribute types, the values should
>be overwritable by configuration.  This allows a server to
>"spoof" clients to obtain desired behavior.

Are you requesting that this wording be added to the draft? If so, why? Perhaps your should should've been a shouldn't?

>Section 6.
>
>A client must not assume that all servers advertising a particular
>version string behave in a like manner.  The apparent flaw may
>only be exhibited in a subset of the servers advertising a
>particular version.  This may be due to any number of environmental
>factors.

Good point.

>Clients should not attempt fuzzy matching.  They must only
>enable workarounds when the server presents a vendor strings
>known to evident of specific flaws.

While this may be good advise, I don't see it as a requirement. If a client writer knows that versions 5.0 thru 5.x all exhibited a certain bug, and it was fixed in 6.0, it's reasonable for them to assume that a version substring of 5. will exhibit the bug.

>  They must assume that all
>unknown vendor strings behavior per standard track specifications.

Are you requesting that this wording be included in addition to, or in lieu of: "If a client implementation does not recognize the specific vendorName or vendorVersion as one it recognizes, then for the purposes of 'working around' anomalies, the client MUST assume that the server is complete and correct."?

Jim



From list@netscape.com  Mon Feb 14 22:04:36 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA02401
	for <ldapext-archive@odin.ietf.org>; Mon, 14 Feb 2000 22:04:36 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id SAA13687;
	Mon, 14 Feb 2000 18:59:46 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id TAA04125; Mon, 14 Feb 2000 19:03:26 -0800 (PST)
Resent-Date: Mon, 14 Feb 2000 19:03:26 -0800 (PST)
Message-Id: <3.0.5.32.20000214190315.00953100@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Mon, 14 Feb 2000 19:03:15 -0800
To: "Jim Sermersheim" <JIMSE@novell.com>
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Re: Vendor Info
Cc: "Mark Meredith" <MMEREDIT@novell.com>, <ietf-ldapext@netscape.com>
In-Reply-To: <s8a853a0.025@prv-mail25.provo.novell.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"bpIiW.A.LAB.9HMq4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 07:12 PM 2/14/00 -0700, Jim Sermersheim wrote:
>>Section 5.
>>
>>If a server supports these attribute types, the values should
>>be overwritable by configuration.  This allows a server to
>>"spoof" clients to obtain desired behavior.
>
>Are you requesting that this wording be added to the draft? If so, why? Perhaps your should should've been a shouldn't?

I suggest using wording similiar to that found in the RFC 2616 (HTTP 1.1):
  Server implementors are encouraged to make the values of these
  attributes configurable options.

Note, they encourage suggest for security reasons.  Though quite valid,
I suggest it primarily for interoperability.  I've already seen folks
hack OpenLDAP to spoof other servers so that they could use some client
which inappropriately depended provided vendor information.  [In
believe the vendor ended up hacking their own server to spoof the
old version so that their client would work].

>>Clients should not attempt fuzzy matching.  They must only
>>enable workarounds when the server presents a vendor strings
>>known to evident of specific flaws.
>
>While this may be good advise, I don't see it as a requirement. If a client writer knows that versions 5.0 thru 5.x all exhibited a certain bug, and it was fixed in 6.0, it's reasonable for them to assume that a version substring of 5. will exhibit the bug.

No, because the vendor may, even after producing 6.0, produce a 5.y which fixes
the behavior.  This sometimes occurs because a large customer of the vendor
specifically requests a patch for the older version and the vendor complies.
It is not uncommon for a vendor to support and revise multiple versions
for significant time.

>>  They must assume that all
>>unknown vendor strings behavior per standard track specifications.
>
>Are you requesting that this wording be included in addition to, or in lieu of: "If a client implementation does not recognize the specific vendorName or vendorVersion as one it recognizes, then for the purposes of 'working around' anomalies, the client MUST assume that the server is complete and correct."?

I would prefer to clarify the term "recognize".



From list@netscape.com  Tue Feb 15 01:08:01 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id BAA07407
	for <ldapext-archive@odin.ietf.org>; Tue, 15 Feb 2000 01:08:00 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id WAA27946;
	Mon, 14 Feb 2000 22:05:00 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id WAA10789; Mon, 14 Feb 2000 22:06:50 -0800 (PST)
Resent-Date: Mon, 14 Feb 2000 22:06:50 -0800 (PST)
Message-Id: <3.0.5.32.20000214215708.00936dc0@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Mon, 14 Feb 2000 21:57:08 -0800
To: ietf-ldapext@netscape.com
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: ACL model comments
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"4A4F7B.A.ToC.5zOq4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Though I haven't had time to do a full review, I can offer
a few comments:

Section 6.3

The 'aci' attribute is defined as a user, not operational,
attribute type.  Besides being appropriate in terms of usage,
this would allow this attribute type in any and all
object classes.  If usage is left as user, you'd likely
have to define an auxiliary objectclass to allow mix in
or replace 'top' or something.

The EQUALITY matching rule should be specific to the ACI
Syntax and able to determine that that two strings, not
equal by caseExactMatch, yet same per the ACI syntax.

For example:
    aci: 1.2.3.4#subtree#grant;r;cn#group#cn=Dept XYZ
    aci: 1.2.3.5#subtree#grant;r;2.5.4.3#group#cn=Dept XYZ

(cn == 2.5.4.3)

Section 6.3.1  LDAP Operations (Modify/delete)
    Deleting the last ACI value from an entry is not the same as
    deleting the ACI from the entry.

This seems to imply behavior inconsistent with RFC 2251, 4.6.
    It is possible for an entry to contain an ACI with no values.

An attribute type, if instatiated, must have values.  Though
you state not storage means, I believe it important to follow
the basic LDAP information model to ensure the information
is representatable by the protocol and interchange formats.

Section 6.4.2
         Replace works similarly to all other attributes.

This implies that other modifications do not work similiarly to
all other attributes.  I believe that all modifications should be
consistent with the defined semantics of Modify operation.

6.5 VendorACI

Like 'aci', it should be operational.  Also, it should have a
matching rule defined which understands how to match strings
of vendor ACI syntax.  Defining this seems problematic, but
could be be defined, I guess, in generic terms.  Howeer, if
the directory contains vendorACIs from multiple vendors, you
have a problem.  But these problems exist even as presently
defined.  I suggest not defining this and just stating that
vendors can define their own attribute types to contain
Access Control Information.  They'll like do this anyways.





From list@netscape.com  Tue Feb 15 01:11:29 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id BAA07725
	for <ldapext-archive@odin.ietf.org>; Tue, 15 Feb 2000 01:11:29 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id WAA24396;
	Mon, 14 Feb 2000 22:06:40 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id WAA12017; Mon, 14 Feb 2000 22:10:20 -0800 (PST)
Resent-Date: Mon, 14 Feb 2000 22:10:20 -0800 (PST)
From: jobs@agnet.com.au
To: jobs@agnet.com.au
Subject: HOT OPENINGS IN AUSTIN, TEXAS!!!
Date: Mon, 14 Feb 2000 21:19:12 +0100
Message-ID: <20000214201416598.AAH148.247@ip5.margate.fl.pub-ip.PSI.NET>
Resent-Message-ID: <"1gEtJB.A.f7C.L3Oq4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com



*************************************
*************************************
HOT JOB OPENINGS IN AUSTIN, TEXAS
*************************************
*************************************

Exciting opportunities have just opened up in Austin, Texas.  
If you are thinking of making  a career change or know of 
anyone else who might be interested, please forward these 
excellent opportunities to them.
_________________________________________________________

Web Developers are needed with strong knowledge of  HTML, 
JAVAscript, Perl, CGI methodology, Unix, and Sun Solaris.

Salaries up to $90,000
No contractors accepted on this position. 
*************************************

_________________________________________________________


Several JAVA Programmers also needed to develop & deploy 
a web-based integrated work flow management & sales tool 
for mid range products.  

Salaries up to $90,000.  
Contractors will be paid $48.00 per hour.
*************************************
_________________________________________________________



Sr. JAVA Developer needed to work on  fast growing web 
enabled private line networking products.  Will work as 
part of a highly skilled team.  JAVA plus solid development 
methodology, Enterprise JAVA Beans (EJB), and BEA's Web 
Logic EJB Server needed. 

Salaries up to $90,000 or $48.00 per hour.
*************************************
_________________________________________________________


C++/JAVA Programmers needed to work on 8-10 member team within 
a Linux environment.  Expert knowledge of Linux/Unix/AIX needed.

Salaries up to $68,000.  
Contractors paid up to $38.00 per hour. 
*************************************

_________________________________________________________

AIX Support Delivery Technical Specialists needed. 
Shell scripting/programming in an AIX/UNIX environment 
(Perl or C) needed. 

_________________________________________________________

OS/2 Technical Support.  Must be able to travel to 
client sites when needed.  
Must also have some OS/2 LAN Manager.

Salaries up to $78,338.  
Contractors will be paid $45.00 per hour.
*************************************
_________________________________________________________


Instructional Designer/Developer needed to design and 
help with course development.  Will
develop and coordinate training and develop course 
material on the company's products and sales.  Any 
experience with JAVA, JAVA Beans will be a plus. 

This is a contractor postion only and will pay up to 
$30.00 per hour.
*************************************
_________________________________________________________


Visual C++ Developers needed as part of a development 
team for a telecommunications company.  Will perform 
all phases of the development life cycle.  Must have 
Visual C++,  MFC,  Object Oriented Design and SQL.  

Salaries up to $50,000 or $26.00 per hour.
*************************************
_________________________________________________________


Software Test Engineers needed to help design, develop, 
code and execute functional test plans.  
Salaries are open.
_________________________________________________________


Disk Drive Engineer needed to provide world wide product 
engineering support for a variety of disk drivers on the 
RS/6000.  

Salary up to $50,000 or $30.00 per hour.
*************************************

_________________________________________________________

Device Driver Developers needed to perform new 
development and technical Level 2.5/3.0 support of 
the AIX operating system.  

Salary up to $73,000 or $40.00 per hour.
*************************************

_________________________________________________________


AIX Kernel Developers to perform support and 
serviceability using  AIX, Virtual Memory Manager, 
Unix Configuration, Unix Security, Printer Device 
Drivers.  

Will pay up to $68,000 or $38.00 per hour.  
*************************************
AIX Performance Testers also needed.
_________________________________________________________


SQL Server DBA's  needed for three projects. 

Salaries up to $47,000 or $26.00 per hour.
*************************************
_________________________________________________________


DB2 Database Manager needed to develop and manage a 
database for partner commerce/servers. Will be responsible 
for database backup and recovery procedures.  Will access 
security and database integrity. 

Salary up to $93,596 or $51.00 per hour.
*************************************
_________________________________________________________


ADABAS DBA needed for a short term contract.  
Must have ADASMP.  

Will pay top dollar to find the right person.
*************************************
_________________________________________________________

QA Manager needed to Manage Test group.  

Salary up to $72,000 or $40.00 per hour.
*************************************
_________________________________________________________
_________________________________________________________


For detailed information on these and other openings please 
CONTACT us at our toll free

===============================
===============================
DP West Incorporated
Professional Recruiting and Services

1-888-664-2388 or 623-374-0030
===============================
===============================
_________________________________________________________
_________________________________________________________


Note:  This mail has been directed to computer professionals 
seeking employment.  It is not intended to be spam mail.
We have received your reference from fellow business partners. 
If you do not want to receive this mail in the future please 
let us know the e-mail ID this message was received at and 
any aliases and we will take you off our list.

We appreciate your patience and regret the inconvenience.



From list@netscape.com  Tue Feb 15 06:35:29 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA22378
	for <ldapext-archive@odin.ietf.org>; Tue, 15 Feb 2000 06:35:28 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id DAA15812;
	Tue, 15 Feb 2000 03:32:31 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id DAA06268; Tue, 15 Feb 2000 03:34:21 -0800 (PST)
Resent-Date: Tue, 15 Feb 2000 03:34:21 -0800 (PST)
Message-Id: <200002151134.GAA22224@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
CC: ietf-ldapext@netscape.com
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-zeilenga-ldap-authpasswd-01.txt
Date: Tue, 15 Feb 2000 06:34:15 -0500
Sender: nsyracus@cnri.reston.va.us
Resent-Message-ID: <"OVaUP.A.qhB.8mTq4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.


	Title		: LDAP Authentication Password Attribute
	Author(s)	: K. Zeilenga
	Filename	: draft-zeilenga-ldap-authpasswd-01.txt
	Pages		: 8
	Date		: 14-Feb-00
	
This document describes schema for storing authentication passwords in
a LDAP [RFC2251] directory.  The document provides schema definitions
for authPassword and related schema definitions.  The authPassword is
intended to used instead of clear text password storage mechanisms
such as userPassword [RFC2256] to support simple bind operations.  The
attribute may be used to store SASL [RFC2222] authentication passwords
in entries of a directory.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-zeilenga-ldap-authpasswd-01.txt

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-zeilenga-ldap-authpasswd-01.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-zeilenga-ldap-authpasswd-01.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20000214115223.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-zeilenga-ldap-authpasswd-01.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-zeilenga-ldap-authpasswd-01.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20000214115223.I-D@ietf.org>

--OtherAccess--

--NextPart--




From list@netscape.com  Tue Feb 15 09:18:20 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA02949
	for <ldapext-archive@odin.ietf.org>; Tue, 15 Feb 2000 09:18:19 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id GAA25509;
	Tue, 15 Feb 2000 06:15:20 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id GAA02139; Tue, 15 Feb 2000 06:17:11 -0800 (PST)
Resent-Date: Tue, 15 Feb 2000 06:17:11 -0800 (PST)
Message-ID: <EB21C070AA75D311A0AC0090271EC45C01577176@us-tr-exch-1.tr.unisys.com>
From: "Salter, Thomas A" <Thomas.Salter@unisys.com>
To: ietf-ldapext@netscape.com
Subject: RE: RFC2251: unbind
Date: Tue, 15 Feb 2000 09:17:05 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.21)
Content-Type: text/plain;
	charset="iso-8859-1"
Resent-Message-ID: <"T6GZFC.A.Jh.m_Vq4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

I'd prefer a protocol where only one side could initiate the normal
shutdown.  In this case the server should do that as a response to the
unbind.  The client should close in response to server-initiated close.
This would eliminate the various race conditions that exist otherwise and
make it easier to tell normal conditions from error conditions.

 > -----Original Message-----
 > From: Kurt D. Zeilenga [mailto:Kurt@OpenLDAP.org]
 > Sent: Monday, February 14, 2000 5:41 PM
 > To: ietf-ldapext@netscape.com
 > Subject: Re: RFC2251: unbind
 > 
 > 
 > At 08:41 AM 2/14/00 -0800, Kurt D. Zeilenga wrote:
 > >It seems that some folks are confused about the function of
 > >unbind.  We've likely have all heard the "don't I need to unbind
 > >before rebinding" enquiry.   Some have even noted that the
 > >disconnection requirements are MAY, not MUSTs.  Some have any
 > >stated that some servers do not terminate the connection upon
 > >receipt of an unbind request.
 > >
 > >It seems that some implementors don't take "The function of the
 > >Unbind Operation is to terminate a protocol session" as an absolute.
 > >
 > >I would suggest that the paragraph following this sentence
 > >for clarification:
 > >	A client SHALL NOT submit further requests after
 > >	sending an unbind request.  A client SHOULD terminate
 > >	the underlying TCP session after making the unbind
 > >	request.
 > >	A server SHALL NOT process nor respond to further
 > >	requests received after an unbind requests.  A
 > >	server SHOULD terminate the underlying TCP session
 > >	after receiving the unbind request.
 > 
 > Note that the existing paragraph allows the client to wait
 > for the server to initiate the TCP shutdown AND allows the
 > server to wait for the client to initiate the TCP shutdown.
 > There really should be at least one SHALL detailing who
 > must shutdown the connection and when. 
 > 
 > I revise my suggestion:
 > 	The client SHALL terminate the underlying connection
 > 	after submitting an unbind request.
 > 
 > 	The server SHALL terminate the underlying connection
 > 	upon receipt of an unbind request.
 > 
 > Comments?
 > 



From list@netscape.com  Tue Feb 15 13:46:32 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA18111
	for <ldapext-archive@odin.ietf.org>; Tue, 15 Feb 2000 13:46:31 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id KAA20108;
	Tue, 15 Feb 2000 10:42:00 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id KAA15633; Tue, 15 Feb 2000 10:45:26 -0800 (PST)
Resent-Date: Tue, 15 Feb 2000 10:45:26 -0800 (PST)
Message-Id: <s8a93c46.086@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.2.1
Date: Tue, 15 Feb 2000 11:44:57 -0700
From: "Mark Meredith" <MMEREDIT@novell.com>
To: <ietf-ldapext@netscape.com>, <JIMSE@novell.com>,
        <Thomas.Salter@unisys.com>
Subject: RE: please publish draft-mmeredith-rootdse-vendor-info-01.txt
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Resent-Message-ID: <"052tvD.A.lxD.C7Zq4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ietf.org id NAA18111

I will make the EQUALITY be a caseIgnoreMatch, 
I had looked for caseExact but did not find it, so I used the caseExactIA5Match. After thinking about it, it would probably be better to 
use the caseIgnoreMatch.

-Mark

>>> "Jim Sermersheim" <JIMSE@novell.com> 02/14/00 06:55PM >>>
I think Mark's intention was to change the EQUALITY matching rule to caseIgnoreMatch when he changed the syntax but it slipped by.

OTOH, if he *did* want caseExactMatch, I think it would be confusing to reference it without it being formally defined somewhere (in LDAP land). I also think it would be a little funky to define it in this document. It seems like it should be grouped with the others you mention in some other place.

Jim

>>> "Salter, Thomas A" <Thomas.Salter@unisys.com> 2/14/00 3:20:21 PM >>>

I just noticed that the EQUALITY matching rule for these attributes in
caseExactIA5Match, but the syntaxes are now DirectoryString.

This led me back to RFC2252 which includes the definition for
caseIgnoreMatch (borrowed from X.520), but not caseExactMatch.

What happened to:
    ( 2.5.13.5 NAME 'caseExactMatch'
      SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )

And now that I've started down this path, what about:
caseExactOrderingMatch, caseExactSubstringsMatch,
numericStringOrderingMatch, telephoneNumberOrderingMatch, and a whole lot
more that X.520 defines?  Are these assumed to be inherited from X.520, but
not included in the "Servers SHOULD be capable ... " clause?  Or is this the
complete list that other RFCs may reference?

To get back to the subject, can vendor info draft include "EQUALITY
2.5.13.5" in the attribute definitions, or must it also define
caseExactMatch.





From list@netscape.com  Tue Feb 15 13:57:10 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA18466
	for <ldapext-archive@odin.ietf.org>; Tue, 15 Feb 2000 13:57:07 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id KAA05474;
	Tue, 15 Feb 2000 10:50:31 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id KAA21090; Tue, 15 Feb 2000 10:52:22 -0800 (PST)
Resent-Date: Tue, 15 Feb 2000 10:52:22 -0800 (PST)
Message-Id: <s8a93de9.079@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.2.1
Date: Tue, 15 Feb 2000 11:51:57 -0700
From: "Mark Meredith" <MMEREDIT@novell.com>
To: "Jim Sermersheim" <JIMSE@novell.com>, <Kurt@OpenLDAP.org>
Cc: <ietf-ldapext@netscape.com>
Subject: Re: Vendor Info
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Resent-Message-ID: <"haHjDC.A.PJF.mBaq4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ietf.org id NAA18466

I had intended these to only be set by the developer of the server on compile time. I feel that if you are able to change the values then there is really not any better than not having the values, I would like to have some confidence that the information if provided is accurate according to what the developer put there is valid.

As for changing the wording . "If a client implementation does not recognize the specific vendorName or vendorVersion as one it recognizes, ..."
What word would you recomend to clarify recognize? Or how would you re-word it to take recognize out or make it more solid (clear).

-Mark

>>> "Kurt D. Zeilenga" <Kurt@OpenLDAP.org> 02/14/00 08:03PM >>>
At 07:12 PM 2/14/00 -0700, Jim Sermersheim wrote:
>>Section 5.
>>
>>If a server supports these attribute types, the values should
>>be overwritable by configuration.  This allows a server to
>>"spoof" clients to obtain desired behavior.
>
>Are you requesting that this wording be added to the draft? If so, why? Perhaps your should should've been a shouldn't?

I suggest using wording similiar to that found in the RFC 2616 (HTTP 1.1):
  Server implementors are encouraged to make the values of these
  attributes configurable options.

Note, they encourage suggest for security reasons.  Though quite valid,
I suggest it primarily for interoperability.  I've already seen folks
hack OpenLDAP to spoof other servers so that they could use some client
which inappropriately depended provided vendor information.  [In
believe the vendor ended up hacking their own server to spoof the
old version so that their client would work].

>>Clients should not attempt fuzzy matching.  They must only
>>enable workarounds when the server presents a vendor strings
>>known to evident of specific flaws.
>
>While this may be good advise, I don't see it as a requirement. If a client writer knows that versions 5.0 thru 5.x all exhibited a certain bug, and it was fixed in 6.0, it's reasonable for them to assume that a version substring of 5. will exhibit the bug.

No, because the vendor may, even after producing 6.0, produce a 5.y which fixes
the behavior.  This sometimes occurs because a large customer of the vendor
specifically requests a patch for the older version and the vendor complies.
It is not uncommon for a vendor to support and revise multiple versions
for significant time.

>>  They must assume that all
>>unknown vendor strings behavior per standard track specifications.
>
>Are you requesting that this wording be included in addition to, or in lieu of: "If a client implementation does not recognize the specific vendorName or vendorVersion as one it recognizes, then for the purposes of 'working around' anomalies, the client MUST assume that the server is complete and correct."?

I would prefer to clarify the term "recognize".



From list@netscape.com  Tue Feb 15 16:13:21 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA22967
	for <ldapext-archive@odin.ietf.org>; Tue, 15 Feb 2000 16:13:20 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id NAA12041;
	Tue, 15 Feb 2000 13:08:33 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id NAA09048; Tue, 15 Feb 2000 13:12:14 -0800 (PST)
Resent-Date: Tue, 15 Feb 2000 13:12:14 -0800 (PST)
Message-Id: <3.0.5.32.20000215131206.0092fbd0@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Tue, 15 Feb 2000 13:12:06 -0800
To: "Mark Meredith" <MMEREDIT@novell.com>
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Re: Vendor Info
Cc: "Jim Sermersheim" <JIMSE@novell.com>, <ietf-ldapext@netscape.com>
In-Reply-To: <s8a93de9.079@prv-mail20.provo.novell.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"KurfqC.A.GNC.sEcq4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 11:51 AM 2/15/00 -0700, Mark Meredith wrote:
>I had intended these to only be set by the developer of the server on compile time. I feel that if you are able to change the values then there is really not any better than not having the values, I would like to have some confidence that the information if provided is accurate according to what the developer put there is valid.

You have already dismissed the accuracy of the provided information:
   Client and application implementers must consider that
   the existence of a given value in the vendorName or vendorVersion
   attribute is no guarantee that the server was actually built by the
   asserted vendor or that its version is the asserted version and
   should act accordingly.

You'll note that most web servers have the HTTP product tags
defaults generated as part of their build system, but allow
the local administrator to override these values.  This gives
the flexibility to the local administrator which is where it
should be.

>As for changing the wording . "If a client implementation does not recognize the specific vendorName or vendorVersion as one it recognizes, ..."
>What word would you recomend to clarify recognize? Or how would you re-word it to take recognize out or make it more solid (clear).

Something like:

If the vendor string does not exactly match vendor information
known to flawed, the client MUST NOT alter its behavior.  The
client SHOULD NOT use "fuzzy" or "wildcard" matching of vendor
information to determine its behavior.



From list@netscape.com  Tue Feb 15 16:29:07 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA23340
	for <ldapext-archive@odin.ietf.org>; Tue, 15 Feb 2000 16:29:06 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id NAA14912;
	Tue, 15 Feb 2000 13:24:15 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id NAA19401; Tue, 15 Feb 2000 13:27:55 -0800 (PST)
Resent-Date: Tue, 15 Feb 2000 13:27:55 -0800 (PST)
Reply-To: <bobj@cup.hp.com>
From: "Bob Joslin" <bobj@cup.hp.com>
To: <kurt@openldap.org>
Cc: <ietf-ldapext@netscape.com>
Subject: Comments on draft-zeilenga-ldap-authpasswd-01.txt
Date: Tue, 15 Feb 2000 13:27:50 -0800
Message-ID: <008e01bf77f8$d976cea0$a6820d0f@cup.hp.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook 8.5, Build 4.71.2377.0
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2615.200
Importance: Normal
Resent-Message-ID: <"-zX3xD.A.2uE.aTcq4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Hi Kurt,

I have a few comments and questions about your draft.  I appreciate your
efforts to standardize this area.

3.  Background and Intended Use

  The authPassword attribute type is intended to be used to store hashed
  password values for authentication purposes.  The attribute type
  supports multiple storage schemes and provides an equality matching
  rule which allows clients to assert that a clear text password
  "matches" one of the attribute's values.  Storage schemes may make use
  of one-way hashing and encryption.

  The attribute may be used by LDAP servers to implement simple bind and
  SASL [RFC 2222] user/password mechanisms such as DIGEST-MD5 [DIGEST-
  MD5].

I may be a bit green in understanding DIGEST-MD5, but why would having an
already-hashed password help an LDAP server implement DIGEST-MD5 SASL binds?
Doesn't DIGEST-MD5 authentication require the server to generate a nonce
each time a bind is performed?  Thus, how is having a pre-hashed value
useful?


4.1. authPasswordSyntax

    ( authPasswordSyntaxOID
      DESC 'authentication password syntax' )

  Values of this syntax are encoded according to the following BNF:

    authPasswordValue = scheme "$" [ info ] "$" hashedValue
    scheme = <an IA5 string of letters, numbers, and "-", "_", and "/">
    info = <a base64 encoded value>
    hashedValue = <a base64 encoded value>

  where scheme describes the hash mechanism, info is a scheme specific,
  and hashedValue is the hashed value.  The info field is often a salt.

If the authPasswordSyntax requires a hashedValue, why not change the name
of the attribute to "hashPassword" instead of "authPassword?"  I would
think "hashPassword" would be a more descriptive name.  Besides, if I'm
not mistaken, the "authPassword" could not be used to perform DIGEST-MD5
authentication anyway.  (Please correct me if I don't understand this.)

5.      Schemes

  This section describes the "MD5", "SHA1", and "SASL/DIGEST-MD5".
  Other schemes may be defined by other documents.  Schemes starting
  with string "SASL/" indicate association with a SASL mechanism.
  Schemes which are not described by standard track documents SHOULD be
  named with a leading "X-" or, if associated with a SASL mechanism,
  "SASL/X-" to indicate they are a private or implementation specific
  extension.  Scheme names are case insensitive.

As Mark Smith pointed out, you omitted "crypt".  I reviewed your reply but
still think we would like to see your draft mention "crypt."  We work on a
project that implements RFC 2307.  Many of our customers would like to
be able to have a chose of security mechanisms, balancing that with
the functionality and security they receive.  Having a standard mention
this would increase the likelihood they'd have that choice.


Thanks.

Bob Joslin
Hewlett-Packard
bobj@cup.hp.com



From list@netscape.com  Tue Feb 15 16:39:53 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA23925
	for <ldapext-archive@odin.ietf.org>; Tue, 15 Feb 2000 16:39:52 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id NAA16332;
	Tue, 15 Feb 2000 13:34:43 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id NAA25025; Tue, 15 Feb 2000 13:38:24 -0800 (PST)
Resent-Date: Tue, 15 Feb 2000 13:38:24 -0800 (PST)
Date: Tue, 15 Feb 2000 15:37:38 -0600
From: Mark Wahl <M.Wahl@INNOSOFT.COM>
Subject: Re: Comments on draft-zeilenga-ldap-authpasswd-01.txt
In-reply-to: "Your message of Tue, 15 Feb 2000 13:27:50 PST."
 <008e01bf77f8$d976cea0$a6820d0f@cup.hp.com>
Sender: Mark.Wahl@INNOSOFT.COM
To: bobj@cup.hp.com
Cc: kurt@openldap.org, ietf-ldapext@netscape.com
Message-id: <26451.950650658@threadgill.austin.innosoft.com>
MIME-version: 1.0
X-Mailer: exmh version 2.0.2 2/24/98
Content-type: text/plain; charset=us-ascii
Resent-Message-ID: <"iENJ8.A.vGG.Pdcq4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


> I may be a bit green in understanding DIGEST-MD5, but why would having an
> already-hashed password help an LDAP server implement DIGEST-MD5 SASL binds?
> Doesn't DIGEST-MD5 authentication require the server to generate a nonce
> each time a bind is performed?  Thus, how is having a pre-hashed value
> useful?

You might want to take a look at draft-wahl-ldap-digest-example-00.txt, which
describes how one vendor implements DIGEST-MD5 with hashed passwords.

Mark Wahl, Directory Product Architect
Innosoft International, Inc.



From list@netscape.com  Tue Feb 15 17:14:43 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA25550
	for <ldapext-archive@odin.ietf.org>; Tue, 15 Feb 2000 17:14:43 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id OAA08359;
	Tue, 15 Feb 2000 14:12:10 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id OAA15524; Tue, 15 Feb 2000 14:14:01 -0800 (PST)
Resent-Date: Tue, 15 Feb 2000 14:14:01 -0800 (PST)
X-Authentication-Warning: perq.cac.washington.edu: rlmorgan owned process doing -bs
Date: Tue, 15 Feb 2000 14:14:39 -0800 (PST)
From: "RL 'Bob' Morgan" <rlmorgan@washington.edu>
X-Sender: rlmorgan@perq.cac.washington.edu
Reply-To: "RL 'Bob' Morgan" <rlmorgan@washington.edu>
To: LDAP extensions <ietf-ldapext@netscape.com>
Subject: draft-ietf-ldapext-ldapv3-tls-06.txt proposed change
In-Reply-To: <3.0.5.32.20000210101238.009a0100@infidel.boolean.net>
Message-ID: <Pine.LNX.4.19.99.0002151407150.24969-100000@perq.cac.washington.edu>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Resent-Message-ID: <"F1TCCC.A.SyD.o-cq4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


As Kurt has pointed out (and first pointed out back in November),
there is a difference between RFC 2251 and
draft-ietf-ldapext-ldapv3-tls-06.txt on the question of what the client
authentication/authorization state should be after a failed bind
attempt.  2251 (last paragraph of 4.2.1) says:

   Clients MAY send multiple bind requests on a connection to change
   their credentials.  A subsequent bind process has the effect of
   abandoning all operations outstanding on the connection.  (This
   simplifies server implementation.)  Authentication from earlier binds
   are subsequently ignored, and so if the bind fails, the connection
   will be treated as anonymous.

Call this the "revert-to-anonymous" approach.  Whereas ldapv3-tls-06
(first paragraph of 6.1.2.3) says:

  For either form of assertion, the server MUST verify that the client's
  authentication identity as supplied in its TLS credentials is permitted
  to be mapped to the asserted authorization identity. The server MUST
  reject the Bind operation with an invalidCredentials resultCode in the
  Bind response if the client is not so authorized. The LDAP association's
  authentication identity and authorization identity (if any) which were
  in effect after TLS establishment but prior to making the Bind request,
  MUST remain in force.

Call this the "leave-as-is" approach.  (The same language appears in
the second paragraph too.)

The intention never was to have different behavior for different kinds
of binds.  Some of us (Jeff and Bob) think that the leave-as-is
approach is the right thing to do for all failed binds, since it's
more intuitive (to us), consistent with other practice (eg "su" on
UNIX), and produces a cleaner state diagram.  However, upon reflection
these arguments don't seem compelling enough to change the behavior
that is in RFC 2251, especially at this point when a revised 2251
isn't even on the table.  We do think it's worthy of discussion when
2251 is revised, though.

We also don't want this issue to hold up the issuance of the set of
security docs (draft-ietf-ldapext-authmeth-04.txt,
draft-ietf-ldapext-ldapv3-tls-06, draft-leach-digest-sasl-05.txt)
which this WG has been working on for over two years, and which will
remove the IESG warning from the front of RFCs 2251-56.  These docs
have already been through WG and IETF last calls, and IESG review, and
are very close to going to RFC.

So, we propose that section 6.1.2.3 in draft-ietf-ldapext-ldapv3-tls-06
be changed to reflect the revert-to-anonymous approach; new text is
appended to this message.

This is a small but substantive change which will require a new (-07)
version of the ldapv3-tls draft.  Rather than go through another full
last call we suggest waiting a week from today for comments on this
change, then telling the Area Directors to go forward with
ldapv3-tls-07 for publication.

Comments, please.

 - RL "Bob" Morgan
   Jeff Hodges
   Mark Wahl

---

6.1.2.3.  Error Conditions

  For either form of assertion, the server MUST verify that the client's
  authentication identity as supplied in its TLS credentials is permitted
  to be mapped to the asserted authorization identity. The server MUST
  reject the Bind operation with an invalidCredentials resultCode in the
  Bind response if the client is not so authorized. 

  Additionally, with either form of assertion, if a TLS session has not
  been established between the client and server prior to making the SASL
  EXTERNAL Bind request and there is no other external source of authenti-
  cation credentials (e.g.  IP-level security RFC 1825), or if, during the
  process of establishing the TLS session, the server did not request the
  client's authentication credentials, the SASL EXTERNAL bind MUST fail
  with a result code of inappropriateAuthentication.

  After the above Bind operation failures, any client authentication
  and authorization state of the LDAP association is lost, so the LDAP
  association is in an anonymous state after the failure.  TLS
  connection state is unaffected, though a server MAY end the TLS
  connection, via a TLS close_notify message, based on the Bind
  failure (as it MAY at any time).




From list@netscape.com  Tue Feb 15 18:33:05 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA27500
	for <ldapext-archive@odin.ietf.org>; Tue, 15 Feb 2000 18:33:05 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id PAA20204;
	Tue, 15 Feb 2000 15:30:10 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id PAA24722; Tue, 15 Feb 2000 15:31:59 -0800 (PST)
Resent-Date: Tue, 15 Feb 2000 15:31:59 -0800 (PST)
Message-Id: <3.0.5.32.20000215153127.0096ce40@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Tue, 15 Feb 2000 15:31:27 -0800
To: <bobj@cup.hp.com>
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Re: Comments on draft-zeilenga-ldap-authpasswd-01.txt
Cc: <ietf-ldapext@netscape.com>
In-Reply-To: <008e01bf77f8$d976cea0$a6820d0f@cup.hp.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"Bs1q4D.A._BG.uHeq4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 01:27 PM 2/15/00 -0800, Bob Joslin wrote:
>I may be a bit green in understanding DIGEST-MD5, but why would having an
>already-hashed password help an LDAP server implement DIGEST-MD5 SASL binds?

DIGEST-MD5 is designed such that servers need not store the clear
text password; they may store a derived value instead.  The
authPassword draft describes how this derived value (with
other information useful in implementing the mechanism) may
be stored in the directory.  See DIGEST-MD5, Section 3.9.

>As Mark Smith pointed out, you omitted "crypt".  I reviewed your reply but
>still think we would like to see your draft mention "crypt."

This document is intended for the standard track.  Inclusion
of a crypt scheme, IMO, is incompatible with this intent for
reasons previously stated.  I beleive it appropriate to handle
introduction of a crypt scheme as an extension described by a
separate document not on the standard track.



From list@netscape.com  Tue Feb 15 21:15:49 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA00734
	for <ldapext-archive@odin.ietf.org>; Tue, 15 Feb 2000 21:15:48 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id SAA27998;
	Tue, 15 Feb 2000 18:10:57 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id SAA21802; Tue, 15 Feb 2000 18:14:38 -0800 (PST)
Resent-Date: Tue, 15 Feb 2000 18:14:38 -0800 (PST)
Message-Id: <3.0.5.32.20000215181413.00928980@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Tue, 15 Feb 2000 18:14:13 -0800
To: <bobj@cup.hp.com>
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: RE: Comments on draft-zeilenga-ldap-authpasswd-01.txt
Cc: ietf-ldapext@netscape.com
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"DXUmY.A.YUF.Nggq4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 04:28 PM 2/15/00 -0800, Bob Joslin wrote:
>I noticed you omitted the reply on the suggestion for changing the name of
>the attribute to hashPassword?  I assume you disagree with the suggestion?

I overlooked this suggestion.  See my comments below.

>4.1. authPasswordSyntax
>
>    ( authPasswordSyntaxOID
>      DESC 'authentication password syntax' )
>
>  Values of this syntax are encoded according to the following BNF:
>
>    authPasswordValue = scheme "$" [ info ] "$" hashedValue
>    scheme = <an IA5 string of letters, numbers, and "-", "_", and "/">
>    info = <a base64 encoded value>
>    hashedValue = <a base64 encoded value>
>
>  where scheme describes the hash mechanism, info is a scheme specific,
>  and hashedValue is the hashed value.  The info field is often a salt.
>
>If the authPasswordSyntax requires a hashedValue, why not change the name
>of the attribute to "hashPassword" instead of "authPassword?"

I intended to reword the section to not use the term "hash" but
to say the value stored a scheme specific.  The intent is for
this attribute to be capable of support a wide variety of
storage schemes used to support authentication via user passwords.

>I would think "hashPassword" would be a more descriptive name.

The primary usage of the attribute type is to support password
authentication mechanisms, hence the name "authPassword."



From list@netscape.com  Wed Feb 16 01:45:20 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id BAA10020
	for <ldapext-archive@odin.ietf.org>; Wed, 16 Feb 2000 01:45:19 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id WAA16910;
	Tue, 15 Feb 2000 22:40:26 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id WAA27520; Tue, 15 Feb 2000 22:44:06 -0800 (PST)
Resent-Date: Tue, 15 Feb 2000 22:44:06 -0800 (PST)
From: tgmd957@aol.com
Date: Tue, 15 Feb 2000 22:44:02 -0800 (PST)
Message-Id: <200002160644.WAA01491@xwing.netscape.com>
To: 45645@aol.com
Subject: Confidential !
Resent-Message-ID: <"PxnKv.A.utG.0ckq4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com



UNIVERSITY DIPLOMAS

Obtain a prosperous future, money earning power,
and the admiration of all.

Diplomas from prestigious non-accredited
universities based on your present knowledge
and life experience.

No required tests, classes, books, or interviews.

Bachelors, masters, MBA, and doctorate (PhD)
diplomas available in the field of your choice.

No one is turned down.

Confidentiality assured.

CALL NOW to receive your diploma
within days!!!

1-212-465-3248

Call 24 hours a day, 7 days a week, including
Sundays and holidays.


rem- member556@excite.com



From list@netscape.com  Wed Feb 16 10:23:49 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA01747
	for <ldapext-archive@odin.ietf.org>; Wed, 16 Feb 2000 10:23:42 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id HAA06356;
	Wed, 16 Feb 2000 07:20:32 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id HAA03131; Wed, 16 Feb 2000 07:22:05 -0800 (PST)
Resent-Date: Wed, 16 Feb 2000 07:22:05 -0800 (PST)
Message-ID: <38AAC04E.3814D36B@netscape.com>
Date: Wed, 16 Feb 2000 10:20:46 -0500
From: mcs@netscape.com (Mark C Smith)
Organization: iPlanet E-Commerce Solutions
X-Mailer: Mozilla 4.7 [en] (WinNT; U)
X-Accept-Language: en
MIME-Version: 1.0
To: "RL 'Bob' Morgan" <rlmorgan@washington.edu>
CC: LDAP extensions <ietf-ldapext@netscape.com>
Subject: Re: draft-ietf-ldapext-ldapv3-tls-06.txt proposed change
References: <Pine.LNX.4.19.99.0002151407150.24969-100000@perq.cac.washington.edu>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"jtlh1D.A.pw.cCsq4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

I support your proposal.  We definitely need to specify consistent
behavior in the face of failed binds (thanks to Kurt for noticing the
discrepancy).  I think it is too late to change LDAPv3's behavior (as
specified in 2251) since clients likely exist that rely on the
"revert-to-anonymous" behavior it specifies... but that is an argument
for another later day.

-- 
Mark Smith
Directory Product Development / iPlanet E-Commerce Solutions
My words are my own, not my employer's.            Got LDAP?



RL 'Bob' Morgan wrote:
> 
> As Kurt has pointed out (and first pointed out back in November),
> there is a difference between RFC 2251 and
> draft-ietf-ldapext-ldapv3-tls-06.txt on the question of what the client
> authentication/authorization state should be after a failed bind
> attempt.  2251 (last paragraph of 4.2.1) says:
> 
>    Clients MAY send multiple bind requests on a connection to change
>    their credentials.  A subsequent bind process has the effect of
>    abandoning all operations outstanding on the connection.  (This
>    simplifies server implementation.)  Authentication from earlier binds
>    are subsequently ignored, and so if the bind fails, the connection
>    will be treated as anonymous.
> 
> Call this the "revert-to-anonymous" approach.  Whereas ldapv3-tls-06
> (first paragraph of 6.1.2.3) says:
> 
>   For either form of assertion, the server MUST verify that the client's
>   authentication identity as supplied in its TLS credentials is permitted
>   to be mapped to the asserted authorization identity. The server MUST
>   reject the Bind operation with an invalidCredentials resultCode in the
>   Bind response if the client is not so authorized. The LDAP association's
>   authentication identity and authorization identity (if any) which were
>   in effect after TLS establishment but prior to making the Bind request,
>   MUST remain in force.
> 
> Call this the "leave-as-is" approach.  (The same language appears in
> the second paragraph too.)
> 
> The intention never was to have different behavior for different kinds
> of binds.  Some of us (Jeff and Bob) think that the leave-as-is
> approach is the right thing to do for all failed binds, since it's
> more intuitive (to us), consistent with other practice (eg "su" on
> UNIX), and produces a cleaner state diagram.  However, upon reflection
> these arguments don't seem compelling enough to change the behavior
> that is in RFC 2251, especially at this point when a revised 2251
> isn't even on the table.  We do think it's worthy of discussion when
> 2251 is revised, though.
> 
> We also don't want this issue to hold up the issuance of the set of
> security docs (draft-ietf-ldapext-authmeth-04.txt,
> draft-ietf-ldapext-ldapv3-tls-06, draft-leach-digest-sasl-05.txt)
> which this WG has been working on for over two years, and which will
> remove the IESG warning from the front of RFCs 2251-56.  These docs
> have already been through WG and IETF last calls, and IESG review, and
> are very close to going to RFC.
> 
> So, we propose that section 6.1.2.3 in draft-ietf-ldapext-ldapv3-tls-06
> be changed to reflect the revert-to-anonymous approach; new text is
> appended to this message.
> 
> This is a small but substantive change which will require a new (-07)
> version of the ldapv3-tls draft.  Rather than go through another full
> last call we suggest waiting a week from today for comments on this
> change, then telling the Area Directors to go forward with
> ldapv3-tls-07 for publication.
> 
> Comments, please.
> 
>  - RL "Bob" Morgan
>    Jeff Hodges
>    Mark Wahl
> 
> ---
> 
> 6.1.2.3.  Error Conditions
> 
>   For either form of assertion, the server MUST verify that the client's
>   authentication identity as supplied in its TLS credentials is permitted
>   to be mapped to the asserted authorization identity. The server MUST
>   reject the Bind operation with an invalidCredentials resultCode in the
>   Bind response if the client is not so authorized.
> 
>   Additionally, with either form of assertion, if a TLS session has not
>   been established between the client and server prior to making the SASL
>   EXTERNAL Bind request and there is no other external source of authenti-
>   cation credentials (e.g.  IP-level security RFC 1825), or if, during the
>   process of establishing the TLS session, the server did not request the
>   client's authentication credentials, the SASL EXTERNAL bind MUST fail
>   with a result code of inappropriateAuthentication.
> 
>   After the above Bind operation failures, any client authentication
>   and authorization state of the LDAP association is lost, so the LDAP
>   association is in an anonymous state after the failure.  TLS
>   connection state is unaffected, though a server MAY end the TLS
>   connection, via a TLS close_notify message, based on the Bind
>   failure (as it MAY at any time).



From list@netscape.com  Wed Feb 16 12:20:15 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA07064
	for <ldapext-archive@odin.ietf.org>; Wed, 16 Feb 2000 12:20:12 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id JAA29514;
	Wed, 16 Feb 2000 09:15:33 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id JAA14583; Wed, 16 Feb 2000 09:19:15 -0800 (PST)
Resent-Date: Wed, 16 Feb 2000 09:19:15 -0800 (PST)
Message-Id: <3.0.5.32.20000216091841.00998100@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Wed, 16 Feb 2000 09:18:41 -0800
To: "RL 'Bob' Morgan" <rlmorgan@washington.edu>
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Re: draft-ietf-ldapext-ldapv3-tls-06.txt proposed change
Cc: LDAP extensions <ietf-ldapext@netscape.com>
In-Reply-To: <Pine.LNX.4.19.99.0002151407150.24969-100000@perq.cac.washi
 ngton.edu>
References: <3.0.5.32.20000210101238.009a0100@infidel.boolean.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"Ck3ZKC.A.hjD.Swtq4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Bob, Jeff, MarkW,

The suggested change to the TLS draft appears to be fine.  Note
that the AuthMeth draft will need a similar change (last sentence
of section 10).

Though I too would like to see these drafts progressed quickly,
we must not be too hasty.  As you noted, the change is
"substantive."  As such, I believe it prudent to have yet another
WG last call.  I also believe it quite likely that the IESG will
require another IETF wide last call because the documents were
revised multiple times, including a number of "substantive"
changes, multiple subsequent WG last calls were made after
the IETF wide last call, and just the fact that the previous
IETF wide call completed some time ago.

	Kurt




From list@netscape.com  Wed Feb 16 12:28:33 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA07374
	for <ldapext-archive@odin.ietf.org>; Wed, 16 Feb 2000 12:28:28 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id JAA01073;
	Wed, 16 Feb 2000 09:23:38 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id JAA18233; Wed, 16 Feb 2000 09:27:15 -0800 (PST)
Resent-Date: Wed, 16 Feb 2000 09:27:15 -0800 (PST)
Date: Wed, 16 Feb 2000 11:26:27 -0600
From: Mark Wahl <M.Wahl@INNOSOFT.COM>
Subject: Re: draft-ietf-ldapext-ldapv3-tls-06.txt proposed change
In-reply-to: "Your message of Wed, 16 Feb 2000 09:18:41 PST."
 <3.0.5.32.20000216091841.00998100@infidel.boolean.net>
Sender: Mark.Wahl@INNOSOFT.COM
To: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Cc: "RL 'Bob' Morgan" <rlmorgan@washington.edu>,
        LDAP extensions <ietf-ldapext@netscape.com>
Message-id: <28806.950721987@threadgill.austin.innosoft.com>
MIME-version: 1.0
X-Mailer: exmh version 2.0.2 2/24/98
Content-type: text/plain; charset=us-ascii
Resent-Message-ID: <"3tboHD.A.WcE.x3tq4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


Once the LDAPEXT review is done, the Apps Area Directors will let us know what 
to do next with the draft.  I'll let the list know what the result is.

Mark Wahl, Directory Product Architect
Innosoft International, Inc.



From list@netscape.com  Wed Feb 16 13:08:00 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA08711
	for <ldapext-archive@odin.ietf.org>; Wed, 16 Feb 2000 13:07:57 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id KAA29428;
	Wed, 16 Feb 2000 10:04:43 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id KAA07717; Wed, 16 Feb 2000 10:06:36 -0800 (PST)
Resent-Date: Wed, 16 Feb 2000 10:06:36 -0800 (PST)
Message-Id: <3.0.5.32.20000216100620.0096c200@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Wed, 16 Feb 2000 10:06:20 -0800
To: "Salter, Thomas A" <Thomas.Salter@unisys.com>
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: RE: RFC2251: unbind
Cc: ietf-ldapext@netscape.com
In-Reply-To: <EB21C070AA75D311A0AC0090271EC45C01577176@us-tr-exch-1.tr.u
 nisys.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"A9ovB.A.-3B.qcuq4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 09:17 AM 2/15/00 -0500, Salter, Thomas A wrote:
>I'd prefer a protocol where only one side could initiate the normal
>shutdown.

From the LDAP perspective, this is what we have.  The client
initiates normal shutdown by issuing an unbind request.  The
problem is that specification doesn't not mandate a particular
action after sending or receiving an unbind request.

>In this case the server should do that as a response to the
>unbind.

That response, IMO, should be to terminate the underlying TCP
session.

>The client should close in response to server-initiated close.

I believe it appropriate for the client to close the connection
as well.  The server can determine if the shutdown was ordered
or not by receipt of the unbind request.

>This would eliminate the various race conditions that exist otherwise and
>make it easier to tell normal conditions from error conditions.

I believe the race conditions that were noted have to do with
handling of outstanding requests on the server side.  Shutdown
when multiple outstanding operations are being processed is a
bit tricky but quite managable.


I believe the basic protocol is fine.  I think the problem is
just a matter of specification.  The specification should
describe an "LDAP Session" and how it relates to the underlying
transport protocol.  The document should describe how a
LDAP Session is initiated (by establishment of the underlying
transport protocol) and how an LDAP Session is terminated (by
shutdown of the underlying transport protocol). 

It should be careful not to imply that bind initiates a protocol
session and that unbind does not un-do a bind.


> > -----Original Message-----
> > From: Kurt D. Zeilenga [mailto:Kurt@OpenLDAP.org]
> > Sent: Monday, February 14, 2000 5:41 PM
> > To: ietf-ldapext@netscape.com
> > Subject: Re: RFC2251: unbind
> > 
> > 
> > At 08:41 AM 2/14/00 -0800, Kurt D. Zeilenga wrote:
> > >It seems that some folks are confused about the function of
> > >unbind.  We've likely have all heard the "don't I need to unbind
> > >before rebinding" enquiry.   Some have even noted that the
> > >disconnection requirements are MAY, not MUSTs.  Some have any
> > >stated that some servers do not terminate the connection upon
> > >receipt of an unbind request.
> > >
> > >It seems that some implementors don't take "The function of the
> > >Unbind Operation is to terminate a protocol session" as an absolute.
> > >
> > >I would suggest that the paragraph following this sentence
> > >for clarification:
> > >	A client SHALL NOT submit further requests after
> > >	sending an unbind request.  A client SHOULD terminate
> > >	the underlying TCP session after making the unbind
> > >	request.
> > >	A server SHALL NOT process nor respond to further
> > >	requests received after an unbind requests.  A
> > >	server SHOULD terminate the underlying TCP session
> > >	after receiving the unbind request.
> > 
> > Note that the existing paragraph allows the client to wait
> > for the server to initiate the TCP shutdown AND allows the
> > server to wait for the client to initiate the TCP shutdown.
> > There really should be at least one SHALL detailing who
> > must shutdown the connection and when. 
> > 
> > I revise my suggestion:
> > 	The client SHALL terminate the underlying connection
> > 	after submitting an unbind request.
> > 
> > 	The server SHALL terminate the underlying connection
> > 	upon receipt of an unbind request.
> > 
> > Comments?
> > 
>
>



From list@netscape.com  Thu Feb 17 11:26:20 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA17101
	for <ldapext-archive@odin.ietf.org>; Thu, 17 Feb 2000 11:26:16 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id IAA10531;
	Thu, 17 Feb 2000 08:20:12 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id IAA24330; Thu, 17 Feb 2000 08:23:47 -0800 (PST)
Resent-Date: Thu, 17 Feb 2000 08:23:47 -0800 (PST)
Message-Id: <200002171623.LAA17018@ietf.org>
To: IETF-Announce: ;
Cc: RFC Editor <rfc-editor@isi.edu>
Cc: Internet Architecture Board <iab@isi.edu>
Cc: ietf-ldapext@netscape.com
From: The IESG <iesg-secretary@ietf.org>
Subject: Document Action: Access Control Requirements for LDAP to
	 Informational
Date: Thu, 17 Feb 2000 11:23:17 -0500
Sender: scoya@cnri.reston.va.us
Resent-Message-ID: <"1bIbu.A.47F.RCCr4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com



The IESG has approved the Internet-Draft 'Access Control Requirements
for LDAP' <draft-ietf-ldapext-acl-reqts-03.txt> as an Informational
RFC.  This document is the product of the LDAP Extension Working
Group.

The IESG contact persons are Keith Moore and Patrik Faltstrom.



From list@netscape.com  Thu Feb 17 14:38:19 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA22780
	for <ldapext-archive@odin.ietf.org>; Thu, 17 Feb 2000 14:38:16 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id LAA08489;
	Thu, 17 Feb 2000 11:33:24 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id LAA11390; Thu, 17 Feb 2000 11:07:51 -0800 (PST)
Resent-Date: Thu, 17 Feb 2000 11:07:51 -0800 (PST)
Message-ID: <38AC46BA.71EA48A4@netscape.com>
Date: Thu, 17 Feb 2000 14:06:34 -0500
From: mcs@netscape.com (Mark C Smith)
Organization: iPlanet E-Commerce Solutions
X-Mailer: Mozilla 4.7 [en] (WinNT; U)
X-Accept-Language: en
MIME-Version: 1.0
To: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
CC: ietf-ldapext@netscape.com
Subject: Re: ACL model comments
References: <3.0.5.32.20000214215708.00936dc0@infidel.boolean.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"h82yW.A.8wC.FcEr4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

"Kurt D. Zeilenga" wrote:
> 
> Though I haven't had time to do a full review, I can offer
> a few comments:
> 
> Section 6.3
> 
> The 'aci' attribute is defined as a user, not operational,
> attribute type.  Besides being appropriate in terms of usage,
> this would allow this attribute type in any and all
> object classes.  If usage is left as user, you'd likely
> have to define an auxiliary objectclass to allow mix in
> or replace 'top' or something.

I agree that the attribute type used to store access control information
should be operational.  X.500's various access control attribute types
are defined with "USAGE directoryOperation" which seems right to me.

I would also like to see us choose a different name for the attribute
type.  An attribute called 'aci' has been used in the Netscape/iPlanet
Directory Server for several years now to hold proprietary access
control information.  See:

 
http://home.netscape.com/eng/server/directory/schema/attribu4.htm#1717762

I admit that 'aci' was not a good name for Netscape to use, but I
suggest we use a name like 'ldapACI' for the new standard scheme to
avoid confusion (unless someone else is already using that name too!).

-- 
Mark Smith
Directory Product Development / iPlanet E-Commerce Solutions
My words are my own, not my employer's.            Got LDAP?



From list@netscape.com  Thu Feb 17 15:25:27 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA23625
	for <ldapext-archive@odin.ietf.org>; Thu, 17 Feb 2000 15:25:26 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id MAA14428;
	Thu, 17 Feb 2000 12:20:28 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id MAA18249; Thu, 17 Feb 2000 12:24:12 -0800 (PST)
Resent-Date: Thu, 17 Feb 2000 12:24:12 -0800 (PST)
Message-Id: <200002172023.PAA23598@ietf.org>
To: IETF-Announce: ;
Cc: RFC Editor <rfc-editor@isi.edu>
Cc: Internet Architecture Board <iab@isi.edu>
Cc: ietf-ldapext@netscape.com
From: The IESG <iesg-secretary@ietf.org>
Subject: Protocol Action: Authentication Methods for LDAP to Proposed
	 Standard
Date: Thu, 17 Feb 2000 15:23:43 -0500
Sender: scoya@cnri.reston.va.us
Resent-Message-ID: <"d21i7.A.3cE.qjFr4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com



The IESG has approved publication of the following Internet-Drafts
as Proposed Standards:

o Authentication Methods for LDAP
	<draft-ietf-ldapext-authmeth-04.txt>

o Lightweight Directory Access Protocol (v3):  Extension for 
  Transport Layer Security <draft-ietf-ldapext-ldapv3-tls-06.txt> 

o Using Digest Authentication as a SASL Mechanism 
	<draft-leach-digest-sasl-05.txt>

These documents are the product of the LDAP Extension Working Group.
The IESG contact persons are Keith Moore and Patrik Faltstrom.

 
Technical Summary
 
  These documents add basic security mechanisms to the LDAPv3 protocol.
  They define the use of SASL mechanisms and TLS together with LDAPv3,
  as well as the usage of HTTP Digest as one SASL mechanism.

Working Group Summary

  The path the working group followed until landing at SASL and TLS as
  the final mechanisms was long and winding. When SASL was up on the
  table though, the choices were quite easy, and consensus was easy to
  get.

Protocol Quality

  The spec is reviewed by Patrik Faltstrom.


Note to the RFC-Editor:

In the draft-leach-digest-sasl-03.txt document, please see that the 
intro to the I-D boilerplate is deleted (together with the I-D 
boilerplate). The document has  been discussed in a working group, 
even though it has not been part of the wg charter (there is though a 
normative reference to this document from a wg one). The wg in 
question (LDAPEXT) do have consensus over this document.

The text that should explicitely be removed from the I-D is the 
beginning of the document, reading:

	THIS IS A PRELIMINARY DRAFT OF AN INTERNET-DRAFT.  IT DOES NOT REPRESENT
	THE CONSENSUS OF ANY WORKING GROUP.

In draft-ietf-ldapext-authmeth, please change the text of the last paragraph of section 6 as follows:

--- OLD TEXT 

   If a SASL security layer is negotiated, the client MUST discard all
   information about the server fetched prior to SASL.  In particular, if
   the client is configured to support multiple SASL mechanisms, it SHOULD
   fetch supportedSASLMechanisms both before and after the SASL security
   layer is negotiated and verify that the value has not changed after the
   SASL security layer was negotiated.  This detects active attacks which
   remove supported SASL mechanisms from the supportedSASLMechanisms list.

--- END

--- NEW TEXT

   If a SASL security layer is negotiated, the client MUST discard all
   information about the server fetched prior to SASL.  In particular, if
   the client is configured to support multiple SASL mechanisms, it SHOULD
   fetch supportedSASLMechanisms both before and after the SASL security
   layer is negotiated and verify that the value has not changed after the
   SASL security layer was negotiated.  This detects active attacks which
   remove supported SASL mechanisms from the supportedSASLMechanisms list,
   and allows the client to ensure that it is using the best mechanism
   supported by both client and server (additionally, this is a SHOULD to
   allow for environments where the supported SASL mechanisms list is
   provided to the client through a different trusted source, e.g. as part
   of a digitally signed object).

--- END



From list@netscape.com  Thu Feb 17 17:22:11 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA26290
	for <ldapext-archive@odin.ietf.org>; Thu, 17 Feb 2000 17:22:09 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id OAA28499;
	Thu, 17 Feb 2000 14:17:18 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id OAA00410; Thu, 17 Feb 2000 14:21:03 -0800 (PST)
Resent-Date: Thu, 17 Feb 2000 14:21:03 -0800 (PST)
Message-ID: <38AC7458.9BB98D4E@us.oracle.com>
Date: Thu, 17 Feb 2000 14:21:13 -0800
From: Saurabh Shrivastava <sshrivas@us.oracle.com>
Reply-To: sshrivas@us.oracle.com
Organization: Oracle Corp.
X-Mailer: Mozilla 4.61 [en] (WinNT; I)
X-Accept-Language: en
MIME-Version: 1.0
To: ietf-ldapext@netscape.com
Subject: Named Referrals in LDAP Directories
Content-Type: multipart/mixed;
 boundary="------------B4815A596AF99D24508E8037"
Resent-Message-ID: <"Bd2XSD.A.6F.NRHr4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

This is a multi-part message in MIME format.
--------------B4815A596AF99D24508E8037
Content-Type: text/html; charset=us-ascii
Content-Transfer-Encoding: 7bit

<!doctype html public "-//w3c//dtd html 4.0 transitional//en">
<html>
As per Section 5.1.1.3 of this draft (Search with one level scope)
<br>&nbsp;&nbsp;&nbsp; 'For search operations, once the base object has
been found and determined not to contain a ref attribute, the search may
progress. Any entries matching the filter and scope of the search that
do NOT contain a ref attribute are returned to the client normally as described
in&nbsp; [RFC2251]. Any entries matching the filter and one level scope
that do contain a ref attribute must be returned as referrals as described
here.'
<p>The later part of the above paragraph states that&nbsp; 'Any entries
matching the filter and one level scope that contain a ref attribute'.&nbsp;
Here, an entry containing the ref attribute may not match with the filter
specified in the one level search operation even though it is present in
the scope of the search. In this case should the ldap server, return a
referral as the referral entry is in the scope of the search even though
the filter does not match? The same issues arises in section 5.1.1.4 of
the draft.
<p>I would really appreciate any clarification on the above issue.
<p>Thanks in advance for all your help.
<p>Regards,
<p>Saurabh Shrivastava</html>

--------------B4815A596AF99D24508E8037
Content-Type: text/x-vcard; charset=us-ascii;
 name="sshrivas.vcf"
Content-Description: Card for Saurabh Shrivastava
Content-Disposition: attachment;
 filename="sshrivas.vcf"
Content-Transfer-Encoding: 7bit

begin:vcard 
n:Shrivastava;Saurabh 
tel;work:650-506-6815
x-mozilla-html:TRUE
org:Oracle Corporation
version:2.1
email;internet:sshrivas@us.oracle.com
title:Sr. Member of Technical staff
adr;quoted-printable:;;500 Oracle Parkway=0D=0A6OP643;Redwood Shores;CA;94404;USA
x-mozilla-cpt:;0
fn:Saurabh  Shrivastava
end:vcard

--------------B4815A596AF99D24508E8037--



From list@netscape.com  Thu Feb 17 20:45:08 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA28942
	for <ldapext-archive@odin.ietf.org>; Thu, 17 Feb 2000 20:45:08 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id RAA14608;
	Thu, 17 Feb 2000 17:42:08 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id RAA10578; Thu, 17 Feb 2000 17:44:03 -0800 (PST)
Resent-Date: Thu, 17 Feb 2000 17:44:03 -0800 (PST)
Message-Id: <s8ac4166.012@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.3.1
Date: Thu, 17 Feb 2000 18:43:40 -0700
From: "Jim Sermersheim" <JIMSE@novell.com>
To: <ietf-ldapext@netscape.com>
Subject: Comments on draft-zeilenga-ldap-authpasswd-01.txt
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Resent-Message-ID: <"L08S3.A.MkC.hPKr4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ietf.org id UAA28942

First a minor consistency issue:
Section 3 says "The attribute may be used by LDAP servers to implement simple bind and  SASL ..."
Section 7 says "This document describes how authentication information to support simple password authentication ..."
(Section 7 is missing and SASL ...)

Then I've got some questions regarding implementation details.

The wording of the first sentence of Section 6 is a bit confusing: "Servers MAY restrict schemes used to support a particular authentication process but SHOULD use all values of those schemes." What does "use all values of those schemes" mean? I'm guessing that it should read "use all values of those schemes which are supported", but I'm not sure. It would also help to qualify the word use.

The authPassword attribute is defined as multi-valued. Then there is an indication of what makes up the set of values: "The values of this abbribute[SIC] are derived from the user's password per the indicated scheme". The implication (based on the singularity of the word password) is that though this attribute may hold many values, each value is a different representation (different hash) of a _single_ password. If this is the case, I'm reading a lot into the draft that isn't there yet. If it's not the case, and the intent is that this attribute can hold an arbitrary number of different passwords, there are security holes that need to be talked about in the Security Considerations section. I don't want to go down both paths in this message. I'll wait for the reply as to the intent of allowing multiple values first.

How is the attribute populated? It's a user attribute which leads me to believe that the client is responsible to populate/update it. If so, the client would (should) have to populate/re-populate each value in the attribute, right? It seems like this could be achieved in a much more secure and consistent way if there was a server side mechanism for creating and updating values of this attribute.

Jim



From list@netscape.com  Fri Feb 18 00:31:37 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA03746
	for <ldapext-archive@odin.ietf.org>; Fri, 18 Feb 2000 00:31:37 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id VAA00858;
	Thu, 17 Feb 2000 21:28:22 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id VAA28108; Thu, 17 Feb 2000 21:30:12 -0800 (PST)
Resent-Date: Thu, 17 Feb 2000 21:30:12 -0800 (PST)
Message-Id: <3.0.5.32.20000217213001.0094d450@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Thu, 17 Feb 2000 21:30:01 -0800
To: "Jim Sermersheim" <JIMSE@novell.com>
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Re: Comments on draft-zeilenga-ldap-authpasswd-01.txt
Cc: <ietf-ldapext@netscape.com>
In-Reply-To: <s8ac4166.012@prv-mail20.provo.novell.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"1XCE7.A.62G.jjNr4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 06:43 PM 2/17/00 -0700, Jim Sermersheim wrote:
>First a minor consistency issue:
>Section 3 says "The attribute may be used by LDAP servers to implement simple bind and  SASL ..."
>Section 7 says "This document describes how authentication information to support simple password authentication ...

The intent is to allow the attribute to be used to support password
based authentication, whether simple bind, SASL, or whatever.
I'll attempt to clarify in next draft.

>
>Then I've got some questions regarding implementation details.
>
>The wording of the first sentence of Section 6 is a bit confusing: "Servers MAY restrict schemes used to support a particular authentication process but SHOULD use all values of those schemes."  What does "use all values of those schemes" mean?  I'm guessing that it should read "use all values of those schemes which are supported", but I'm not sure. It would also help to qualify the word use.

The intent is that an authentication process which uses X, Y, and
Z schemes should use all values of scheme X, Y, and Z.

I'll try to clarify this as well.

>The authPassword attribute is defined as multi-valued. Then there is an indication of what makes up the set of values: "The values of this abbribute[SIC] are derived from the user's password per the indicated scheme".
The implication (based on the singularity of the word password) is that though this attribute may hold many values, each value is a different representation (different hash) of a _single_ password. If this is the case, I'm reading a lot into the draft that isn't there yet. If it's not the case, and the intent is that this attribute can hold an arbitrary number of different passwords, there are security holes that need to be talked about in the Security Considerations section.

I intended was the later, user's password(s), I'll add some
clarification and a security consideration.  It's my intent
is that this attribute be used instead of userPassword,
userPassword allows multiple values.

>How is the attribute populated? It's a user attribute which leads me to believe that the client is responsible to populate/update it.

Yes.  The attribute type implies no special behavior.  It's
my intention that mechanisms would be introduced (in other
drafts) to provide additional behavior.

>If so, the client would (should) have to populate/re-populate each value in the attribute, right?

Yes... or use a separated defined mechanism.   Note, it is
intended that password change be initiated by a client
acting on behalf of the user (or the directory admin).

>It seems like this could be achieved in a much more secure
and consistent way if there was a server side mechanism for creating and updating values of this attribute.

I personally favor use of an extended operation to provide
clients with consistent behavior irregardless of the
storage used for passwords.  I've introduced such in
my passwd-exop draft, it may be used with userPassword,
authPassword, and/or external password storage.  Security,
of course, is based on a number of factors.  I generally
recommend the clear separation of private/secret and public
data.  I prefer (when using password based authentication)
external password storage like that provided by independent
SASL service providors).



From list@netscape.com  Fri Feb 18 01:04:49 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id BAA04429
	for <ldapext-archive@odin.ietf.org>; Fri, 18 Feb 2000 01:04:48 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id VAA07986;
	Thu, 17 Feb 2000 21:59:13 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id WAA04345; Thu, 17 Feb 2000 22:02:58 -0800 (PST)
Resent-Date: Thu, 17 Feb 2000 22:02:58 -0800 (PST)
Message-Id: <3.0.5.32.20000217220450.00927780@pop.walltech.com>
X-Sender: bgreenblatt@pop.walltech.com
X-Mailer: QUALCOMM Windows Eudora Light Version 3.0.5 (32)
Date: Thu, 17 Feb 2000 22:04:50 -0800
To: ietf-ldapext@netscape.com
From: Bruce Greenblatt <bgreenblatt@directory-applications.com>
Subject: Re: draft-mmeredith-rootdse-vendor-info-02.txt
Cc: mark_meredith@novell.com
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"O0Dv3D.A.lDB.RCOr4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

To be blunt, I don't believe that there is much use for this draft.  The
information that it proposes to add to the Root DSE is already published is
already available from SNMP if the LDAP server conforms to RFC 2248.  The
applVersion field of the MIB is useful here.  I think that this draft
should just point to RFC 2248 (and perhaps 2605) and explain where the
vendor information should be placed.  These are already standards track
documents, and have places to put the information that this draft defines.
(Just my $0.02 worth)

 Bruce
==============================================
Bruce Greenblatt, Ph. D.
Directory Tools and Application Services, Inc.
http://www.directory-applications.com



From list@netscape.com  Fri Feb 18 09:11:50 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA23566
	for <ldapext-archive@odin.ietf.org>; Fri, 18 Feb 2000 09:11:48 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id GAA02437;
	Fri, 18 Feb 2000 06:08:41 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id GAA26437; Fri, 18 Feb 2000 06:10:32 -0800 (PST)
Resent-Date: Fri, 18 Feb 2000 06:10:32 -0800 (PST)
From: "Peter Strong" <pestrong@nortelnetworks.com>
To: Bruce Greenblatt <bgreenblatt@directory-applications.com>,
        ietf-ldapext <ietf-ldapext@netscape.com>
Cc: mark_meredith <mark_meredith@novell.com>
Subject: RE: draft-mmeredith-rootdse-vendor-info-02.txt
Date: Fri, 18 Feb 2000 09:13:02 -0500
Message-ID: <001201bf7a1a$449a6250$3750fb8d@net-pstrong.corpnorth.baynetworks.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook 8.5, Build 4.71.2173.0
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V4.72.3110.3
In-Reply-To: <3.0.5.32.20000217220450.00927780@pop.walltech.com>
Resent-Message-ID: <"QAH6bD.A.tcG.WLVr4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit



> -----Original Message-----
> From: Bruce Greenblatt [mailto:bgreenblatt@directory-applications.com]
> Sent: Friday, February 18, 2000 1:05 AM
> To: ietf-ldapext@netscape.com
> Cc: mark_meredith@novell.com
> Subject: Re: draft-mmeredith-rootdse-vendor-info-02.txt
>
>
> To be blunt, I don't believe that there is much use for this draft.

For those of us who attempt to build applications that work with
multiple directory implementations, this information is very useful.

> The information that it proposes to add to the Root DSE is already
> published is
> already available from SNMP if the LDAP server conforms to RFC 2248.  The
> applVersion field of the MIB is useful here.  I think that this draft
> should just point to RFC 2248 (and perhaps 2605) and explain where the
> vendor information should be placed.  These are already standards track
> documents, and have places to put the information that this draft defines.
> (Just my $0.02 worth)

The products we build are LDAP clients, not SNMP clients.

This information should be available via LDAP.

>
>  Bruce
> ==============================================
> Bruce Greenblatt, Ph. D.
> Directory Tools and Application Services, Inc.
> http://www.directory-applications.com
>

------------------------------------------------------------------------
Peter Strong
Software Architect
Nortel Networks - Optivity Policy Services (OPS) and NetID
pestrong@nortelnetworks.com <mailto:pestrong@nortelnetworks.com>
(613) 831-6615






From list@netscape.com  Fri Feb 18 11:32:22 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA26499
	for <ldapext-archive@odin.ietf.org>; Fri, 18 Feb 2000 11:32:19 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id IAA19813;
	Fri, 18 Feb 2000 08:27:22 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id IAA08712; Fri, 18 Feb 2000 08:31:08 -0800 (PST)
Resent-Date: Fri, 18 Feb 2000 08:31:08 -0800 (PST)
Message-Id: <3.0.5.32.20000218083612.0092ad30@pop.walltech.com>
X-Sender: bgreenblatt@pop.walltech.com
X-Mailer: QUALCOMM Windows Eudora Light Version 3.0.5 (32)
Date: Fri, 18 Feb 2000 08:36:12 -0800
To: ietf-ldapext <ietf-ldapext@netscape.com>
From: Bruce Greenblatt <bgreenblatt@directory-applications.com>
Subject: RE: draft-mmeredith-rootdse-vendor-info-02.txt
Cc: mark_meredith <mark_meredith@novell.com>
In-Reply-To: <001201bf7a1a$449a6250$3750fb8d@net-pstrong.corpnorth.bayne
 tworks.com>
References: <3.0.5.32.20000217220450.00927780@pop.walltech.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"bneL3.A.7GC.JPXr4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 09:13 AM 2/18/00 -0500, Peter Strong wrote:
>
>>
>>
>> To be blunt, I don't believe that there is much use for this draft.
>
>For those of us who attempt to build applications that work with
>multiple directory implementations, this information is very useful.
>

The information may be useful.  I never said that it wasn't.  I said that
it's already available someplace else.  Get it from there, since that is
already a standards track RFC.  I don't see much point in duplicating this
information.  In my opinion, a good internet directory client will get
information from a variety of internet servers: DNS, LDAP, SNMP, and others.

>> The information that it proposes to add to the Root DSE is already
>> published is
>> already available from SNMP if the LDAP server conforms to RFC 2248.  The
>> applVersion field of the MIB is useful here.  I think that this draft
>> should just point to RFC 2248 (and perhaps 2605) and explain where the
>> vendor information should be placed.  These are already standards track
>> documents, and have places to put the information that this draft defines.
>> (Just my $0.02 worth)
>
>The products we build are LDAP clients, not SNMP clients.
>
>This information should be available via LDAP.
>
>>
>>  Bruce
>> ==============================================
>> Bruce Greenblatt, Ph. D.
>> Directory Tools and Application Services, Inc.
>> http://www.directory-applications.com
>>
>
>------------------------------------------------------------------------
>Peter Strong
>Software Architect
>Nortel Networks - Optivity Policy Services (OPS) and NetID
>pestrong@nortelnetworks.com <mailto:pestrong@nortelnetworks.com>
>(613) 831-6615
>
>
>
>
>
>
==============================================
Bruce Greenblatt, Ph. D.
Directory Tools and Application Services, Inc.
http://www.directory-applications.com



From list@netscape.com  Fri Feb 18 12:18:14 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA27442
	for <ldapext-archive@odin.ietf.org>; Fri, 18 Feb 2000 12:18:12 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id JAA26258;
	Fri, 18 Feb 2000 09:13:13 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id JAA27405; Fri, 18 Feb 2000 09:16:53 -0800 (PST)
Resent-Date: Fri, 18 Feb 2000 09:16:53 -0800 (PST)
Message-Id: <s8ad1c09.087@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.3.1
Date: Fri, 18 Feb 2000 10:16:30 -0700
From: "Jim Sermersheim" <JIMSE@novell.com>
To: <Kurt@OpenLDAP.org>
Cc: <ietf-ldapext@netscape.com>
Subject: Re: Comments on draft-zeilenga-ldap-authpasswd-01.txt
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Resent-Message-ID: <"IOHqLB.A.rrG.C6Xr4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ietf.org id MAA27442

>>> "Kurt D. Zeilenga" <Kurt@OpenLDAP.org> 2/17/00 10:30:01 PM >>>
>>The wording of the first sentence of Section 6 is a bit confusing: "Servers MAY restrict schemes used to support a particular authentication process but SHOULD use all values of those schemes."  What does "use all values of those schemes" mean?  I'm guessing that it should read "use all values of those schemes which are supported", but I'm not sure. It would also help to qualify the word use.
>
>The intent is that an authentication process which uses X, Y, and
>Z schemes should use all values of scheme X, Y, and Z.

So let's say a client performs a simple authentication and sends a clear text password to the server. Are you saying that if the server's authentication process uses X, Y, and Z schemes, it should hash the password with X, then challenge the result against all values of the X scheme, then apply this same process to the password using Y, and Z? If so, what has to match for authentication to happen? I could imagine: 1) all values must match, 2) one value of each scheme has to match, 3) one value of any scheme has to match.

>I intended was the later, user's password(s), I'll add some
>clarification and a security consideration.  It's my intent
>is that this attribute be used instead of userPassword,
>userPassword allows multiple values.

Bummer. This opens up security holes and makes the application of password policy difficult and bulky. I know userPassword allows multiple values, but I've never understood why. I'd like to understand what the reasons are before following the pattern.

>>If so, the client would (should) have to populate/re-populate each value in the attribute, right?
>
>Yes... or use a separated defined mechanism.   Note, it is
>intended that password change be initiated by a client
>acting on behalf of the user (or the directory admin).

Then I think the draft needs something in the implementation section that talks about this. It should reflect the notion that if a client changes one value of the authPassword attribute, and not all values, it will likely screw things up--depending on the server implementation.

In other words, with this draft, I see an opportunity to make the use of passwords more interoperable. I would like to see a good deal of implementation details in the draft that move us toward that end.

>>It seems like this could be achieved in a much more secure
>and consistent way if there was a server side mechanism for creating and updating values of this attribute.
>
>I personally favor use of an extended operation to provide
>clients with consistent behavior irregardless of the
>storage used for passwords.  I've introduced such in
>my passwd-exop draft, it may be used with userPassword,
>authPassword, and/or external password storage.  Security,
>of course, is based on a number of factors.  I generally
>recommend the clear separation of private/secret and public
>data.  I prefer (when using password based authentication)
>external password storage like that provided by independent
>SASL service providors).

Can you provide a reference to the passwd-exop draft in this draft?

Jim



From list@netscape.com  Fri Feb 18 12:52:17 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA28062
	for <ldapext-archive@odin.ietf.org>; Fri, 18 Feb 2000 12:52:17 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id JAA00924;
	Fri, 18 Feb 2000 09:46:20 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id JAA12673; Fri, 18 Feb 2000 09:50:00 -0800 (PST)
Resent-Date: Fri, 18 Feb 2000 09:50:00 -0800 (PST)
Message-Id: <s8ad23cd.023@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.3.1
Date: Fri, 18 Feb 2000 10:49:36 -0700
From: "Sukanta Ganguly" <SGANGULY@novell.com>
To: <ietf-ldapext@netscape.com>
Cc: "Mark Meredith" <MMEREDIT@novell.com>
Subject: RE: draft-mmeredith-rootdse-vendor-info-02.txt
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="=_560FCE2D.1A7B48DC"
Resent-Message-ID: <"_MGpj.A.vFD.HZYr4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

This is a MIME message. If you are reading this text, you may want to 
consider changing to a mail reader or gateway that understands how to 
properly handle MIME multipart messages.

--=_560FCE2D.1A7B48DC
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: quoted-printable

It is very difficult and unclear at this point whether we should assume =
that all Internet Directory Client are in the position to talk different =
Internet protocols. Instead of assuming that the Directory Client will =
talk SNMP and query the MIB for getting the vendor specific information, =
why can't we state that the Directory Client queries the rootDSE for the =
information and the implementation would determine whether to go to the =
SNMP MIB for the information or to have the vendor specific information, =
requested by Mark, within the Directory Repository.

I think it will bring in more value to have the access to the information =
through the rootDSE but at the same time leave the invididual implementatio=
ns to handle them. We all agree, based on the emails that I have seen =
flowing around related to this matter, that the information is useful so =
why not provide the flexibility.

Thanks
Sukanta Ganguly
sganguly@novell.com

>>> Bruce Greenblatt <bgreenblatt@directory-applications.com> 02/18/00 =
09:32AM >>>
At 09:13 AM 2/18/00 -0500, Peter Strong wrote:
>
>>
>>
>> To be blunt, I don't believe that there is much use for this draft.
>
>For those of us who attempt to build applications that work with
>multiple directory implementations, this information is very useful.
>

The information may be useful.  I never said that it wasn't.  I said that
it's already available someplace else.  Get it from there, since that is
already a standards track RFC.  I don't see much point in duplicating this
information.  In my opinion, a good internet directory client will get
information from a variety of internet servers: DNS, LDAP, SNMP, and =
others.

>> The information that it proposes to add to the Root DSE is already
>> published is
>> already available from SNMP if the LDAP server conforms to RFC 2248.  =
The
>> applVersion field of the MIB is useful here.  I think that this draft
>> should just point to RFC 2248 (and perhaps 2605) and explain where the
>> vendor information should be placed.  These are already standards track
>> documents, and have places to put the information that this draft =
defines.
>> (Just my $0.02 worth)
>
>The products we build are LDAP clients, not SNMP clients.
>
>This information should be available via LDAP.
>
>>
>>  Bruce
>> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>> Bruce Greenblatt, Ph. D.
>> Directory Tools and Application Services, Inc.
>> http://www.directory-applications.com
>>
>
>------------------------------------------------------------------------
>Peter Strong
>Software Architect
>Nortel Networks - Optivity Policy Services (OPS) and NetID
>pestrong@nortelnetworks.com <mailto:pestrong@nortelnetworks.com>
>(613) 831-6615
>
>
>
>
>
>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Bruce Greenblatt, Ph. D.
Directory Tools and Application Services, Inc.
http://www.directory-applications.com

--=_560FCE2D.1A7B48DC
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META content=3D"text/html; charset=3Diso-8859-1" http-equiv=3DContent-Type=
>
<META content=3D"MSHTML 5.00.2919.6307" name=3DGENERATOR></HEAD>
<BODY bgColor=3D#ffffff=20
style=3D"FONT: 10pt Arial; MARGIN-LEFT: 2px; MARGIN-TOP: 2px">
<DIV>It is very difficult and unclear at this point whether we should =
assume=20
that all Internet Directory Client are in the position to talk different=20=

Internet protocols. Instead of assuming that the Directory Client will =
talk SNMP=20
and query the MIB for getting the vendor specific information, why can't =
we=20
state that the Directory Client queries the rootDSE for the information =
and the=20
implementation would determine whether to go to the SNMP MIB for the =
information=20
or to have the vendor specific information, requested by Mark, within =
the=20
Directory Repository.</DIV>
<DIV>&nbsp;</DIV>
<DIV>I think it will bring in more value to have the access to the =
information=20
through the rootDSE but at the same time leave the invididual implementatio=
ns to=20
handle them. We all agree, based on the emails that I have seen flowing =
around=20
related to this matter, that the information is useful so why not provide =
the=20
flexibility.</DIV>
<DIV>&nbsp;</DIV>
<DIV>Thanks</DIV>
<DIV>Sukanta Ganguly</DIV>
<DIV><A=20
href=3D"mailto:sganguly@novell.com">sganguly@novell.com</A><BR><BR>&gt;&gt;=
&gt;=20
Bruce Greenblatt &lt;bgreenblatt@directory-applications.com&gt; 02/18/00 =
09:32AM=20
&gt;&gt;&gt;<BR>At 09:13 AM 2/18/00 -0500, Peter Strong=20
wrote:<BR>&gt;<BR>&gt;&gt;<BR>&gt;&gt;<BR>&gt;&gt; To be blunt, I don't =
believe=20
that there is much use for this draft.<BR>&gt;<BR>&gt;For those of us =
who=20
attempt to build applications that work with<BR>&gt;multiple directory=20
implementations, this information is very useful.<BR>&gt;<BR><BR>The =
information=20
may be useful.&nbsp; I never said that it wasn't.&nbsp; I said that<BR>it's=
=20
already available someplace else.&nbsp; Get it from there, since that=20
is<BR>already a standards track RFC.&nbsp; I don't see much point in =
duplicating=20
this<BR>information.&nbsp; In my opinion, a good internet directory client =
will=20
get<BR>information from a variety of internet servers: DNS, LDAP, SNMP, =
and=20
others.<BR><BR>&gt;&gt; The information that it proposes to add to the =
Root DSE=20
is already<BR>&gt;&gt; published is<BR>&gt;&gt; already available from =
SNMP if=20
the LDAP server conforms to RFC 2248.&nbsp; The<BR>&gt;&gt; applVersion =
field of=20
the MIB is useful here.&nbsp; I think that this draft<BR>&gt;&gt; should =
just=20
point to RFC 2248 (and perhaps 2605) and explain where the<BR>&gt;&gt; =
vendor=20
information should be placed.&nbsp; These are already standards=20
track<BR>&gt;&gt; documents, and have places to put the information that =
this=20
draft defines.<BR>&gt;&gt; (Just my $0.02 worth)<BR>&gt;<BR>&gt;The =
products we=20
build are LDAP clients, not SNMP clients.<BR>&gt;<BR>&gt;This information =
should=20
be available via LDAP.<BR>&gt;<BR>&gt;&gt;<BR>&gt;&gt;&nbsp; Bruce<BR>&gt;&=
gt;=20
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<BR>&gt;&gt;=
 Bruce Greenblatt, Ph.=20
D.<BR>&gt;&gt; Directory Tools and Application Services, Inc.<BR>&gt;&gt; =
<A=20
href=3D"http://www.directory-applications.com">http://www.directory-applica=
tions.com</A><BR>&gt;&gt;<BR>&gt;<BR>&gt;----------------------------------=
--------------------------------------<BR>&gt;Peter=20
Strong<BR>&gt;Software Architect<BR>&gt;Nortel Networks - Optivity =
Policy=20
Services (OPS) and NetID<BR>&gt;pestrong@nortelnetworks.com=20
&lt;mailto:pestrong@nortelnetworks.com&gt;<BR>&gt;(613)=20
831-6615<BR>&gt;<BR>&gt;<BR>&gt;<BR>&gt;<BR>&gt;<BR>&gt;<BR>=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<BR>Bruce=20
Greenblatt, Ph. D.<BR>Directory Tools and Application Services, Inc.<BR><A=
=20
href=3D"http://www.directory-applications.com">http://www.directory-applica=
tions.com</A><BR><BR></DIV></BODY></HTML>

--=_560FCE2D.1A7B48DC--



From list@netscape.com  Fri Feb 18 14:03:48 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA29282
	for <ldapext-archive@odin.ietf.org>; Fri, 18 Feb 2000 14:03:47 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id LAA11950;
	Fri, 18 Feb 2000 11:00:43 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id LAA21689; Fri, 18 Feb 2000 11:02:37 -0800 (PST)
Resent-Date: Fri, 18 Feb 2000 11:02:37 -0800 (PST)
Message-Id: <3.0.5.32.20000218110224.00973cb0@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Fri, 18 Feb 2000 11:02:24 -0800
To: "Jim Sermersheim" <JIMSE@novell.com>
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Re: Comments on draft-zeilenga-ldap-authpasswd-01.txt
Cc: <ietf-ldapext@netscape.com>
In-Reply-To: <s8ad1c0c.054@prv-mail25.provo.novell.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"mb0ZyB.A.jSF.MdZr4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 10:16 AM 2/18/00 -0700, Jim Sermersheim wrote:
>>The intent is that an authentication process which uses X, Y, and
>>Z schemes should use all values of scheme X, Y, and Z.
>
>So let's say a client performs a simple authentication and sends a clear text password to the server. Are you saying that if the server's authentication process uses X, Y, and Z schemes, it should hash the password with X, then challenge the result against all values of the X scheme, then apply this same process to the password using Y, and Z?

Yes.

>If so, what has to match for authentication to happen? I could imagine: 1) all values must match, 2) one value of each scheme has to match, 3) one value of any scheme has to match.


3.

>>I intended was the later, user's password(s), I'll add some
>>clarification and a security consideration.  It's my intent
>>is that this attribute be used instead of userPassword,
>>userPassword allows multiple values.
>
>Bummer. This opens up security holes and makes the application of password policy difficult and bulky. I know userPassword allows multiple values, but I've never understood why. I'd like to understand what the reasons are before following the pattern.

I believe the use or not of multiple passwords for one identity
is a matter of policy not storage.  The storage should allow
for either policy to be implemented.  It's my intent for this
draft to be policy neutral.

>>>If so, the client would (should) have to populate/re-populate each value in the attribute, right?
>>
>>Yes... or use a separated defined mechanism.   Note, it is
>>intended that password change be initiated by a client
>>acting on behalf of the user (or the directory admin).
>
>Then I think the draft needs something in the implementation section that talks about this. It should reflect the notion that if a client changes one value of the authPassword attribute, and not all values, it will likely screw things up--depending on the server implementation.

I'll have to chew on this a bit.  I will, however, try to
make a note stating the clients interacting directly with this
attribute should aware of how servers make use of the attribute
and that this may be policy driven.

>In other words, with this draft, I see an opportunity to make the use of passwords more interoperable. I would like to see a good deal of implementation details in the draft that move us toward that end.

The intent of the authpassword draft is to provide a
storage mechanism to promote interoperbility
between servers and management clients.  The storage
is designed to be independent of use (and policy).

The intent of the passwd-exop draft is to provide a
update mechanism to promote interoperability between
user clients and servers.  This update may be policy
driven.  The mechanism is designed to independent of
storage.

>>>It seems like this could be achieved in a much more secure
>>and consistent way if there was a server side mechanism for creating and updating values of this attribute.
>>
>>I personally favor use of an extended operation to provide
>>clients with consistent behavior irregardless of the
>>storage used for passwords.  I've introduced such in
>>my passwd-exop draft, it may be used with userPassword,
>>authPassword, and/or external password storage.  Security,
>>of course, is based on a number of factors.  I generally
>>recommend the clear separation of private/secret and public
>>data.  I prefer (when using password based authentication)
>>external password storage like that provided by independent
>>SASL service providors).
>
>Can you provide a reference to the passwd-exop draft in this draft?

I'll provide a reference to the passwd-exop draft in a manner
which does not depend this specification upon passwd-exop
(again, passwd-exop is only one of many possible mechanisms).
[In the end, I hope we can pick one update mechanism.  I'm
hoping to implement a couple of alternatives to gain
operational experience with each].



From list@netscape.com  Fri Feb 18 20:18:35 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA04710
	for <ldapext-archive@odin.ietf.org>; Fri, 18 Feb 2000 20:18:33 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id RAA25795;
	Fri, 18 Feb 2000 17:13:32 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id RAA04038; Fri, 18 Feb 2000 17:17:18 -0800 (PST)
Resent-Date: Fri, 18 Feb 2000 17:17:18 -0800 (PST)
From: p2tendp@jena.de
Message-ID: <00001feb78e6$0000049f$00004518@mailhost.moso.de>
To: <Undisclosed.Recipients@ywing.netscape.com>
Subject: 50 Get your new Home Now!
Date: Fri, 18 Feb 2000 16:53:56 -0800
X-Priority: 3
X-MSMail-Priority: Normal
Reply-To: seeya_1@canada.com
X-Mailer: Eudoria Pro 5.0
Resent-Message-ID: <"EaRWCB.A.d-.c8er4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/
If you have received this message in error and would
like to be removed from future mailings, please visit the
web site and select remove.  
Or if you would like you can just relpy with REMOVE in
the subject line.  Be sure and include the email address's
that you would like to have removed in the body of the 
message.  Thank You.
SEND EMAIL SAVE A TREE!  
_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/


You can now comparison shop thousands of loan
programs through hundreds of lenders by filling in
A single short form.  Let lenders compete for 
your business!


Cash back refinances
No Equity 2nd Trust Deeds
Debt Consolidation
New Home Purchase
NO INCOME VERIFICATION  

The most competitive interest rates.

GOOD CREDIT/BAD CREDIT It doesn't matter!

Even BANKRUPCY!

We can find a mortgage for your NEW home too!
 
Fill in our quick pre-qualification form and you 
will get competitive quotes from three lenders.

When lenders compete, you win!

Visit this website:

http://209.185.123.179/bin/redirector.cgi?http://3499894548/%7ez-mortgage?KC0217

-Save Time
-Save Money
-Save Aggravation

There is NEVER any fee to consumers for using this service.

This is for real, not like those other ones that
offer free vacations.  We are a highly respected service
with a very reputable background just check out are web site
and you will see the difference. 





























_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/
If you have received this message in error and would
like to be removed from future mailings, please visit the
web site and select remove.  







From list@netscape.com  Fri Feb 18 23:08:36 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA07668
	for <ldapext-archive@odin.ietf.org>; Fri, 18 Feb 2000 23:08:35 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id UAA07795;
	Fri, 18 Feb 2000 20:03:38 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id UAA17039; Fri, 18 Feb 2000 20:07:21 -0800 (PST)
Resent-Date: Fri, 18 Feb 2000 20:07:21 -0800 (PST)
Message-Id: <3.0.5.32.20000218200706.009214f0@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Fri, 18 Feb 2000 20:07:06 -0800
To: "Jim Sermersheim" <JIMSE@novell.com>
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Re: Comments on draft-zeilenga-ldap-authpasswd-01.txt
Cc: <ietf-ldapext@netscape.com>
In-Reply-To: <3.0.5.32.20000218110224.00973cb0@infidel.boolean.net>
References: <s8ad1c0c.054@prv-mail25.provo.novell.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"gbF2wD.A.9JE.4bhr4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 11:02 AM 2/18/00 -0800, Kurt D. Zeilenga wrote:
>I believe the use or not of multiple passwords for one identity
>is a matter of policy not storage.  The storage should allow
>for either policy to be implemented.  It's my intent for this
>draft to be policy neutral.

Note that enforcement of password change policy often
requires knowledge of the current and new passwords.  As
updates via normal LDAP operations upon authPassword use
hashed values, it is not possible for the server to
enforce any content based password change policy.

Servers which support such policies will need to disable
update via normal LDAP commands and provide separate
update mechanisms which provide the necessary content
(the user's current and/or new password).  passwd-exop
provides such a mechanism.

I add a comment regarding this to the draft.

Kurt



From list@netscape.com  Sun Feb 20 13:47:47 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA12094
	for <ldapext-archive@odin.ietf.org>; Sun, 20 Feb 2000 13:47:46 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id KAA24009;
	Sun, 20 Feb 2000 10:44:27 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id KAA01868; Sun, 20 Feb 2000 10:46:24 -0800 (PST)
Resent-Date: Sun, 20 Feb 2000 10:46:24 -0800 (PST)
From: zzrtptc44@officina.net
Message-Id: <200002201846.KAA03784@xwing.netscape.com>
To: ietf-ldapext@netscape.com
Subject: Your Platinum Free Vacation and Airline Tickets"
Date: Sun, 20 Feb 2000 13:50:05 -0500
X-Sender: zzrtptc44@officina.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 4.1
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
X-Priority: 3
X-MSMail-Priority: Normal
Resent-Message-ID: <"2R0JIB.A.6c.-ZDs4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Platinum Travel Club Would Like To Offer You A Complimentary Vacation Of A Lifetime And Two Free Airline Tickets.
 
Please click on   http://www.platinumtravelclub.com   

or if you can not click on  the link please simply visit our website at www.platinumtravelclub.com 
for Details Of How To Receive This Now.

Please understand that this is a one time offer and Platinum Club will not resend this offer to you again. 

If you do not respond and you have received this message in error we apologize for the inconvenience and 
we would like to confirm that you will not receive this offer or any other offer from us again. Thank You. 
Code P.F.C.C.52598



From list@netscape.com  Mon Feb 21 01:10:09 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id BAA18500
	for <ldapext-archive@odin.ietf.org>; Mon, 21 Feb 2000 01:10:08 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id WAA19510;
	Sun, 20 Feb 2000 22:07:01 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id WAA02743; Sun, 20 Feb 2000 22:08:53 -0800 (PST)
Resent-Date: Sun, 20 Feb 2000 22:08:53 -0800 (PST)
Message-Id: <3.0.5.32.20000220214341.00924b70@pop.walltech.com>
X-Sender: bgreenblatt@pop.walltech.com
X-Mailer: QUALCOMM Windows Eudora Light Version 3.0.5 (32)
Date: Sun, 20 Feb 2000 21:43:41 -0800
To: internet-drafts@ietf.org
From: Bruce Greenblatt <bgreenblatt@directory-applications.com>
Subject: draft-greenblatt-ldap-certinfo-schema-02
Cc: ietf-ldapext@netscape.com
Mime-Version: 1.0
Content-Type: multipart/mixed; boundary="=====================_951140621==_"
Resent-Message-ID: <"KsRtbB.A.jq.zZNs4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

--=====================_951140621==_
Content-Type: text/plain; charset="us-ascii"

I-D editor:

please replace draft-greenblatt-ldap-certinfo-schema-01 with the
following draft-greenblatt-ldap-certinfo-schema-02.  

LDAPEXT:

Attached is a personal draft that defines a new object class to hold
information about certificates, so that all of a user's certificates don't
need to be directly attached 
to the user's entry in LDAP.  It has been updated by using real OIDs that I
finally got around to allocating.  Enjoy...  Comments welcomed.

Bruce
--=====================_951140621==_
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: attachment; filename="cert-type-02a.out"







Application Working Group                               Bruce Greenblatt
Internet Draft
<draft-greenblatt-ldap-certinfo-schema-02>
Expires in six months


         LDAP Object Class for Holding Certificate Information


Status of this Memo


     This document is an Internet-Draft and is in full conformance with
all provisions of Section 10 of RFC2026.

     This document is an Internet-Draft. Internet-Drafts are working
documents of the Internet Engineering Task Force (IETF), its areas,
andits working groups. Note that other groups may also distribute work-
ing documents as Internet-Drafts.

     Internet-Drafts are draft documents valid for a maximum of six
months.  Internet-Drafts may be updated, replaced, or made obsolete by
other documents at any time. It is not appropriate to use Internet-
Drafts as reference material or to cite them other than as a "working
draft" or "work in progress".

     The list of current Internet-Drafts can be accessed at:

     http://www.ietf.org/ietf/1id-abstracts.txt

     The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.

     Distribution of this document is unlimited.

     Abstract

     This draft describes a means for LDAP applications to store large
numbers of certificates for a single user, and to still have individual
certificates easily retrievable without the need for any extensions to
the LDAP v2 or v3 protocols.

1.  Mechanism

     When reading an attribute from an entry using LDAP v2 [1] or LDAPv3
[2], it is normally only possible to read either the attribute type, or
the attribute type and all its values. It is not possible to selectively
read just a few of the attribute values using the basic structures of



Greenblatt                                                      [Page 1]





Internet Draft                                             February 2000


the protocol defined in [1] or [2].  Certain information that belongs to
a user may have many different values.  For example, some users may have
quite a large number of certificates that need to be stored in the
directory.  If a user has 1000s of certificates, then it may be diffi-
cult to find the exact one that is needed.  If only one certificate is
needed by the LDAP client, then retrieving the entire userCertificate
attribute that has 1000s of values is a waste of time.

     If numerous application services are going to want to selectively
retrieve certificates (which is perfectly valid), a general solution in
the schema should be provided.  The following solution is given:

     RFC 2587 defines a schema for holding certificate information, but
assumes that all of a user's certificates are attached to that user's
LDAP entry.  Use the certificateType structural class to indicate that
an object in the directory is a specific type of certificate.  Each cer-
tificateType object in the directory appears directly beneath the owner
of the certificate in the directory hierarchy.  RFC 2459 [3] specifies a
profile for X.509 v3 certificates.  It's definitions are used to define
the attributes that can be placed in a certificateType object.  All OIDs
defined in this draft are rooted from:

1.3.6.1.4.1.5515

1.3.6.1.4.1 has been assigned as IANA-registered Private Enterprises,
and IANA has assigned 5515 to Directory Tools and Application Services,
Inc. (DTASI).

1.3.6.1.4.1.5515.1 is the root OID for LDAP object class names, and
1.3.6.1.4.1.5515.2 is the root OID for LDAP attribute type names.

( 1.3.6.1.4.1.5515.1.1 NAME 'certificateType' SUP top STRUCTURAL MUST
typeName MAY ( serialNumber $ issuer $ validityNotBefore $ vallidityNo-
tAfter $ subject $ subjectPublicKeyInfo) certificateExtension $ other-
Info ) )

The attributes are defined as follows:

( 1.3.6.1.4.1.5515.2.1 NAME 'typeName' SUP name SINGLE-VALUE )


     The typeName attribute specifies the application defined type of
the certificate that is attached to this entry using the strongAuthenti-
cationUser auxiliary object class.  Note that there may not be any cer-
tificates attached to this entry if the user has no certificates of the
specified type.  Each type name uniquely identifies an entry within the
container.




Greenblatt                                                      [Page 2]





Internet Draft                                             February 2000


     The following attributes are the LDAP representations of the cer-
tificate attributes defined in RFC 2459, and have been pulled out as
separate attributes to ease searching.

( 1.3.6.1.4.1.5515.2.2 NAME 'serialNumber' SUP name SINGLE-VALUE )

     Rather than using the ASN.1 integer type as is used in RC 2459, the
serialNumber attribute represents the value in string format representa-
tion of the decimal format of the serial number.

( 1.3.6.1.4.1.5515.2.3 NAME 'issuer' SUP distinguishedName SINGLE-VALUE
)

( 1.3.6.1.4.1.5515.2.4 NAME 'validityNotBefore' EQUALITY generalized-
TimeMatch
      ORDERING generalizedTimeOrderingMatch
      SYNTAX 1.3.6.1.4.1.1466.115.121.1.24
      SINGLE-VALUE )

( 1.3.6.1.4.1.5515.2.5 NAME 'validityNotAfter' EQUALITY generalized-
TimeMatch
      ORDERING generalizedTimeOrderingMatch
      SYNTAX 1.3.6.1.4.1.1466.115.121.1.24
      SINGLE-VALUE )

     The 'validityNotBefore" and 'validityNotAfter' attributes have
split the 'validity' attribute defined in RFC 2459 which uses an ASN.1
sequence containing a "notBefore" and a "notAfter" value.  Instead of
using an ASN.1 Sequence, the character string representation of each
time as defined in section 6.14 of RFC 2252 is used for each time.  For
example, if the 'validityNotBefore' attribute held the time value:
"199412161032Z" and the 'validityNotAfter' attribute held the time val-
uee: "199512161032Z", then that would indicate that the certificate
described by this entry was valid from December 16, 1994 to December 16,
1995.

( 1.3.6.1.4.1.5515.2.6 NAME 'subject' SUP distinguishedName SINGLE-VALUE
)

( 1.3.6.1.4.1.5515.2.7 NAME 'subjectPublicKeyInfo' EQUALITY octetString-
Match
      SYNTAX 1.3.6.1.4.1.1466.115.121.1.40{128} SINGLE-VALUE )


     The certificateExtension attribute is used to store whatever inter-
esting extension from the certifcate that are pulled out of the stored
certificate.  Note that it is the only multi-valued attribute of the
certificateType object class.



Greenblatt                                                      [Page 3]





Internet Draft                                             February 2000


( 1.3.6.1.4.1.5515.2.8 NAME 'certificateExtension' octetStringMatch
      SYNTAX 1.3.6.1.4.1.1466.115.121.1.40 )

     The format of the certificate extension attribute value is a string
representation of an OID according to the specifications of RFC 2252
[4], followed by a '$' as the separation character, followed by the
value.  Octets following the dollar sign may be binary data.  For exam-
ple, the keyUsage extension defined in RFC 2459 is a bitString.  For
extensions that are ASN.1 encoded (such as the keyUsage extension), the
entire ASN.1 encoding MUST immediately follow the separation character.
Other certificate formats that allow non ASN.1 encoded extensions MUST
place their values immediately following the separation character as
well.

( 1.3.6.1.4.1.5515.2.9 NAME 'otherInfo' SUP name )

     The purpose of the otherInfo attribute is to allow descriptive
information to be placed in entry that does not appear in the certifi-
cate itself.  The values of this attribute are free form text strings,
e.g. "this certificate gets me into the IETF web site".

     Note that the certificateType object class does not include an
attribute for holding the actual certificate.  This is due to the fact
that the certificate will be held in an attribute of an auxiliary object
class that will be attached to the entry.

2. Comparison with Matched Values Only Control

     A control has been defined that allows for only certain values of a
specified attribute to be returned from a matching entry [5].  In this
section, these two approaches are compared.  The major benefit of the
Matched Values Only Control is that it does not require any changes to
the DIT.  If a customer has deployed certificate information in such a
way that individual entries have numerous certificates attached to them
then the Matched Values Only Control is useful.  While it is a simple
matter to modify the DIT in such a way that all certificate information
is removed from the entries, and placed in the container directly
beneath the entries according to the definitions of this specification,
it is less simple to simultaneously modify all of the applications that
depend on certificates being stored in the entry.  Thus, it may be
desirable to duplicate the certificate information, by having it appear
in the entry, as well as in the container beneath the entry for a short
period of time, in order to allow for migration of the applications to
the new LDAP schema.  As in any situation in which information is dupli-
cated, great care must be taken in order to insure the integrity of the
information.





Greenblatt                                                      [Page 4]





Internet Draft                                             February 2000


     There are several advantages to using the certificateType object
class.  No special matching rules are needed to retrieve a specific cer-
tificate.  Any field in the certificate can be used in the search fil-
ter.  Even information that doesn't appear in the certificate can be
used in a search filter.  It is easier to remove certificates from the
DIT, since the entire certificate DER does not have to be supplied in
the modify operation.


3.  Examples

     Using the certificate given in Section D.2 of RFC 2459, the follow-
ing values would be used for the attributes defined in this draft:

     typeName - "General Purpose Certificate"

     serialNumber - "18"

     issuer - "OU=nist; O=gov; C=US"

     subject - "CN=Tim Polk; OU=nist; O=gov; C=US"

     validityNotBefore - "970730000000Z"

     validityNotAfter -  "971231000000Z"

     certificateExtension: "2.5.29.17: " +
           30 10 81 0e 77 70 6f 6c 6b 40 6e 69 73 74 2e 67 6f 76

     otherInfo - "contains a 1024 bit DSA public key",
                 "this was issued for test purposes only"

4.  References

[1]  W. Yeong, T. Howes, S. Kille, "Lightweight Directory Access Proto-
     col" RFC 1777, March 1995.

[2]  M. Wahl, T. Howes, S. Kille, "Lightweight Directory Access Proto-
     col, (v3)" RFC 2251, December 1997.

[3]  R. Housley, W. Ford, W. Polk, D. Solo,  "Internet X.509 Public Key
     Infrastructure Certificate and CRL Profile.  RFC 2459, January
     1999.

[4]  M. Wahl, A. Coulbeck, T. Howes, S. Kille, "Lightweight Directory
     Access Protocol (v3): Attribute Syntax Definitions" RFC 2252,
     December 1997.




Greenblatt                                                      [Page 5]





Internet Draft                                             February 2000


[5]  D. Chadwick, Sean Mullan, "Returning Matched Values with LDAPv3",
     Internet Draft (work in progress), September 1999.


5.  Author's Address

     Bruce Greenblatt
     Directory Tools and Application Services, Inc.
     6841 Heaton Moor Drive
     San Jose, CA 95119
     USA
     Email: bgreenblatt@directory-applications.com







































Greenblatt                                                      [Page 6]



--=====================_951140621==_
Content-Type: text/plain; charset="us-ascii"


==============================================
Bruce Greenblatt, Ph. D.
Directory Tools and Application Services, Inc.
http://www.directory-applications.com
--=====================_951140621==_--



From list@netscape.com  Mon Feb 21 05:05:24 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA02019
	for <ldapext-archive@odin.ietf.org>; Mon, 21 Feb 2000 05:05:20 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id CAA00469;
	Mon, 21 Feb 2000 02:02:09 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id CAA10181; Mon, 21 Feb 2000 02:03:58 -0800 (PST)
Resent-Date: Mon, 21 Feb 2000 02:03:58 -0800 (PST)
Sender: vinnie@oasis.ireland.Sun.COM
Message-ID: <38B10C91.F1ABAC11@Ireland.Sun.COM>
Date: Mon, 21 Feb 2000 09:59:45 +0000
From: Vincent Ryan <Vincent.Ryan@Ireland.Sun.COM>
Organization: Sun Microsystems
X-Mailer: Mozilla 4.7 [en] (X11; I; SunOS 5.7 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: ldap@umich.edu, ietf-ldapext@netscape.com
Subject: LDAP presentation format?
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"YVbDjB.A.zeC.N2Qs4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit


Processing a URL typically involves presenting the results as a data
stream.
In the case of an LDAP URL there are several available formats for such
a
data stream. For example,

 - text/directory MIME-type
      http://www.ietf.org/rfc/rfc2425.txt

 - DSML (XML) format
       http://www.dsml.org

 - LDIF file format
       http://www.ietf.org/internet-drafts/draft-good-ldap-ldif-05.txt


I'm seeking responses from LDAP users and implementors on the relative
merits of these 3 formats. In particular, I'm interested in determining
which forms are widely supported in current or planned products.

Thanks in advance.



From list@netscape.com  Mon Feb 21 05:53:58 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA02339
	for <ldapext-archive@odin.ietf.org>; Mon, 21 Feb 2000 05:53:57 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id CAA01219;
	Mon, 21 Feb 2000 02:49:00 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id CAA19855; Mon, 21 Feb 2000 02:52:53 -0800 (PST)
Resent-Date: Mon, 21 Feb 2000 02:52:53 -0800 (PST)
Message-ID: <38B119A5.48707107@surfnet.nl>
Date: Mon, 21 Feb 2000 11:55:33 +0100
From: Peter Valkenburg <Peter.Valkenburg@surfnet.nl>
X-Mailer: Mozilla 4.7 [en] (Win98; I)
X-Accept-Language: en
MIME-Version: 1.0
To: Vincent Ryan <Vincent.Ryan@Ireland.Sun.COM>
CC: ldap@umich.edu, ietf-ldapext@netscape.com
Subject: Re: LDAP presentation format?
References: <38B10C91.F1ABAC11@Ireland.Sun.COM>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"SbxEIC.A.91E.EkRs4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Hi,

> I'm seeking responses from LDAP users and implementors on the relative
> merits of these 3 formats. In particular, I'm interested in determining
> which forms are widely supported in current or planned products.

FYI:
We're working with some partners on an large scale LDAP indexing
solution for research and academia:
  http://www.desire.org/html/research/workingpapers/index.html

The index system is generic, and use HTTP as an internal transport 
system.  For query responses it uses LDIF embedded in MIME.
The MIME object type has been dubbed text/ldif.  (yes, something
ought to be registered here)

--
  Peter Valkenburg
  SURFnet


Vincent Ryan wrote:
> 
> Processing a URL typically involves presenting the results as a data
> stream.
> In the case of an LDAP URL there are several available formats for such
> a
> data stream. For example,
> 
>  - text/directory MIME-type
>       http://www.ietf.org/rfc/rfc2425.txt
> 
>  - DSML (XML) format
>        http://www.dsml.org
> 
>  - LDIF file format
>        http://www.ietf.org/internet-drafts/draft-good-ldap-ldif-05.txt
> 
> I'm seeking responses from LDAP users and implementors on the relative
> merits of these 3 formats. In particular, I'm interested in determining
> which forms are widely supported in current or planned products.
> 
> Thanks in advance.



From list@netscape.com  Tue Feb 22 06:39:20 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA08697
	for <ldapext-archive@odin.ietf.org>; Tue, 22 Feb 2000 06:39:20 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id DAA19233;
	Tue, 22 Feb 2000 03:34:15 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id DAA13819; Tue, 22 Feb 2000 03:38:10 -0800 (PST)
Resent-Date: Tue, 22 Feb 2000 03:38:10 -0800 (PST)
Message-Id: <200002221137.GAA08656@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
CC: ietf-ldapext@netscape.com
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-zeilenga-ldap-passwd-exop-01.txt
Date: Tue, 22 Feb 2000 06:37:53 -0500
Sender: nsyracus@cnri.reston.va.us
Resent-Message-ID: <"HFKdVB.A.gXD.hUns4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.


	Title		: LDAP Password Modify Extended Operation
	Author(s)	: K. Zeilenga
	Filename	: draft-zeilenga-ldap-passwd-exop-01.txt
	Pages		: 6
	Date		: 21-Feb-00
	
The integration of LDAP [RFC2251] and external authentication services
has introducted non-DN authentication identities and allowed for non-
directory storage of passwords.   As such, mechanisms which update the
directory, such as Modify operation, cannot be used to change a user's
password.  This document describes an LDAP extended operation to allow
allow modification of user passwords which is not dependent upon the
form of the authentication identity nor the password storage mechanism
used.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-zeilenga-ldap-passwd-exop-01.txt

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-zeilenga-ldap-passwd-exop-01.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-zeilenga-ldap-passwd-exop-01.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20000221120533.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-zeilenga-ldap-passwd-exop-01.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-zeilenga-ldap-passwd-exop-01.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20000221120533.I-D@ietf.org>

--OtherAccess--

--NextPart--




From list@netscape.com  Tue Feb 22 06:39:26 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA08707
	for <ldapext-archive@odin.ietf.org>; Tue, 22 Feb 2000 06:39:25 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id DAA22535;
	Tue, 22 Feb 2000 03:36:03 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id DAA13750; Tue, 22 Feb 2000 03:38:03 -0800 (PST)
Resent-Date: Tue, 22 Feb 2000 03:38:03 -0800 (PST)
Message-Id: <200002221137.GAA08642@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
CC: ietf-ldapext@netscape.com
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-zeilenga-ldap-authpasswd-02.txt
Date: Tue, 22 Feb 2000 06:37:48 -0500
Sender: nsyracus@cnri.reston.va.us
Resent-Message-ID: <"IxqTn.A.kWD.ZUns4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.


	Title		: LDAP Authentication Password Attribute
	Author(s)	: K. Zeilenga
	Filename	: draft-zeilenga-ldap-authpasswd-02.txt
	Pages		: 9
	Date		: 21-Feb-00
	
This document describes schema for storing authentication passwords in
a LDAP [RFC2251] directory.  The document provides schema definitions
for authPassword and related schema definitions.  The authPassword is
intended to used instead of clear text password storage mechanisms
such as userPassword [RFC2256] to support simple bind operations.  The
attribute may be used to store SASL [RFC2222] authentication passwords
in entries of a directory.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-zeilenga-ldap-authpasswd-02.txt

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-zeilenga-ldap-authpasswd-02.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-zeilenga-ldap-authpasswd-02.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20000221115946.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-zeilenga-ldap-authpasswd-02.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-zeilenga-ldap-authpasswd-02.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20000221115946.I-D@ietf.org>

--OtherAccess--

--NextPart--




From list@netscape.com  Tue Feb 22 10:46:21 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA13241
	for <ldapext-archive@odin.ietf.org>; Tue, 22 Feb 2000 10:46:13 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id HAA05812;
	Tue, 22 Feb 2000 07:41:04 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id HAA28082; Tue, 22 Feb 2000 07:44:58 -0800 (PST)
Resent-Date: Tue, 22 Feb 2000 07:44:58 -0800 (PST)
Message-ID: <38B2AF9C.FD9965DA@netscape.com>
Date: Tue, 22 Feb 2000 07:47:40 -0800
From: rweltman@netscape.com (Rob Weltman)
X-Mailer: Mozilla 4.7 [en] (WinNT; U)
X-Accept-Language: en-US,sv,ja
MIME-Version: 1.0
To: ietf-ldapext@netscape.com
Subject: Changes to Java LDAP drafts
Content-Type: text/html; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"H7NzZC.A.e2G.47qs4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

<!doctype html public "-//w3c//dtd html 4.0 transitional//en">
<html>
&nbsp; The Internet Drafts on a Java LDAP API have passed two last calls
in this working group, but Steven Merrill at Novell has found a number
of typos and inconsistencies that I think should be fixed before this leaves
the working group. A summary follows. Comments appreciated.
<p>Thanks,
<br>Rob
<br>&nbsp;
<p>java-api-09
<p>4.3.5 LDAPAttributeSet
<p>The return type of the two getAttribute() methods should be LDAPAttribute,
not LDAPAttribute[]
<p>--
<p>The LDAPConstraints/LDAPConstraints parameter to many methods: what
is the effect of passing null?
<p>Default constraints
<p>--
<p>What if null is passed for DN where a valid DN is expected?
<p>IllegalArgumentException
<p>--
<p>4.28.2 add
<p>Missing convenience method
<br>public void add(LDAPEntry entry) throws LDAPException
<p>--
<p>4.28.10 read
<p>Missing method
<br>public LDAPEntry read(String dn, String attrs[], LDAPConstraints cons)
throws LDAPException
<p>--
<p>4.13.6 Error Codes
<p>Should be Result Codes (because some codes returned by the server do
not indicate an error)
<p>--
<p>4.24 LDAPSearchResults
<p>Should say "implements Enumeration"
<p>--
<p>Where are NO_ATTRS and ALL_USER_ATTRS defined?
<p>They should be defined in LDAPv2
<p>-------------------
<br>&nbsp;
<p>java-api-asynch-ext-04
<p>4.1.1 abandon
<br>id&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
The ID of the operation to abandon. The ID may be
<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
obtained from the search listener for the operation.
<p>It should say "from the listener for the operation", because it works
with response listeners as well as with search listeners.
<p>--
<p>4.4 public abstract class LDAPResponse extends LDAPMessage
<p>Should not be abstract
<p>--
<p>There should be an asynchronous version of extendedOperation()
<p>--
<p>There should be an asynchronous version of rename() - the variant that
takes newParentDN as parameter
<p>--
<p>4.1.8 search
<p>The second signature should take LDAPSearchConstraints rather than LDAPConstraints
as argument
<br>&nbsp;
<br>&nbsp;</html>



From list@netscape.com  Tue Feb 22 16:05:03 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA23125
	for <ldapext-archive@odin.ietf.org>; Tue, 22 Feb 2000 16:04:59 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id MAA19142;
	Tue, 22 Feb 2000 12:59:49 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id NAA23871; Tue, 22 Feb 2000 13:03:43 -0800 (PST)
Resent-Date: Tue, 22 Feb 2000 13:03:43 -0800 (PST)
Date: Tue, 22 Feb 2000 15:03:28 -0600
From: Mark Wahl <M.Wahl@INNOSOFT.COM>
Subject: Re: ACL model comments
In-reply-to: "Your message of Thu, 17 Feb 2000 14:06:34 EST."
 <38AC46BA.71EA48A4@netscape.com>
Sender: Mark.Wahl@INNOSOFT.COM
To: mcs@netscape.com (Mark C Smith)
Cc: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>, ietf-ldapext@netscape.com
Message-id: <7009.951253408@threadgill.austin.innosoft.com>
Resent-Message-ID: <"UbjR7D.A.zzF.tmvs4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


> I agree that the attribute type used to store access control information
> should be operational.  X.500's various access control attribute types
> are defined with "USAGE directoryOperation" which seems right to me.

I'd agree with that.  This usually indicates that it is used by the directory
service itself, is replicated with user attributes (not server specific), 
and may be modifiable oer protocol.

> I admit that 'aci' was not a good name for Netscape to use, but I
> suggest we use a name like 'ldapACI' for the new standard scheme to
> avoid confusion (unless someone else is already using that name too!).

I've seen aci, acl, subtreeacl, searchacl, but haven't seen ldapACL yet.

Mark Wahl, Directory Product Architect
Innosoft International, Inc.



From list@netscape.com  Wed Feb 23 01:20:34 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id BAA04404
	for <ldapext-archive@odin.ietf.org>; Wed, 23 Feb 2000 01:20:33 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id WAA16660;
	Tue, 22 Feb 2000 22:14:26 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id WAA09430; Tue, 22 Feb 2000 22:18:21 -0800 (PST)
Resent-Date: Tue, 22 Feb 2000 22:18:21 -0800 (PST)
From: 41f312b8a@fzkjhss.fzk.yamanashi.ac.jp
DATE: 22 Feb 00 9:59:03 PM
Message-ID: <q8HYftK9jgfkC3lIo>
SUBJECT: >>> Cell Phone User Information <<<							ijhyhh
Resent-Message-ID: <"PecI4D.A.uSC.ru3s4"@glacier>
To: ietf-ldapext@netscape.com
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

  	   Leading Researchers From Around The World

	   Agree That Microwave Radiation From Cell Phones

	   Is Directly Related To Certain Types Of Brain 

	   Cancer And The Destruction Of The Human Immune
	
	   System.
 

The WASHINGTON POST reports that preliminary results

from research paid for by the cellular telephone industry

suggests there may be a correlation between cell phone 

use and cancer.


ABC NEWS  Brian Ross is told by leading scientist that

cell phones can no longer be presumed safe.


THE DAILY MAIL urges cell phone users to cut their useage

as a result of a cancer alert.


BBC NEWS warns that radiation from mobile phones can 

severely damage the human immune system.


THE IRISH TIMES headlines reads that Mobil Phones are

linked to brain tumors.


CBS NEWS correspondent Sandra Hughes says there are 

100 million cell phone users putting their lives at

risk due to cancer producing microwave radiation

emitted from cell phones.


	
!!!!!!!!  A REMARKABLE NEW CELL PHONE DEVICE CALLED THE  !!!!!!!!

	   WAVE SHIELD BLOCKS UP TO 99% OF THE HARMFUL

	     RADIATION EMITTED FROM CELL PHONES



	Test preformed by The American Society of Testing and 
	Materials, and the Kansai Electrical Corporation, the 
	leading testing authority in Japan, both confirm that 
	the WAVE SHIELD blocks up to 99% of the harmful 
	radiation emitted from cell phones.



>>> THIS NEW TECHNOLOGY WILL PROTECT YOU FROM THE HARMFUL AND <<<

     POTENTIALlY DEADLY RADIATION EMITTED FROM YOUR CELL PHONE 


	The WAVE SHIELD is a small shield about the size of a 
	nickel that attaches to the ear piece of your cell 
	phone in seconds and is hardly noticeable.  The wave 
	shield actually looks like part of your phone once it 
	is secured.


	The Wave Shield is backed up by a million dollar product
	liability insurance policy.  You know a product works when
	an insurance company is willing to place a million dollar 
	liabiliy policy on the product.


              JUST  $19.95 plus shipping and handling


	A SMALL PRICE TO PAY For The Peace Of Mind Knowing You Are
	Protected From Deadly Microwave Radiation.


To be removed from this mailing list FAX your email address to: 
1 800 546 3685.
        		   



			TO ORDER:

Sorce Code   CO-1000

		
FILL OUT THE ORDER FORM BELOW AND FAX TO:       1 303 341 9700

Quantity______ X $19.95 per Wave Shield         =  $___________

Florida Residents Add 6% sales tax 		=  $___________

Shipping and Handling:  US  $3.95 for the 
first unit and $1.50 for each additional
unit.  International  $6.95 for the first
unit and $1.50 for each additional unit         =  $___________

					TOTAL	=  $___________


Email address  (Type Or Print Large and Clear Below)


Name_____________________________________

Address________________________________________________________

Phone____________________

Master Card____   Visa____   American Express____   Discover____

Card Number   __________ - _________ - _________ - __________

Expiration Date   (MM-YYYY)  _______________

The name on the credit card and the billing address must exactly 
match that for the credit card or the order will not be processed


Signature ____________________________________	Date ____________


You may also order by phone  1 800 242 0363 ext. 1407





From list@netscape.com  Wed Feb 23 03:17:05 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA16558
	for <ldapext-archive@odin.ietf.org>; Wed, 23 Feb 2000 03:17:05 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id AAA23280;
	Wed, 23 Feb 2000 00:11:06 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id AAA01761; Wed, 23 Feb 2000 00:15:03 -0800 (PST)
Resent-Date: Wed, 23 Feb 2000 00:15:03 -0800 (PST)
From: morpheus@zyluss.com
Date: Wed, 23 Feb 2000 00:14:54 -0800 (PST)
Message-Id: <200002230814.AAA06034@xwing.netscape.com>
Reply-To: morpheus@zyluss.com
To: morpheus@zyluss.com
Subject: Greatest collection of software ever made on 1 CD!
Resent-Message-ID: <"3Fh5ND.A.Ua.Fc5s4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Are you tired of spending long hours on the internet downloading that new software you have been looking for? Well, there is a solution. Try out the all new "SUPER SOFTWARE CD!" This CD is compiled from the very latest and up-to-date software libraries available today. All software contained on this one CD was chosen from only the HIGHEST RATED and THE MOST POPULAR shareware/freeware titles that can be found anywhere! There is no doubt that THIS IS THE BEST SOFTWARE CD YOU WILL FIND ANYWHERE! This single CD contains well over 200 different high-quality programs and over 700 megabytes of information AND includes FREE browsing software with title indexing and top-notch evaluations of every single program that has been put on this CD. This CD contains some of the most popular software titles such as:

32bit Fax v9.12.01
Air Warrior II
Acrobat Reader (32-bit) v4.05
Aquarium Screen Saver v2.5
Applet Button Factory v5.0
Atom Time v2.1b
BCM Diagnostics for Win95 v1.01.02
Bikini Screen Saver
Bikini Solitaire
Bud Ice Screen Saver v12.13.96
Budweiser Lizards Screen Saver
CDRWin v3.7d
Command AntiVirus for Windows 95/98 v4.57.1
Cult v1.24
Corkboard v1.00.092
CuteFTP (32-bit) v3.5
Duke Nukem 3D v1.3d
Easy Bridge v3.2
EasyZip 2000 v4.5
Elephant Walk Theme
Font FX Express v2.5
Go!Zilla v3.5
Hey, Macaroni! v2.0
Holy Bible King James Version v5.1.2
HotDog Professional (32-bit) v5.5
ICQ (32-bit) v99b
Microsoft Internet Explorer (Full Install) v5.0
Jedi-Knight - Dark Forces II
Kama Sutra for WIndows v1.0
McAfee VirusScan for Windows 95/98 v4.0.3
Microsoft DirectX Drivers v7.0
Microsoft Windows Media Player v6.0
mIRC (32-bit) v5.61
MOPy Fish v1.9
MoreJongg v7.0
Netscape Communicator (32-bit Full Install) v4.7
Norton AntiVirus for Windows 95/98 v5.3.0.25
Norton Utilities 2000 v4.5
PKZIP for Windows (32-bit) v2.70
PKZIP for DOS v2.50
Princess Diana Tribute Screen Saver v1.0
Pro Pinball Timeshock!
Quake - The Doomed Dimension v1.06
Quake II
RealPlayer G2
Star Wars Episode I - Racer v1.0
Star Wars, Shadows of the Empire
Swimsuit Screen Saver v1.52
Titanic Screen Saver
Ulead Cool 3D v3.5
Winamp (Complete) v2.5e
WinZip (32-bit) v7.0 SR-1
WinZip for Windows 3.1x v6.3
WS_FTP Professional

...................and that's just the tip of the iceberg! There is a total of 225 different top-quality programs from only the best software writers of today!  Do yourself a big favor and avoid all of the hassles of downloading those lengthy and time consuming software programs! Purchase our CD and get all of todays latest and most popular software titles on one easy, convenient, power-packed, 700MB CD. 
Can you imagine how long it would take you to download 700MB of information at 56K? Try about 210 HOURS!!!!!!!!!! That's about 9 FULL DAYS of non-stop downloading!!!!!!! The solution is simple ---- PURCHASE THE "SUPER SOFTWARE CD" and save yourself a lot of headache!

Name:_____________________________
Address:___________________________
Address:___________________________
City:______________________________
State/Province:_____________________
Country:___________________________
Number of CD's I am ordering:__________

Cost per CD:           $8.95 (Payment MUST be in US funds ONLY)
Shipping/Handling: $4.00 (for up to 5 CD's)
 (Please add $1.00 extra for each CD that exceeds quantity 5)

Please make funds payable to "Morpheus Software" and send payment to:

Morpheus Software
P.O. Box 280207
Memphis, TN 38168-0207
USA

ALL ORDERS WILL BE PROCESSED IMMEDIATELY UPON RECEIPT OF PAYMENT.
THANK YOU FOR YOUR ORDER!!!!!!!



From list@netscape.com  Wed Feb 23 09:54:17 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA23244
	for <ldapext-archive@odin.ietf.org>; Wed, 23 Feb 2000 09:54:16 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id GAA21510;
	Wed, 23 Feb 2000 06:48:56 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id GAA18551; Wed, 23 Feb 2000 06:52:46 -0800 (PST)
Resent-Date: Wed, 23 Feb 2000 06:52:46 -0800 (PST)
Sender: michael@ms.inka.de
Message-ID: <38B3F446.14816196@inka.de>
Date: Wed, 23 Feb 2000 15:52:54 +0100
From: Michael =?iso-8859-1?Q?Str=F6der?= <michael.stroeder@inka.de>
Organization: at Home
X-Mailer: Mozilla 4.7 [en] (X11; U; Linux 2.2.14 i586)
X-Accept-Language: de, en
MIME-Version: 1.0
To: Vincent Ryan <Vincent.Ryan@Ireland.Sun.COM>
Cc: ldap@umich.edu, ietf-ldapext@netscape.com
Subject: Re: [ldap] LDAP presentation format?
References: <LYR158878-64625-2000.02.21-05.04.05--michael.stroeder#inka.de@listserver.itd.umich.edu>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"U9sH1C.A.khE.9Q_s4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Vincent Ryan wrote:
> 
>  - text/directory MIME-type
>       http://www.ietf.org/rfc/rfc2425.txt
> 
>  - DSML (XML) format
>        http://www.dsml.org
> 
>  - LDIF file format
>        http://www.ietf.org/internet-drafts/draft-good-ldap-ldif-05.txt
> 
> I'm seeking responses from LDAP users and implementors on the relative
> merits of these 3 formats. In particular, I'm interested in determining
> which forms are widely supported in current or planned products.

IMHO LDIF is widely used.

To me text/directory looks not very handy and DSML looks very
promising (XML parsers can be used, easy transformation to HTML). I
will dig into that and probably implement DSML download in
http://web2ldap.de/.

Ciao, Michael.



From list@netscape.com  Thu Feb 24 02:28:42 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA24053
	for <ldapext-archive@odin.ietf.org>; Thu, 24 Feb 2000 02:28:42 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id XAA07527;
	Wed, 23 Feb 2000 23:19:00 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id XAA08816; Wed, 23 Feb 2000 23:22:55 -0800 (PST)
Resent-Date: Wed, 23 Feb 2000 23:22:55 -0800 (PST)
Message-Id: <s8b479d0.030@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.3.1
Date: Wed, 23 Feb 2000 18:11:59 -0700
From: "Jim Sermersheim" <JIMSE@novell.com>
To: <ietf-ldapext@netscape.com>
Subject: matchedValues control
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Resent-Message-ID: <"ex1DDC.A.eJC.NxNt4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ietf.org id CAA24053

There was a discussion last July - October around returning only the values of attributes that match the search filter. I know there were some sticky problems with complex filters, is anyone working on this (i.e. defining a control)?

Jim



From list@netscape.com  Thu Feb 24 06:23:51 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA25637
	for <ldapext-archive@odin.ietf.org>; Thu, 24 Feb 2000 06:23:50 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id DAA19310;
	Thu, 24 Feb 2000 03:20:31 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id DAA18843; Thu, 24 Feb 2000 03:22:32 -0800 (PST)
Resent-Date: Thu, 24 Feb 2000 03:22:32 -0800 (PST)
Sender: Sean.Mullan@Ireland.Sun.COM
Message-ID: <38B51472.461ADAF1@sun.com>
Date: Thu, 24 Feb 2000 11:22:26 +0000
From: Sean Mullan <sean.mullan@Sun.COM>
X-Mailer: Mozilla 4.51 [en] (X11; U; SunOS 5.7 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Jim Sermersheim <JIMSE@novell.com>
CC: ietf-ldapext@netscape.com
Subject: Re: matchedValues control
References: <s8b479d0.030@prv-mail20.provo.novell.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"FSi52C.A.FmE.3RRt4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Jim,

The consensus of the group seemed to be that the MVO control was too
difficult to implement with complex filters and that a different control was
preferable, one which allowed you to filter the returned values after 
the search.

David Chadwick and I (co-authors of MVO draft) were planning to write a new
draft describing the new control sometime in the next month or so.

--Sean

Jim Sermersheim wrote:
> 
> There was a discussion last July - October around returning only the values of attributes that match the search filter. I know there were some sticky problems with complex filters, is anyone working on this (i.e. defining a control)?
> 
> Jim



From list@netscape.com  Thu Feb 24 20:35:01 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA13978
	for <ldapext-archive@odin.ietf.org>; Thu, 24 Feb 2000 20:35:00 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id RAA27391;
	Thu, 24 Feb 2000 17:31:44 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id RAA28273; Thu, 24 Feb 2000 17:33:42 -0800 (PST)
Resent-Date: Thu, 24 Feb 2000 17:33:42 -0800 (PST)
Message-Id: <3.0.5.32.20000224173135.00926b30@pop.walltech.com>
X-Sender: bgreenblatt@pop.walltech.com
X-Mailer: QUALCOMM Windows Eudora Light Version 3.0.5 (32)
Date: Thu, 24 Feb 2000 17:31:35 -0800
To: "Sukanta Ganguly" <SGANGULY@novell.com>, <ietf-ldapext@netscape.com>
From: Bruce Greenblatt <bgreenblatt@directory-applications.com>
Subject: RE: draft-mmeredith-rootdse-vendor-info-02.txt
Cc: "Mark Meredith" <MMEREDIT@novell.com>
In-Reply-To: <s8ad23cd.023@prv-mail20.provo.novell.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"tz2OnD.A.G5G.1vdt4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

I understand that you don't want to look the information up in SNMP.  But,
why not?  It's already there, and SNMP is pretty lightweight (simple even).
 Do we really want to duplicate this vendor information in several places?
It could just as easily be added to SRV records in DNS?  What about all of
the other informaiton in RFC 2248 and RFC 2605?  Do you want to plop that
into the RootDSE as well?

Bruce

At 10:49 AM 2/18/00 -0700, Sukanta Ganguly wrote:
>   It is very difficult and unclear at this point whether we should assume 
>that all Internet Directory Client are in the position to talk different 
>Internet protocols. Instead of assuming that the Directory Client will talk
>SNMP  and query the MIB for getting the vendor specific information, why
>can't we  state that the Directory Client queries the rootDSE for the
>information and the  implementation would determine whether to go to the
>SNMP MIB for the information  or to have the vendor specific information,
>requested by Mark, within the  Directory Repository.   I think it will
>bring in more value to have the access to the information  through the
>rootDSE but at the same time leave the invididual implementations to 
>handle them. We all agree, based on the emails that I have seen flowing
>around  related to this matter, that the information is useful so why not
>provide the  flexibility.   Thanks Sukanta Ganguly sganguly@novell.com
>
>>>><>>>>
>At 09:13 AM 2/18/00 -0500, Peter Strong  wrote:
>>
>>>
>>>
>>> To be blunt, I don't believe  that there is much use for this draft.
>>
>>For those of us who  attempt to build applications that work with
>>multiple directory  implementations, this information is very useful.
>>
>
>   I said that
>  Get it from there, since that  is
>  I don't see much point in duplicating  this
>  In my opinion, a good internet directory client will  get
>information from a variety of internet servers: DNS, LDAP, SNMP, and  others.
>
>>> The information that it proposes to add to the Root DSE  is already
>>> published is
>>>  The
>>>  I think that this draft
>>> should just  point to RFC 2248 (and perhaps 2605) and explain where the
>>>  These are already standards  track
>>> documents, and have places to put the information that this  draft
defines.
>>> (Just my $0.02 worth)
>>
>>The products we  build are LDAP clients, not SNMP clients.
>>
>>This information should  be available via LDAP.
>>
>>>
>>>  Bruce
>>>  ==============================================
>>> Bruce Greenblatt, Ph.  D.
>>> Directory Tools and Application Services, Inc.
>>> http://www.directory-applications.com
>>>
>>
>>------------------------------------------------------------------------
>>Peter  Strong
>>Software Architect
>>Nortel Networks - Optivity Policy  Services (OPS) and NetID
>><>
>>(613)  831-6615
>>
>>
>>
>>
>>
>>
>==============================================
>Bruce  Greenblatt, Ph. D.
>Directory Tools and Application Services, Inc.
>http://www.directory-applications.com
>
> 
==============================================
Bruce Greenblatt, Ph. D.
Directory Tools and Application Services, Inc.
http://www.directory-applications.com



From list@netscape.com  Fri Feb 25 06:33:37 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA05159
	for <ldapext-archive@odin.ietf.org>; Fri, 25 Feb 2000 06:33:37 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id DAA09439;
	Fri, 25 Feb 2000 03:30:29 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id DAA18841; Fri, 25 Feb 2000 03:32:24 -0800 (PST)
Resent-Date: Fri, 25 Feb 2000 03:32:24 -0800 (PST)
Message-Id: <200002251132.GAA05032@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ietf-ldapext@netscape.com
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-ldapext-x509-sasl-03.txt
Date: Fri, 25 Feb 2000 06:32:19 -0500
Sender: nsyracus@cnri.reston.va.us
Resent-Message-ID: <"yPdcU.A.HmE.Hhmt4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the LDAP Extension Working Group of the IETF.

	Title		: X.509 Authentication SASL Mechanism
	Author(s)	: S. Kille
	Filename	: draft-ietf-ldapext-x509-sasl-03.txt
	Pages		: 10
	Date		: 24-Feb-00
	
This document defines a SASL [1] authentication mechanism based on X.509
strong authentication [3], providing two way authentication.  This
mechanism is only for authentication, and has no effect on the protocol
encodings and is not designed to provide integrity or confidentiality
services.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ldapext-x509-sasl-03.txt

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ldapext-x509-sasl-03.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ldapext-x509-sasl-03.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20000224111702.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ldapext-x509-sasl-03.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ldapext-x509-sasl-03.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20000224111702.I-D@ietf.org>

--OtherAccess--

--NextPart--




From list@netscape.com  Fri Feb 25 07:38:15 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA06231
	for <ldapext-archive@odin.ietf.org>; Fri, 25 Feb 2000 07:38:14 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id EAA05319;
	Fri, 25 Feb 2000 04:33:08 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id EAA27238; Fri, 25 Feb 2000 04:37:09 -0800 (PST)
Resent-Date: Fri, 25 Feb 2000 04:37:09 -0800 (PST)
From: HomeLoans@ns-3.fsnet.co.uk
Date: Thu, 24 Feb 00 16:56:22 EST
To: H0MEL0ANS@bigfoot.com
Subject: Home Loans & Refinancing Available
Message-ID: <>
Resent-Message-ID: <"z6I42.A.UpG.0dnt4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

You can now comparison shop thousands of loan
programs through hundreds of lenders by filling in
a single short form.  Let lenders compete for 
your business!

Cash back refinances
No Equity 2nd Trust Deeds
Debt Consolidation
No Income Verification
The most competitive interest rates.

Fill in our quick pre-qualification form and find 
out how much of a loan you would qualify for.

Visit this website: 

http://3633144587/homeloan/?SP0219
(If link doesn't come right up, try again later)

-Save Time
-Save Money
-Save Aggravation

There is NEVER any fee to consumers for using this service.


_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/
If you have received this message in error and would
like to be removed from future mailings, please reply
with the word remove in the subject.
_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/



From list@netscape.com  Fri Feb 25 09:15:07 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA08277
	for <ldapext-archive@odin.ietf.org>; Fri, 25 Feb 2000 09:15:06 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id GAA19049;
	Fri, 25 Feb 2000 06:11:51 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id GAA14086; Fri, 25 Feb 2000 06:13:54 -0800 (PST)
Resent-Date: Fri, 25 Feb 2000 06:13:54 -0800 (PST)
Message-ID: <01E1D01C12D7D211AFC70090273D20B10139D936@sothmxs06.entrust.com>
From: Mike Just <mike.just@entrust.com>
To: "'internet-drafts@ietf.org'" <internet-drafts@ietf.org>,
        "'LDAPExt'"
	 <ietf-ldapext@netscape.com>
Cc: "'Jim Sermersheim'" <JIMSE@novell.com>, "'Mark Smith'" <mcs@netscape.com>,
        Kristianne Leclair <kristianne.leclair@entrust.com>
Subject: draft-just-ldapv3-rescodes-01.txt
Date: Fri, 25 Feb 2000 09:13:40 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.21)
Content-Type: multipart/mixed;
	boundary="----_=_NextPart_000_01BF7F9A.84038EA0"
Resent-Message-ID: <"uSdpxC.A.0bD.g4ot4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_000_01BF7F9A.84038EA0
Content-Type: text/plain;
	charset="iso-8859-1"

Please publish this second draft of our document entitled "LDAPv3 Result
Codes: Definitions and Appropriate Use".   

Comments on this draft would be greatly appreciated.  

Changes from -00 include the addition of the following sections:
-  Sections 1.1 which describes the relationship to X.500;
-  Section 3 which overviews the draft contents; and
-  Section 6.1 which indicates the result codes applicable to all
operations.
In addition, there were several smaller changes.  

Mike Just

----------------------------------------

Abstract:
   The purpose of this document is to describe, in some detail, the
   meaning and use of the result codes used with the LDAPv3 protocol.
   Of particular importance are the error codes, which represent the
   majority of the result codes.  This document provides definitions for
   each result code, and outlines the expected behaviour of the various
   operations with respect to how result codes and in particular, error
   conditions should be handled and which specific error code should be
   returned.

   It is hoped that this document will facilitate interoperability
   between clients and servers and the development of intelligent LDAP
   clients capable of acting upon the results received from the server.


 <<draft-just-ldapv3-rescodes-01.txt>> 




------_=_NextPart_000_01BF7F9A.84038EA0
Content-Type: text/plain;
	name="draft-just-ldapv3-rescodes-01.txt"
Content-Disposition: attachment;
	filename="draft-just-ldapv3-rescodes-01.txt"
Content-Transfer-Encoding: quoted-printable




Internet Draft                                       Mike Just, Entrust
                                                    K. Leclair, Entrust
                                                Jim Sermersheim, Novell
                                                   Mark Smith, Netscape
Document: <draft-just-ldapv3-rescodes-01.txt>            February, 2000
Category: Standards Track


          LDAPv3 Result Codes: Definitions and Appropriate Use
                    <draft-just-ldapv3-rescodes-01.txt>


Status of this Memo

   This document is an Internet-Draft and is in full conformance with
      all provisions of Section 10 of RFC2026 [RFC2026].

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups. Note that =
other
   groups may also distribute working documents as Internet-Drafts.
   Internet-Drafts are draft documents valid for a maximum of six =
months
   and may be updated, replaced, or obsoleted by other documents at any
   time. It is inappropriate to use Internet- Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt
   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

1. Abstract

   The purpose of this document is to describe, in some detail, the
   meaning and use of the result codes used with the LDAPv3 protocol.
   Of particular importance are the error codes, which represent the
   majority of the result codes.  This document provides definitions =
for
   each result code, and outlines the expected behaviour of the various
   operations with respect to how result codes and in particular, error
   conditions should be handled and which specific error code should be
   returned.

   It is hoped that this document will facilitate interoperability
   between clients and servers and the development of intelligent LDAP
   clients capable of acting upon the results received from the server.

1.1 Relationship to X.500

   The LDAPv3 RFC [RFC2251] states that "An LDAP server MUST act in
   accordance with the X.500(1993) series of ITU recommendations when
   providing the service. However, it is not required that an LDAP
   server make use of any X.500 protocols in providing this service,
   e.g. LDAP can be mapped onto any other directory system so long as
   the X.500 data and service model as used in LDAP is not violated in
   the LDAP interface." This means that there are two types of LDAP

Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                     1
=0C
         LDAPv3 Result Codes: Definitions and Appropriate Use Feb, 2000

   servers, those that act as a front end to an X.500 directory, and
   stand alone LDAP servers which use some other form of repository as
   the back end.

   Because of differences between X.500 and LDAP there may be some
   differences in behaviour between LDAP-only servers and LDAP servers
   that act as front ends to X.500 DSAs. One such difference is the
   definition of specific access controls for X.500. X.500 defines the
   discloseOnError permission, an access control parameter for which
   there is currently no equivalent defined for LDAP. If an LDAP server
   is acting as a front end to an X.500 DSA then it may return
   noSuchObject when the target entry is found but the client does not
   have permission to view or modify the entry. Unless the server
   implements X.500 style access controls LDAP-only servers should only
   return noSuchObject when the target entry is not found until such
   time that similar access controls are defined for LDAP only servers.
   Because the client may not know what sort of LDAP server it is
   communicating with it should not rely on the behaviour of the server
   in this respect.


2. Conventions used in this document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED",  "MAY", and "OPTIONAL" in =
this
   document are to be interpreted as described in RFC-2119 [RFC2119].

3. Overview

   This document collects and refines the definitions and descriptions
   for LDAPv3 result codes, as found in a variety of sources (see
   Section 8).  In some cases, material from these sources was absent,
   inadequate or ambiguous.  It is the hope of this document to
   present consistent definitions and descriptions of LDAPv3 result
   codes.

   This document consists of two major sections facilitating =
information
   searches based on either a particular result code, or LDAP =
operation.

   Section 5 presents a glossary for the result codes.  Firstly, each =
is
   classified as either an erroneous or non-erroneous result.  The
   erroneous results, or error codes, are further classified based on
   the types of error codes defined in X.511 [X511].  Some
   reclassification was performed where appropriate.  For each result
   code, a definition, and list of operations that could return this
   code are given.  In addition, Section 5.3 specifies error =
precedence,
   based on error type, as given in X.511 [X511].

   Section 6 describes, for each operation, the result codes that could
   be returned for that operation.  Firstly, Section 6.1 enumerates
   those result codes that are applicable to all operations.  Within
   each remaining section (which is specific to each operation), the
   error codes are ordered as to the precedence of their parent type, =
as
   specified in Section 5.3.

Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                     2
=0C
         LDAPv3 Result Codes: Definitions and Appropriate Use Feb, 2000


   Also, Appendix A (Section 11) presents a simple matrix that =
indicates
   valid operation/result code pairs in LDAPv3.

4. Table of Contents

   1. Abstract........................................................1
 1.1 Relationship to X.500...........................................1
   2. Conventions used in this document...............................2
   3. Overview........................................................2
   4. Table of Contents...............................................3
   5. Result Codes in LDAPv3..........................................5
 5.1 Description of Non-Erroneous Result Codes.......................6
  5.1.1 success(0)...................................................6
  5.1.2 compareFalse(5)..............................................6
  5.1.3 compareTrue(6)...............................................6
  5.1.4 referral(10).................................................7
  5.1.5 saslBindInProgress(14).......................................7
 5.2 Description of Error Codes......................................7
  5.2.1 General Error Codes..........................................7
    5.2.1.1 operationsError(1).......................................7
    5.2.1.2 protocolError(2).........................................8
    5.2.1.3 other(80)................................................8
  5.2.2 Specific Error Codes.........................................8
    5.2.2.1 Attribute Problem Error Codes............................8
     5.2.2.1.1 noSuchAttribute(16)...................................8
     5.2.2.1.2 undefinedAttributeType(17)............................8
     5.2.2.1.3 inappropriateMatching(18).............................9
     5.2.2.1.4 constraintViolation(19)...............................9
     5.2.2.1.5 attributeOrValueExists(20)............................9
     5.2.2.1.6 invalidAttributeSyntax(21)............................9
    5.2.2.2 NameProblem Error Codes..................................9
     5.2.2.2.1 noSuchObject(32)......................................9
     5.2.2.2.2 aliasProblem(33).....................................10
     5.2.2.2.3 invalidDNSyntax(34)..................................10
     5.2.2.2.4 aliasDereferencingProblem(36)........................10
    5.2.2.3 SecurityProblem Error Codes.............................10
     5.2.2.3.1 authMethodNotSupported(7)............................10
     5.2.2.3.2 strongAuthRequired(8)................................10
     5.2.2.3.3 confidentialityRequired(13)..........................11
     5.2.2.3.4 inappropriateAuthentication(48)......................11
     5.2.2.3.5 invalidCredentials(49)...............................11
     5.2.2.3.6 insufficientAccessRights(50).........................11
    5.2.2.4 ServiceProblem Error Codes..............................12
     5.2.2.4.1 timeLimitExceeded(3).................................12
     5.2.2.4.2 sizeLimitExceeded(4).................................12
     5.2.2.4.3 adminLimitExceeded(11)...............................12
     5.2.2.4.4 unavailableCriticalExtension(12).....................12
     5.2.2.4.5 busy(51).............................................13
     5.2.2.4.6 unavailable(52)......................................13
     5.2.2.4.7 unwillingToPerform(53)...............................13
     5.2.2.4.8 loopDetect(54).......................................13
    5.2.2.5 UpdateProblem Error Codes...............................13
     5.2.2.5.1 namingViolation(64)..................................14

Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                     3
=0C
         LDAPv3 Result Codes: Definitions and Appropriate Use Feb, 2000

     5.2.2.5.2 objectClassViolation(65).............................14
     5.2.2.5.3 notAllowedOnNonLeaf(66)..............................14
     5.2.2.5.4 notAllowedOnRDN(67)..................................14
     5.2.2.5.5 entryAlreadyExists(68)...............................14
     5.2.2.5.6 objectClassModsProhibited(69)........................15
     5.2.2.5.7 affectsMultipleDSAs(71)..............................15
 5.3 Error Precedence...............................................15
   6 LDAP Operations.................................................15
 6.1 Common Result Codes............................................16
  6.1.1 Non-erroneous results.......................................16
  6.1.2 Security Errors.............................................16
  6.1.3 Service Errors..............................................16
  6.1.4 General Errors..............................................17
 6.2 Bind Operation Errors..........................................17
  6.2.1 Non-erroneous results.......................................17
  6.2.2 Name Errors.................................................17
  6.2.3 Security Errors.............................................17
 6.3 Search Operation Errors........................................17
  6.3.1 Name Errors.................................................18
  6.3.2 Attribute Errors............................................18
  6.3.3 Security Errors.............................................18
  6.3.4 Service Errors..............................................18
 6.4 Modify Operation Errors........................................19
  6.4.1 Name Errors.................................................19
  6.4.2 Update Errors...............................................19
  6.4.3 Attribute Errors............................................19
  6.4.4 Security Errors.............................................20
 6.5 Add Operation Errors...........................................20
  6.5.1 Name Errors.................................................20
  6.5.2 Update Errors...............................................20
  6.5.3 Attribute Errors............................................20
  6.5.4 Security Errors.............................................21
 6.6 Delete Operation Errors........................................21
  6.6.1 Name Errors.................................................21
  6.6.2 Update Errors...............................................21
  6.6.3 Security Errors.............................................21
 6.7 ModifyDN Operation Errors......................................21
  6.7.1 Name Errors.................................................22
  6.7.2 Update Errors...............................................22
  6.7.3 Attribute Errors............................................22
  6.7.4 Security Errors.............................................23
 6.8 Compare Operation Errors.......................................23
  6.8.1 Name Errors.................................................23
  6.8.2 Attribute Errors............................................23
  6.8.3 Security Errors.............................................23
  6.8.4 Example.....................................................24
 6.9 Extended Operation Errors......................................24
 6.10 Operations with no Server Response............................25
 6.11 Unsolicited Notification......................................25
   7. Security Considerations........................................25
   8. References.....................................................25
   9. Acknowledgments................................................26
   10. Author's Addresses............................................26
   11 Appendix A: Operation/Response Matrix..........................27

Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                     4
=0C
         LDAPv3 Result Codes: Definitions and Appropriate Use Feb, 2000

   12 Full Copyright Statement.......................................29

5. Result Codes in LDAPv3

   In this section, a glossary of the result codes that may be returned
   from a server to a client is provided.  This section is meant to
   provide a central, unified source for these definitions.  RFC 2251
   [RFC2251] and X.511 [X511] were primary sources, forming the basis
   for the definitions given in this section.

   LDAP v3 [RFC2251] defines the following result message for return
   from the server to the client, where =91
                                        =91new=92
                                             =92 indicates those codes
   that were not used in LDAP v2.

   LDAPResult ::=3D SEQUENCE {
        resultCode      ENUMERATED {
                success                      (0),
                operationsError              (1),
                protocolError                (2),
                timeLimitExceeded            (3),
                sizeLimitExceeded            (4),
                compareFalse                 (5),
                compareTrue                  (6),
                authMethodNotSupported       (7),
                strongAuthRequired           (8),
                -- 9 reserved --
                referral                     (10),  -- new
                adminLimitExceeded           (11),  -- new
                unavailableCriticalExtension (12),  -- new
                confidentialityRequired      (13),  -- new
                saslBindInProgress           (14),  -- new
                noSuchAttribute              (16),
                undefinedAttributeType       (17),
                inappropriateMatching        (18),
                constraintViolation          (19),
                attributeOrValueExists       (20),
                invalidAttributeSyntax       (21),
                -- 22-31 unused --
                noSuchObject                 (32),
                aliasProblem                 (33),
                invalidDNSyntax              (34),
                -- 35 reserved for undefined isLeaf --
                aliasDereferencingProblem    (36),
                -- 37-47 unused --
                inappropriateAuthentication  (48),
                invalidCredentials           (49),
                insufficientAccessRights     (50),
                busy                         (51),
                unavailable                  (52),
                unwillingToPerform           (53),
                loopDetect                   (54),
                -- 55-63 unused --
                namingViolation              (64),
                objectClassViolation         (65),

Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                     5
=0C
         LDAPv3 Result Codes: Definitions and Appropriate Use Feb, 2000

                notAllowedOnNonLeaf          (66),
                notAllowedOnRDN              (67),
                entryAlreadyExists           (68),
                objectClassModsProhibited    (69),
                -- 70 reserved for CLDAP --
                affectsMultipleDSAs          (71), -- new
                -- 72-79 unused --
                other                        (80) },
                -- 81-90 reserved for APIs --
        matchedDN       LDAPDN,
        errorMessage    LDAPString,
        referral        [3] Referral OPTIONAL }

   If a client receives a result code that is not listed above, it is =
to
   be treated as an unknown error condition.

   The LDAP result includes an errorMessage field, which may, at the
   server's option, be used to return a string containing a textual,
   human-readable error diagnostic. As this error diagnostic is not
   standardized, implementations MUST NOT rely on the values returned.
   If the server chooses not to return a textual diagnostic, the
   errorMessage field of the LDAPResult type MUST contain a zero length
   string.

   In the following subsections, definitions for each result code are
   provided.  In addition, the operations that may return each result
   code are also identified.  The set of all operations consists of the
   following: Bind; Search; Modify; Add; Delete; ModifyDN; Extended; =
and
   Compare.

5.1 Description of Non-Erroneous Result Codes

   Five result codes that may be returned in LDAPResult are not used to
   indicate an error.  These result codes are listed below.  The first
   three codes, indicate to the client that no further action is
   required in order to satisfy their request.  In contrast, the last
   two errors require further action by the client in order to complete
   their original operation request.

5.1.1 success(0)

   Applicable operations: all except for Compare.

   This result code does not indicate an error. It is returned when the
   client operation completed successfully.

5.1.2 compareFalse(5)

   Applicable operations: Compare.

   This result code does not indicate an error.  It is used to indicate
   that the result of a Compare operation is FALSE.

5.1.3 compareTrue(6)

Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                     6
=0C
         LDAPv3 Result Codes: Definitions and Appropriate Use Feb, 2000


   Applicable operations: Compare.

   This result code does not indicate an error.  It is used to indicate
   that the result of a Compare operation is TRUE.

5.1.4 referral(10)

   Applicable operations: all.

   This result code is new in LDAPv3.  Rather than indicating an error,
   this result code is used to indicate that the server does not hold
   the target entry of the request but is able to provide alternative
   servers that may.  A set of server(s) URLs may be returned in the
   referral field, which the client may subsequently query to attempt =
to
   complete their operation.

5.1.5 saslBindInProgress(14)

   Applicable operations: Bind.

   This result code is new in LDAPv3.  This result code is not an error
   response from the server, but rather, is a request for bind
   continuation.  The server requires the client to send a new bind
   request, with the same SASL mechanism, to continue the =
authentication
   process [RFC2251, Section 4.2.3].

5.2 Description of Error Codes

   General error codes (see Section 5.2.1) are typically returned only
   when no suitable specific error exists.  Specific error codes (see
   Section 5.2.2) are meant to capture situations that are specific to
   the requested operation.

5.2.1 General Error Codes

   A general error code typically specifies an error condition for =
which
   there is no suitable specific error code. If the server can return =
an
   error, which is more specific than the following general errors, =
then
   the specific error should be returned instead.

5.2.1.1 operationsError(1)

   Applicable operations: all.

   This error code is returned when the server encounters an internal
   error and is unable to respond with a more specific result code, as =
a
   result of this internal error.  This may occur, for example, if
   sufficient memory to handle a request cannot be allocated by the
   server.

   Note that an operationsError indicates that the server is unable to
   properly respond to a request, but does not indicate that the client
   has sent an erroneous message.  For example, in the case that a

Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                     7
=0C
         LDAPv3 Result Codes: Definitions and Appropriate Use Feb, 2000

   malformed request is received and the server does not experience an
   internal error, a protocol error should be returned (see Section
   5.2.1.2).

5.2.1.2 protocolError(2)

   Applicable operations: all.

   A protocol error should be returned by the server when an invalid or
   malformed request is received from the client. This may be a request
   that is not recognized as an LDAP request, for example, if a
   nonexistent operation were specified in LDAPMessage.  As well, it =
may
   be the result of a request that is missing a required parameter, =
such
   as a search filter in a search request. If the server can return an
   error, which is more specific than protocolError, then this error
   should be returned instead. For example if the server does not
   recognize the authentication method requested by the client then the
   error authMethodNotSupported should be returned instead of
   protocolError. The server may return details of the error in the
   error string.

5.2.1.3 other(80)

   Applicable operations: all.

   This error code should be returned only if no other error code is
   suitable.  Use of this error code should be avoided if possible.
   Details of the error should be provided in the error message.

5.2.2 Specific Error Codes

   Specific errors are used to indicate that a particular type of error
   has occurred.  These error types are Name, Update, Attribute,
   Security, and Service.

5.2.2.1 Attribute Problem Error Codes

   An attribute error reports a problem related to an attribute
   specified by the client in their request message.

5.2.2.1.1 noSuchAttribute(16)

   Applicable operations: Modify, Compare.

   This error may be returned if the attribute specified as an argument
   of the operation does not exist in the entry.

5.2.2.1.2 undefinedAttributeType(17)

   Applicable operations: Modify, Add.

   This error may be returned if the specified attribute is =
unrecognized
   by the server, since it is not present in the server=92s defined
   schema. If the server doesn=92t recognize an attribute specified in =
a

Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                     8
=0C
         LDAPv3 Result Codes: Definitions and Appropriate Use Feb, 2000

   search request as the attribute to be returned the server should not
   return an error in this case - it should just return values for the
   requested attributes it does recognize. Note that this result code
   only applies to the Add and Modify operations [X.511, Section 12.4].

5.2.2.1.3 inappropriateMatching(18)

   Applicable operations: Search.

   An attempt was made, e.g., in a filter, to use a matching rule not
   defined for the attribute type concerned [X511, Section 12.4].

5.2.2.1.4 constraintViolation(19)

   Applicable operations: Modify, Add, ModifyDN.

   This error should be returned by the server if an attribute value
   specified by the client violates the constraints placed on the
   attribute as it was defined in the DSA - this may be a size
   constraint or a constraint on the content.

5.2.2.1.5 attributeOrValueExists(20)

   Applicable operations: Modify, Add.

   This error should be returned by the server if the value specified =
by
   the client already exists within the attribute.

5.2.2.1.6 invalidAttributeSyntax(21)

   Applicable operations: Modify, Add.

   This error should be returned by the server if the attribute syntax
   for the attribute value, specified as an argument of the operation,
   is unrecognized or invalid.

5.2.2.2 NameProblem Error Codes

   A name error reports a problem related to the distinguished name
   provided as an argument to an operation [X511, Section 12.5].

   For result codes of noSuchObject, aliasProblem, invalidDNSyntax and
   aliasDereferencingProblem, the matchedDN field is set to the name of
   the lowest entry (object or alias) in the directory that was =
matched.
   If no aliases were dereferenced while attempting to locate the =
entry,
   this will be a truncated form of the name provided, or if aliases
   were dereferenced, of the resulting name, as defined in section 12.5
   of X.511 [X511]. The matchedDN field is to be set to a zero length
   string with all other result codes [RFC2251, Section 4.1.10].

5.2.2.2.1 noSuchObject(32)

   Applicable operations: all except for Bind.


Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                     9
=0C
         LDAPv3 Result Codes: Definitions and Appropriate Use Feb, 2000

   This error should only be returned if the target object cannot be
   found. For example, in a search operation if the search base can not
   be located in the DSA the server should return noSuchObject. If,
   however, the search base is found but does not match the search
   filter, success, with no resultant objects, should be returned
   instead of noSuchObject.

   If the LDAP server is a front end for an X.500 DSA then noSuchObject
   may also be returned if discloseOnError is not granted for an entry
   and the client does not have permission to view or modify the entry.

5.2.2.2.2 aliasProblem(33)

   Applicable operations: Search.

   An alias has been dereferenced which names no object [X511, Section
   12.5].

5.2.2.2.3 invalidDNSyntax(34)

   Applicable operations: all.

   This error should be returned by the server if the DN syntax is
   incorrect. It should not be returned if the DN is correctly formed
   but represents an entry which is not permitted by the structure =
rules
   at the DSA; in this case namingViolation should be returned instead.

5.2.2.2.4 aliasDereferencingProblem(36)

   Applicable operations: Search.

   An alias was encountered in a situation where it was not allowed or
   where access was denied [X511, Section 12.5].

   For example, if the client does not have read permission for the
   aliasedObjectName attribute and its value then the error
   aliasDereferencingProblem should be returned. [X511, Section
   7.11.1.1]

5.2.2.3 SecurityProblem Error Codes

   A security error reports a problem in carrying out an operation for
   security reasons [X511, Section 12.7].

5.2.2.3.1 authMethodNotSupported(7)

   Applicable operations: Bind.

   This error code should be returned if the client requests, in a Bind
   request, an authentication method which is not supported or
   recognized by the server.

5.2.2.3.2 strongAuthRequired(8)


Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                    10
=0C
         LDAPv3 Result Codes: Definitions and Appropriate Use Feb, 2000

   Applicable operations: all.

   This error may be returned on a bind request if the server only
   accepts strong authentication or it may be returned when a client
   attempts an operation which requires the client to be strongly
   authenticated - for example Delete.

   This result code may also be returned in an unsolicited notice of
   disconnection if the server detects that an established underlying
   security association protecting communication between the client and
   server has unexpectedly failed or been compromised. [RFC2251, =
Section
   4.4.1]

5.2.2.3.3 confidentialityRequired(13)

   Applicable operations: all.

   This error code is new in LDAPv3. This error code may be returned if
   the session is not protected by a protocol which provides session
   confidentiality. For example, if the client did not establish a TLS
   connection using a cipher suite which provides confidentiality of =
the
   session before sending any other requests, and the server requires
   session confidentiality then the server may reject that request with
   a result code of confidentialityRequired.

5.2.2.3.4 inappropriateAuthentication(48)

   Applicable operations: Bind.

   This error should be returned by the server when the client has =
tried
   to use a method of authentication that is inappropriate, that is a
   method of authentication which the client is unable to use =
correctly.
   In other words, the level of security associated with the =
requestor=92s
   credentials is inconsistent with the level of protection requested,
   e.g. simple credentials were supplied while strong credentials were
   required [X511, Section 12.7].

5.2.2.3.5 invalidCredentials(49)

   Applicable operations: Bind.

   This error code is returned if the DN or password used in a simple
   bind operation is incorrect, or if the DN or password is incorrect
   for some other reason, e.g. the password has expired.  This result
   code only applies to Bind operations -- it should not be returned =
for
   other operations if the client does not have sufficient permission =
to
   perform the requested operation - in this case the return code =
should
   be insufficientAccessRights.

5.2.2.3.6 insufficientAccessRights(50)

   Applicable operations: all except for Bind.



Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                    11
=0C
         LDAPv3 Result Codes: Definitions and Appropriate Use Feb, 2000

   The requestor does not have the right to carry out the requested
   operation [X511, Section 12.7].

5.2.2.4 ServiceProblem Error Codes

   A service error reports a problem related to the provision of the
   service [X511, Section 12.8].

5.2.2.4.1 timeLimitExceeded(3)

   Applicable operations: all.

   This error should be returned when the time to perform an operation
   has exceeded either the time limit specified by the client (which =
may
   only be set by the client in a search operation) or the limit
   specified by the server.  If the time limit is exceeded on a search
   operation then the result is an arbitrary selection of the
   accumulated results [X511, Section 7.5].  Note that an arbitrary
   selection of results may mean that no results are returned to the
   client.

   If the LDAP server is a front end for an X.500 server, any operation
   that is chained may exceed the timelimit, therefore clients can
   expect to receive timelimitExceeded for all operations. For stand
   alone LDAP-Servers that do not implement chaining it is unlikely =
that
   operations other than search operations will exceed the defined
   timelimit.


5.2.2.4.2 sizeLimitExceeded(4)

   Applicable operations: Search.

   This error should be returned when the number of results generated =
by
   a search exceeds the maximum number of results specified by either
   the client or the server. If the size limit is exceeded then the
   results of a search operation will be an arbitrary selection of the
   accumulated results, equal in number to the size limit [X511, =
Section
   7.5].

5.2.2.4.3 adminLimitExceeded(11)

   Applicable operations: all.

   This error code is new in LDAPv3.  The server has reached some limit
   set by an administrative authority, and no partial results are
   available to return to the user [X511, Section 12.8].  For example,
   there may be an administrative limit to the number of entries a
   server will check when gathering potential search result candidates
   [Net].

5.2.2.4.4 unavailableCriticalExtension(12)

   Applicable operations: all.

Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                    12
=0C
         LDAPv3 Result Codes: Definitions and Appropriate Use Feb, 2000


   This error code is new in LDAPv3.  The server was unable to satisfy
   the request because one or more critical extensions were not
   available [X511, Section 12.8]. This error is returned, for example,
   when a control submitted with a request is marked critical but is =
not
   recognized by a server or when such a control is not appropriate for
   the operation type. [RFC2251 section 4.1.12].

5.2.2.4.5 busy(51)

   Applicable operations: all.

   This error code may be returned if the server is unable to process
   the client=92s request at this time. This implies that if the client
   retries the request shortly the server will be able to process it
   then.

5.2.2.4.6 unavailable(52)

   Applicable operations: all.

   This error code is returned when the server is unavailable to =
process
   the client=92s request. This usually means that the LDAP server is
   shutting down [RFC2251, Section 4.2.3].

5.2.2.4.7 unwillingToPerform(53)

   Applicable operations: all.

   This error code should be returned by the server when a client
   request is properly formed but which the server is unable to =
complete
   due to server-defined restrictions.  For example, the server, or =
some
   part of it, is not prepared to execute this request, e.g. because it
   would lead to excessive consumption of resources or violates the
   policy of an Administrative Authority involved [X511, Section 12.8].
   If the server is able to return a more specific error code such as
   adminLimitExceeded it should. This error may also be returned if the
   client attempts to modify attributes which can not be modified by
   users, e.g., operational attributes such as creatorsName or
   createTimestamp [X511, Section 7.12]. If appropriate, details of the
   error should be provided in the error message.

5.2.2.4.8 loopDetect(54)

   Applicable operations: all.

   This error may be returned by the server if it detects an alias or
   referral loop, and is unable to satisfy the client=92s request.

5.2.2.5 UpdateProblem Error Codes

   An update error reports problems related to attempts to add, delete,
   or modify information in the DIB [X511, Section 12.9].


Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                    13
=0C
         LDAPv3 Result Codes: Definitions and Appropriate Use Feb, 2000

5.2.2.5.1 namingViolation(64)

   Applicable operations: Add, ModifyDN.

   The attempted addition or modification would violate the structure
   rules of the DIT as defined in the directory schema and X.501.  That
   is, it would place an entry as the subordinate of an alias entry, or
   in a region of the DIT not permitted to a member of its object =
class,
   or would define an RDN for an entry to include a forbidden attribute
   type [X511, Section 12.9].

5.2.2.5.2 objectClassViolation(65)

   Applicable operations: Modify, Add, ModifyDN.

   This error should be returned if the operation requested by the user
   would violate the objectClass requirements for the entry if carried
   out. On an add or modify operation this would result from trying to
   add an object class without a required attribute, or by trying to =
add
   an attribute which is not permitted by the current object class set
   in the entry. On a modify operation this may result from trying to
   remove a required attribute without removing the associated =
auxiliary
   object class, or by attempting to remove an object class while the
   attributes it permits are still present.

5.2.2.5.3 notAllowedOnNonLeaf(66)

   Applicable operations: Delete, ModifyDN.

   This operation should be returned if the client attempts to perform
   an operation which is permitted only on leaf entries - e.g., if the
   client attempts to delete a non-leaf entry.  If the directory does
   not permit ModifyDN for non-leaf entries then this error may be
   returned if the client attempts to change the DN of a non-leaf =
entry.
   (Note that 1988 edition X.500 servers only permitted change of the
   RDN of an entry's DN [X.511, Section 11.4.1]).

5.2.2.5.4 notAllowedOnRDN(67)

   Applicable operations: Modify.

   The attempted operation would affect the RDN (e.g., removal of an
   attribute which is a part of the RDN) [X511, Section 12.9].  If the
   client attempts to remove from an entry any of its distinguished
   values, those values which form the entry's relative distinguished
   name the server should return the error notAllowedOnRDN. [RFC2251,
   Section 4.6]

5.2.2.5.5 entryAlreadyExists(68)

   Applicable operations: Add, ModifyDN.




Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                    14
=0C
         LDAPv3 Result Codes: Definitions and Appropriate Use Feb, 2000

   This error should be returned by the server when the client attempts
   to add an entry which already exists, or if the client attempts to
   rename an entry with the name of an entry which exists.

5.2.2.5.6 objectClassModsProhibited(69)

   Applicable operations: Modify.

   An operation attempted to modify an object class that should not be
   modified, e.g., the structural object class of an entry.  Some
   servers may not permit object class modifications, especially
   modifications to the structural object class since this may change
   the entry entirely, name forms, structure rules etc. [X.511, Section
   12.9].

5.2.2.5.7 affectsMultipleDSAs(71)

   Applicable operations: ModifyDN.

   This error code is new for LDAPv3. This error code should be =
returned
   to indicate that the operation could not be performed since it
   affects more than one DSA.

   X.500 restricts the ModifyDN operation to only affect entries that
   are contained within a single server. If the LDAP server is mapped
   onto DAP, then this restriction will apply, and the resultCode
   affectsMultipleDSAs will be returned if this error occurred. In
   general clients MUST NOT expect to be able to perform arbitrary
   movements of entries and subtrees between servers [RFC2251, Section
   4.9].

5.3 Error Precedence

   A server MUST return only a single result code to a client.  The
   following list specifies the precedence of errors in the case that
   more than one error is detected [X511]:

   1. Specific Errors;
        i. Name Errors;
        ii. Update Errors;
        iii. Attribute Errors;
        iv. Security Errors;
        v. Service Errors;
   2. General Errors.

6 LDAP Operations

   LDAP v3 [RFC2251] defines the following LDAPMessage for conveyance =
of
   the intended operation request from the client to the server.

   LDAPMessage ::=3D SEQUENCE {
        messageID   MessageID,
        protocolOp  CHOICE {
                bindRequest     BindRequest,

Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                    15
=0C
         LDAPv3 Result Codes: Definitions and Appropriate Use Feb, 2000

                bindResponse    BindResponse,
                unbindRequest   UnbindRequest,
                searchRequest   SearchRequest,
                searchResEntry  SearchResultEntry,
                searchResDone   SearchResultDone,
                searchResRef    SearchResultReference,
                modifyRequest   ModifyRequest,
                modifyResponse  ModifyResponse,
                addRequest      AddRequest,
                addResponse     AddResponse,
                delRequest      DelRequest,
                delResponse     DelResponse,
                modDNRequest    ModifyDNRequest,
                modDNResponse   ModifyDNResponse,
                compareRequest  CompareRequest,
                compareResponse CompareResponse,
                abandonRequest  AbandonRequest,
                extendedReq     ExtendedRequest,
                extendedResp    ExtendedResponse },
        controls       [0] Controls OPTIONAL }

   MessageID ::=3D INTEGER (0 .. maxInt)

   maxInt INTEGER ::=3D 2147483647 -- (2^^31 - 1) -

   Starting in Section 6.2, behaviour regarding the return of each
   result code is specified for each operation.  Section 6.1 indicates
   those result codes that are typically applicable to all operations.

6.1 Common Result Codes

   The following result codes are applicable to, and may be returned in
   response to all operations (except where stated otherwise).

6.1.1 Non-erroneous results

   For all but a Compare operation, a success(0) result code will be
   returned in the case that the requested operation succeeds; a
   compareTrue would be returned for a Compare operation.  For each
   operation, the server may return referral(10), as defined in Section
   5.1.4.

6.1.2 Security Errors

   Of the six possible security errors, two may be returned in response
   to every operation.  These two errors are strongAuthRequired(8) and
   confidentialityRequired(13).

6.1.3 Service Errors

   All service errors, except sizeLimitExceeded(4) may be returned in
   response to any LDAP v3 operation.  sizeLimitExceeded is only
   applicable to the Search operation.


Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                    16
=0C
         LDAPv3 Result Codes: Definitions and Appropriate Use Feb, 2000

6.1.4 General Errors

   All general errors are applicable to all operations. The list of
   general errors includes operationsError, protocolError, and other.

6.2 Bind Operation Errors

   If the bind operation succeeds then a result code of success will be
   returned to the client. If the server does not hold the target entry
   of the request, a referral(10) may be returned.  If the operation
   fails then the result code will be one of the following from the set
   of non-erroneous result, name errors, security errors, service
   errors, and general errors.

   If the server does not support the client's requested protocol
   version, it MUST set the resultCode to protocolError.
   If the client receives a BindResponse response where the resultCode
   was protocolError, it MUST close the connection as the server will =
be
   unwilling to accept further operations. (This is for compatibility
   with earlier versions of LDAP, in which the bind was always the =
first
   operation, and there was no negotiation.) [RFC2251, Section 5.2.3]

   The remaining errors listed in this section are operation-specific.
   An operation may also result in the return of any of the common
   errors, as listed in Section 6.1.

6.2.1 Non-erroneous results

   In addition to success or referral, the following non-erroneous
   result code may be returned:

   saslBindInProgress: the server requires the client to send a new =
bind
   request, with the same sasl mechanism, to continue the =
authentication
   process,

6.2.2 Name Errors

   invalidDNSyntax: the DN provided does not have the correct syntax,

6.2.3 Security Errors

   As stated in Section 6.1.2, strongAuthRequired(8) and
   confidentialityRequired(13) may be returned for any operation.

   authMethodNotSupported: unrecognized SASL mechanism name,

   inappropriateAuthentication: the server requires the client which =
had
   attempted to bind anonymously or without supplying credentials to
   provide some form of credentials,

   invalidCredentials: the wrong password was supplied or the SASL
   credentials could not be processed, [RFC2251, Section 4.2.3]

6.3 Search Operation Errors

Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                    17
=0C
         LDAPv3 Result Codes: Definitions and Appropriate Use Feb, 2000


   X.500 provides three separate operations for searching the directory
   - Read of a single entry, List of an entry=92s children and search =
of
   an entire sub-tree. LDAP provides a single search operation, however
   the X.500 operations can be simulated by using base, one-level and
   sub-tree scope restrictions respectively.

   If the Search operation succeeds then zero or more search entries
   will be returned followed by a search result of success. If the
   server does not hold the target entry of the request, a referral(10)
   may be returned.  If the search operation fails then zero or more
   search entries will be returned followed by a search result
   containing one of the following result codes from the set of name
   errors, attribute errors, security errors, service errors, and
   general errors.

   The remaining errors listed in this section are operation-specific.
   An operation may also result in the return of any of the common
   errors, as listed in Section 6.1.

6.3.1 Name Errors

   noSuchObject: the base object, for the search, does not exist.

   aliasProblem: an alias was dereferenced which named no object.

   invalidDNSyntax: the DN provided for the search base does not have
   the correct syntax,

   aliasDereferenceProblem: The client does not have permission for the
   aliasedObjectName attribute or to search the dereferenced alias
   object.

6.3.2 Attribute Errors

   inappropriateMatching: an attempt was made to use a matching rule =
not
   defined for an attribute in the search filter.

6.3.3 Security Errors

   As stated in Section 6.1.2, strongAuthRequired(8) and
   confidentialityRequired(13) may be returned for any operation.

   insufficientAccessRights: The requestor does not have sufficient
   permissions to perform the search.

6.3.4 Service Errors

   In addition to the common service errors indicated in Section 6.1.3,
   the following service error may also be returned:

   sizeLimitExceeded: the number of search results exceeds the size
   limit specified by the client or the server. If the server has


Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                    18
=0C
         LDAPv3 Result Codes: Definitions and Appropriate Use Feb, 2000

   defined a maximum PDU size, this error may also be returned if the
   size of the combined results exceeds this limit.

6.4 Modify Operation Errors

   The Modify operation cannot be used to remove from an entry any of
   its distinguished values, those values that form the entry's =
relative
   distinguished name. An attempt to do so will result in the server
   returning the error notAllowedOnRDN. The Modify DN Operation
   described in section 5.9 is used to rename an entry. [RFC2251,
   Section 4.6]

   If the modify operation succeeds, a result code of success will be
   returned to the client. If the server does not hold the target entry
   of the request, a referral(10) may be returned.  If the operation
   fails, the result code will be one of the following from the set of
   name errors, update errors, attribute errors, security errors,
   service errors, and general errors.

   The remaining errors listed in this section, are operation-specific.
   An operation may also result in the return of any of the common
   errors, as listed in Section 6.1.

6.4.1 Name Errors

   noSuchObject: the target object does not exist.

   invalidDNSyntax: the DN provided does not have the correct syntax,

6.4.2 Update Errors

   objectClassViolation: An attempt was made to modify an object which
   is illegal according to its object class definition in the schema or
   DIT content rules for that object class.

   notAllowedOnRDN: An attempt was made to modify the object entry=92s
   distinguished name

   objectClassModsProhibited: The modification attempted to change an
   entry=92s object class which is not allowed.

6.4.3 Attribute Errors

   noSuchAttribute: the attribute to be modified does not exist in the
   target entry.

   undefinedAttributeType: The attribute specified does not exist in =
the
   server's defined schema.

   constraintViolation: The modification would create an attribute =
value
   outside the normal bounds.

   attributeOrValueExists: The modification would create a value which
   already exists within the attribute.

Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                    19
=0C
         LDAPv3 Result Codes: Definitions and Appropriate Use Feb, 2000


   invalidAttributeSyntax: The value specified doesn=92t adhere to the
   syntax definition for that attribute.

6.4.4 Security Errors

   As stated in Section 6.1.2, strongAuthRequired(8) and
   confidentialityRequired(13) may be returned for any operation.

   insufficientAccessRights: The requestor does not have sufficient
   permissions to modify the entry.

6.5 Add Operation Errors

   The superior of the entry must exist for the operation to succeed. =
If
   not, a noSuchObject error is returned and the matchedDN field will
   contain the name of the lowest entry in the directory that was
   matched.

   If the add operation succeeds, a result code of success will be
   returned to the client. If the server does not hold the target entry
   of the request, a referral(10) may be returned.  If the operation
   fails, the result code will be one of the following from the set of
   name errors, update errors, attribute errors, security errors,
   service errors, and general errors.

   The remaining errors listed in this section, are operation-specific.
   An operation may also result in the return of any of the common
   errors, as listed in Section 6.1.

6.5.1 Name Errors

   noSuchObject: One or more superiors to the target entry do not =
exist.

   invalidDNSyntax: the DN provided does not have the correct syntax,

6.5.2 Update Errors

   namingViolation: Either the target entry cannot be created under the
   specified superior due to DIT structure rules, or the target entry =
is
   named by an RDN not permitted by the DIT name form rule for its
   object class.

   objectClassViolation: An attempt was made to add an entry and one of
   the following conditions existed: A required attribute was not
   specified; an attribute was specified which is not permitted by the
   current object class set in the entry; a structural object class
   value was not specified; an object class value was specified that
   doesn=92t exist in the schema.

   entryAlreadyExists: The target entry already exists.

6.5.3 Attribute Errors


Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                    20
=0C
         LDAPv3 Result Codes: Definitions and Appropriate Use Feb, 2000

   undefinedAttributeType: The attribute specified does not exist in =
the
   server's defined schema.

   constraintViolation: The attribute value falls outside the bounds
   specified by the attribute syntax.

   attributeOrValueExists: A duplicate attribute value appears in the
   list of attributes for the entry.

   invalidAttributeSyntax: The value specified doesn=92t adhere to the
   syntax definition for that attribute.

6.5.4 Security Errors

   As stated in Section 6.1.2, strongAuthRequired(8) and
   confidentialityRequired(13) may be returned for any operation.

   insufficientAccessRights: The requestor does not have sufficient
   permissions to either add the entry or to add one or more of the
   attributes specified.

6.6 Delete Operation Errors

   If the delete operation succeeds, a result code of success will be
   returned to the client. If the server does not hold the target entry
   of the request, a referral(10) may be returned.  If the operation
   fails, the result code will be one of the following from the set of
   name errors, update errors, security errors, service errors, and
   general errors.

   The remaining errors listed in this section, are operation-specific.
   An operation may also result in the return of any of the common
   errors, as listed in Section 6.1.

6.6.1 Name Errors

   noSuchObject: The target entry does not exist.

   invalidDNSyntax: the DN provided does not have the correct syntax,

6.6.2 Update Errors

   notAllowedOnNonLeaf: The target entry is not a leaf object. Only
   objects having no subordinate objects in the tree may be deleted.

6.6.3 Security Errors

   As stated in Section 6.1.2, strongAuthRequired(8) and
   confidentialityRequired(13) may be returned for any operation.

   insufficientAccessRights: The requestor does not have sufficient
   permissions to delete the entry.

6.7 ModifyDN Operation Errors

Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                    21
=0C
         LDAPv3 Result Codes: Definitions and Appropriate Use Feb, 2000


   Note that X.500 restricts the ModifyDN operation to only affect
   entries that are contained within a single server. If the LDAP =
server
   is mapped onto DAP, then this restriction will apply, and the
   resultCode affectsMultipleDSAs will be returned if this error
   occurred. In general clients MUST NOT expect to be able to perform
   arbitrary movements of entries and subtrees between servers.
   [RFC2251, Section 4.9]

   If the Modify DN operation succeeds then a result code of success
   will be returned to the client. If the server does not hold the
   target entry of the request, a referral(10) may be returned.  If the
   operation fails then the result code will be one of the following
   from the set of name errors, update errors, attribute errors,
   security errors, service errors, and general errors.

   The remaining errors listed in this section, are operation-specific.
   An operation may also result in the return of any of the common
   errors, as listed in Section 6.1.

6.7.1 Name Errors

   noSuchObject: the target object does not exist or a new superior
   object was specified that does not exist.

   invalidDNSyntax: the DN provided does not have the correct syntax.

6.7.2 Update Errors

   namingViolation: Either the target entry cannot be moved to the
   specified superior due to DIT structure rules, or the target entry =
is
   named by an RDN not permitted by the DIT name form rule for its
   object class.

   objectClassViolation: The client has specified that the old RDN
   values should be removed from the entry (using the 'deleteOldRdn'
   parameter) but the removal of these values would violate the entry's
   schema. [RFC 2251 Section 4.9]

   notAllowedOnNonLeaf: If the server does not permit the ModifyDN
   operation on non-leaf entries this error will be returned if the
   client attempts to rename a non-leaf entry

   entryAlreadyExists: The target entry already exists.

   AffectsMultipleDSAs:  X.500 restricts the ModifyDN operation to only
   affect entries that are contained within a single server. If the =
LDAP
   server is mapped onto DAP, then this restriction will apply, and the
   resultCode affectsMultipleDSAs will be returned if this error
   occurred. In general clients MUST NOT expect to be able to perform
   arbitrary movements of entries and sub-trees between servers.
   [RFC2251, Section 4.9]

6.7.3 Attribute Errors

Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                    22
=0C
         LDAPv3 Result Codes: Definitions and Appropriate Use Feb, 2000


   constraintViolation: The operation would create an attribute value
   outside the normal bounds.

6.7.4 Security Errors

   As stated in Section 6.1.2, strongAuthRequired(8) and
   confidentialityRequired(13) may be returned for any operation.

   insufficientAccessRights: The requestor does not have sufficient
   permissions to either add the entry or to add one or more of the
   attributes specified.

6.8 Compare Operation Errors

   If there exists a value within the attribute being compared that
   matches the purported argument and for which compare permissions is
   granted, the operation returns the value compareTrue in the result,
   otherwise, the operation returns compareFalse. [X511, Section 9.2.4]
   If the server does not hold the target entry of the request, a
   referral(10) may be returned.

   If the compare operation can not be completed, then the server may
   return one of the following results from the set of name errors,
   attribute errors, security errors, service errors, and general
   errors.

   The remaining errors listed in this section are operation-specific.
   An operation may also result in the return of any of the common
   errors, as listed in Section 6.1.

6.8.1 Name Errors

   noSuchObject: the entry to be compared does not exist in the
   directory.

   invalidDNSyntax: the DN provided for the entry to be compared does
   not have the correct syntax.

6.8.2 Attribute Errors

   noSuchAttribute: the attribute to be compared does not exist in the
   target entry.

   invalidAttributeSyntax: The value specified doesn=92t adhere to the
   syntax definition for that attribute.

6.8.3 Security Errors

   As stated in Section 6.1.2, strongAuthRequired(8) and
   confidentialityRequired(13) may be returned for any operation.




Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                    23
=0C
         LDAPv3 Result Codes: Definitions and Appropriate Use Feb, 2000

   insufficientAccessRights: If the client does not have read =
permission
   for the entry to be compared, or for the attribute then
   insufficientAccessRights should be returned, [X511, Section 9.2.4]

6.8.4 Example

   The following example is included to demonstrate the expected
   responses for the compare operation.
   Given the following entry:

   dn: cn=3DFoo
   objectClass: top
   objectClass: person
   sn: bar
   userPassword: xyz

   i) Compare with userPassword=3Dxyz results in a compareTrue because =
the
   requested value exists in the entry.

   ii) Compare with userPassword=3Dabc results in a compareFalse =
because
   the entry contains a userPassword attribute but the value abc is not
   present.

   iii) Compare with telephoneNumber=3D123-456-7890 results in a
   noSuchAttribute. The attribute telephoneNumber is permissible in the
   entry based on the schema defined in the server but because it is
   empty it does not exist in the target entry.

   iv) Compare with ou=3DmyOrg results in noSuchAttribute. The =
requested
   attribute is a recognized attribute but it is neither present nor is
   it valid for the target entry.

   v) Compare with bogusAttr=3Dabc results in noSuchAttribute. The
   requested attribute is not a recognized attribute nor is it present
   in the target entry.

   Note that the response for scenarios 3 through 5 is always
   noSuchAttribute. The semantics of the compare operation is simply
   =91
   =91does the target entry contain the specified value?=92
                                                       =92 and so no
   distinction is made between a request for an unknown, invalid, or,
   valid but empty attribute. In all cases if the attribute is not
   present in the entry then the result is noSuchAttribute.

6.9 Extended Operation Errors

   The results returned for an extended operation vary, depending on =
the
   particular operation.  At least, the general responses that apply to
   every operation will certainly apply to an extended operation.  The
   precedence of error codes, as described in Section 5.3, applies as
   well to any extended operation.

   If the server does not recognize the request name, it MUST return
   only the response fields from LDAPResult, containing the
   protocolError result code [RFC2251, Section 4.12]

Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                    24
=0C
         LDAPv3 Result Codes: Definitions and Appropriate Use Feb, 2000


6.10 Operations with no Server Response

   The LDAP v3 protocol has two client operations for which no server
   response is returned.  Specifically, these are unbindRequest, and
   abandonRequest.  Since no response is returned, there is no need to
   consider possible result codes for these operations.

6.11 Unsolicited Notification

   In some situations, a server may issue a =91
                                            =91response=92
                                                      =92 to a client =
for
   which there was no client request.   This notification =91
                                                          =91is used to
   signal an extraordinary condition in the server or in the connection
   between the client and the server.  The notification is of an
   advisory nature, and the server will not expect any response to be
   returned from the client.=92
                            =92 [RFC2251, Section 4.4]

   RFC 2251 [RFC2251] describes a notice of disconnection in which a
   protocolError, strongAuthRequired, or unavailable result code may be
   returned.  The reader is directed there for further information.


7. Security Considerations

   This draft is meant to complement and enhance the coverage of result
   codes for LDAP v3, as described in RFC 2251 [RFC2251].  Section 7 of
   RFC 2251 [RFC2251] lists a number of security considerations =
specific
   to LDAP v3.

   Note that in X.500 if the discloseOnError permission is not granted
   then many operations will return noSuchObject instead of a more
   specific error. As there is currently no equivalent for this
   permission in LDAP, LDAP-only servers should return the appropriate
   error code in the event of an error.

8. References

   [RFC2026]    S. Bradner, =91
                            =91The Internet Standards Process - =
Revision
                3=92
                 =92, RFC 2026, October 1996.

   [RFC2119]    S. Bradner, =91
                            =91Key words for use in RFCs to Indicate
                Requirement Levels=92
                                  =92, RFC 2119, March 1997.

   [RFC2251]    M. Wahl, T. Howes, S. Kille, =91
                                             =91Lightweight Directory
                Access Protocol=92
                               =92, RFC 2251, December 1997.

   [X511]       ITU-T Recommendation X.511, =91
                                            =91The Directory: Abstract
                Service Definition=92
                                  =92, 1993.

   [TLS]        J. Hodges, R.L. Morgan, M. Wahl, =91
                                                 =91Lightweight =
Directory
                Access Protocol (v3): Extension for Transport Layer
                Security=92
                        =92, June 1999. <draft-ietf-ldapext-ldapv3-tls-
                05.txt> "work in progress"


Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                    25
=0C
         LDAPv3 Result Codes: Definitions and Appropriate Use Feb, 2000

   [Net]        Netscape Directory SDK 3.0 for C Programmer=92s Guide,
                Chapter 19: Result Codes. Available at Error! Bookmark
                not defined.


9. Acknowledgments

   The production of this document relied heavily on the information
   available from RFC 2251 [RFC2251] and ITU-T Recommendation X.511
   [X511].

10. Author's Addresses

   Mike Just
   Entrust Technologies
   750 Heron Rd, Tower E
   Ottawa, Ontario, Canada
   mike.just@entrust.com

   Kristianne Leclair
   Entrust Technologies
   750 Heron Rd, Tower E
   Ottawa, Ontario, Canada
   kristianne.leclair@entrust.com

   Jim Sermersheim
   Novell
   122 East 1700 South
   Provo, Utah 84606, USA
   Error! Bookmark not defined.

   Mark Smith
   Netscape
   501 Ellis Street
   Mountain View, CA 94043
   Error! Bookmark not defined.



















Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                    26
=0C
         LDAPv3 Result Codes: Definitions and Appropriate Use Feb, 2000


11 Appendix A: Operation/Response Matrix


   Result Codes                  Operations

                                 B    S    M    A    D    M     C
                                 i    e    o    d    e    o     o
                                 n    a    d    d    l    d     m
                                 d    r    i         e    D     p
                                      c    f         t    N     a
                                      h    y         e          r
                                                                e

                                 Non-erroneous results

   success (0)                   X    X    X    X    X    X

   compareFalse (5)                                               X

   compareTrue (6)                                                X

   referral (10)                 X    X    X    X    X    X     X

   SaslBindInProgress (14)       X

                                 Name errors

   noSuchObject (32)                  X    X    X    X    X     X

   aliasProblem (33)                  X

   InvalidDNSyntax (34)          X    X    X    X    X    X     X

   AliasDereferencingProblem          X
   (36)

                                 Update errors

   namingViolation (64)                         X          X

   objectClassViolation (65)               X    X          X

   notAllowedOnNonLeaf (66)                           X    X

   notAllowedonRDN (67)                    X

   entryAlreadyExists (68)                      X          X

   objectClassModesProhibite               X
   d (69)

   affectsMultipleDSAs (71)                                 X

                                 Attribute errors

   NoSuchAttribute(16)                     X                      X

   UndefinedAttributeType                  X    X
   (17)

   InappropriateMatching              X
   (18)

   ConstraintViolation (19)                X    X          X

   AttributeOrValueExists                  X    X
   (20)

   InvalidAttributeSyntax                  X    X
   (21)

                                 Security errors

   AuthMethodNotSupported        X
   (7)

   StrongAuthRequired (8)        X    X    X    X    X    X     X

   ConfidentialityRequred(13     X    X    X    X    X    X     X
   )

   InappropriateAuthenticati     X
   on (48)



Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                    27
=0C
         LDAPv3 Result Codes: Definitions and Appropriate Use Feb, 2000


   InvalidCredentials (49)       X

   InsufficientAccessRights           X    X    X    X    X     X
   (50)

                                 Service errors

   TimeLimitExceeded (3)         X    X    X    X    X    X     X

   SizeLimitExceeded (4)              X

   AdminLimitExceeded (11)       X    X    X    X    X    X     X

   UnavailableCriticialExten     X    X    X    X    X    X     X
   sion (12)

   busy (51)                     X    X    X    X    X    X     X

   unavailable (52)              X    X    X    X    X    X     X

   unwillingToPerform (53)       X    X    X    X    X    X     X

   loopDetect (54)               X    X    X    X    X    X     X

                                 General errors

   OperationsError (1)           X    X    X    X    X    X     X

   protocolError (2)             X    X    X    X    X    X     X

   other (80)                    X    X    X    X    X    X     X






































Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                    28
=0C
         LDAPv3 Result Codes: Definitions and Appropriate Use Feb, 2000


12 Full Copyright Statement

   Copyright (C) The Internet Society (Oct 1999). All Rights Reserved.
   This document and translations of it may be copied and furnished to
   others, and derivative works that comment on or otherwise explain it
   or assist in its implementation may be prepared, copied, published
   and distributed, in whole or in part, without restriction of any
   kind, provided that the above copyright notice and this paragraph =
are
   included on all such copies and derivative works. However, this
   document itself may not be modified in any way, such as by removing
   the copyright notice or references to the Internet Society or other
   Internet organizations, except as needed for the purpose of
   developing Internet standards in which case the procedures for
   copyrights defined in the Internet Standards process must be
   followed, or as required to translate it into languages other than
   English.

   The limited permissions granted above are perpetual and will not be
   revoked by the Internet Society or its successors or assigns.

   This document and the information contained herein is provided on an
   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERINGTASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDINGBUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATIONHEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.




























Just, Leclair, Sermersheim, Smith INTERNET-DRAFT                    29
=0C
------_=_NextPart_000_01BF7F9A.84038EA0--



From list@netscape.com  Fri Feb 25 12:16:04 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA15007
	for <ldapext-archive@odin.ietf.org>; Fri, 25 Feb 2000 12:16:03 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id JAA29014;
	Fri, 25 Feb 2000 09:10:12 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id JAA07026; Fri, 25 Feb 2000 09:14:02 -0800 (PST)
Resent-Date: Fri, 25 Feb 2000 09:14:02 -0800 (PST)
Message-Id: <3.0.5.32.20000225091348.009606c0@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Fri, 25 Feb 2000 09:13:48 -0800
To: Mike Just <mike.just@entrust.com>
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Re: draft-just-ldapv3-rescodes-01.txt
Cc: "'LDAPExt'" <ietf-ldapext@netscape.com>,
        "'Jim Sermersheim'" <JIMSE@novell.com>,
        "'Mark Smith'" <mcs@netscape.com>,
        Kristianne Leclair <kristianne.leclair@entrust.com>
In-Reply-To: <01E1D01C12D7D211AFC70090273D20B10139D936@sothmxs06.entrust
 .com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"FRv0dD.A.gtB.Zhrt4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Mike, et. al,

A few comments/questions/suggestions based upon a quick read...

Internal Errors: operationsError vs other
  You have defined operationsError as being used to indicate internal
  errors?  Is this actually appropriate since operationsErrors are
  prescribed to be returned in a number of specific situations, such
  as documented by bind and start tls operations.  I do not believe
  operationsError should not be used as a catch all for "internal
  errors".  Instead, I suggested servers return other.

Precedence?
  Seems to imply that if multiple errors were detected, that
  more "specific" should be returned over less "specific" errors.
  I believe that the most severe error detected be returned.
  In particular, a protocolError should take precedence over any
  "specific" error.

  I would also note that a server is not required to detect
  multiple errors.  It is allowed to return the first error
  detected.

Controls
  No meantion of controls are made.  As controls can significantly
  change the behavior of operations, it may be appropriate for a
  control to specify that a result code be returned which would
  normally returned by the base operation.

Extended Operations
  I would suggest adding a sentence to your extended operation
  section:  Extended Operations MAY return any result code
  (excepting 81-90).

API Errors (81-90):
  A note stating that server MUST NOT return these result codes.



From list@netscape.com  Fri Feb 25 12:47:10 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA15653
	for <ldapext-archive@odin.ietf.org>; Fri, 25 Feb 2000 12:47:10 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id JAA02355;
	Fri, 25 Feb 2000 09:42:00 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id JAA17698; Fri, 25 Feb 2000 09:46:01 -0800 (PST)
Resent-Date: Fri, 25 Feb 2000 09:46:01 -0800 (PST)
Message-Id: <s8b65d63.070@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.3.1
Date: Fri, 25 Feb 2000 10:45:44 -0700
From: "Mark Meredith" <MMEREDIT@novell.com>
To: <bgreenblatt@directory-applications.com>, <ietf-ldapext@netscape.com>,
        "Sukanta Ganguly" <SGANGULY@novell.com>
Subject: RE: draft-mmeredith-rootdse-vendor-info-02.txt
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Resent-Message-ID: <"y02wpD.A.QUE.Y_rt4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ietf.org id MAA15653

Bruce,

I can see your point on duplication of information, but what if a site is not running SNMP, or the client being used does not support SNMP how would the information be known?

If the information is in the ROOT DSE, I do not care how the information is retrieved from a ldap server stand point, the server could query SNMP or DNS ..... etc. That way the information would not be duplicated per say, but multiply viewable.

Does this sound reasonable to you?

What do the client developers on this list think?

-Mark

>>> Bruce Greenblatt <bgreenblatt@directory-applications.com> 02/24/00 06:31PM >>>
I understand that you don't want to look the information up in SNMP.  But,
why not?  It's already there, and SNMP is pretty lightweight (simple even).
 Do we really want to duplicate this vendor information in several places?
It could just as easily be added to SRV records in DNS?  What about all of
the other informaiton in RFC 2248 and RFC 2605?  Do you want to plop that
into the RootDSE as well?

Bruce

At 10:49 AM 2/18/00 -0700, Sukanta Ganguly wrote:
>   It is very difficult and unclear at this point whether we should assume 
>that all Internet Directory Client are in the position to talk different 
>Internet protocols. Instead of assuming that the Directory Client will talk
>SNMP  and query the MIB for getting the vendor specific information, why
>can't we  state that the Directory Client queries the rootDSE for the
>information and the  implementation would determine whether to go to the
>SNMP MIB for the information  or to have the vendor specific information,
>requested by Mark, within the  Directory Repository.   I think it will
>bring in more value to have the access to the information  through the
>rootDSE but at the same time leave the invididual implementations to 
>handle them. We all agree, based on the emails that I have seen flowing
>around  related to this matter, that the information is useful so why not
>provide the  flexibility.   Thanks Sukanta Ganguly sganguly@novell.com 
>
>>>><>>>>
>At 09:13 AM 2/18/00 -0500, Peter Strong  wrote:
>>
>>>
>>>
>>> To be blunt, I don't believe  that there is much use for this draft.
>>
>>For those of us who  attempt to build applications that work with
>>multiple directory  implementations, this information is very useful.
>>
>
>   I said that
>  Get it from there, since that  is
>  I don't see much point in duplicating  this
>  In my opinion, a good internet directory client will  get
>information from a variety of internet servers: DNS, LDAP, SNMP, and  others.
>
>>> The information that it proposes to add to the Root DSE  is already
>>> published is
>>>  The
>>>  I think that this draft
>>> should just  point to RFC 2248 (and perhaps 2605) and explain where the
>>>  These are already standards  track
>>> documents, and have places to put the information that this  draft
defines.
>>> (Just my $0.02 worth)
>>
>>The products we  build are LDAP clients, not SNMP clients.
>>
>>This information should  be available via LDAP.
>>
>>>
>>>  Bruce
>>>  ==============================================
>>> Bruce Greenblatt, Ph.  D.
>>> Directory Tools and Application Services, Inc.
>>> http://www.directory-applications.com 
>>>
>>
>>------------------------------------------------------------------------
>>Peter  Strong
>>Software Architect
>>Nortel Networks - Optivity Policy  Services (OPS) and NetID
>><>
>>(613)  831-6615
>>
>>
>>
>>
>>
>>
>==============================================
>Bruce  Greenblatt, Ph. D.
>Directory Tools and Application Services, Inc.
>http://www.directory-applications.com 
>
> 
==============================================
Bruce Greenblatt, Ph. D.
Directory Tools and Application Services, Inc.
http://www.directory-applications.com



From list@netscape.com  Fri Feb 25 12:56:26 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA15933
	for <ldapext-archive@odin.ietf.org>; Fri, 25 Feb 2000 12:56:25 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id JAA21799;
	Fri, 25 Feb 2000 09:52:10 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id JAA22085; Fri, 25 Feb 2000 09:54:11 -0800 (PST)
Resent-Date: Fri, 25 Feb 2000 09:54:11 -0800 (PST)
Message-Id: <s8b65f49.065@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.3.1
Date: Fri, 25 Feb 2000 10:53:49 -0700
From: "Sukanta Ganguly" <SGANGULY@novell.com>
To: <bgreenblatt@directory-applications.com>, <ietf-ldapext@netscape.com>,
        "Mark Meredith" <MMEREDIT@novell.com>
Subject: RE: draft-mmeredith-rootdse-vendor-info-02.txt
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="=_8ED70DA9.711018FE"
Resent-Message-ID: <"ePP_AC.A.LYF.AHst4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

This is a MIME message. If you are reading this text, you may want to 
consider changing to a mail reader or gateway that understands how to 
properly handle MIME multipart messages.

--=_8ED70DA9.711018FE
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: quoted-printable

Whether the information is stored in the rootDSE physically or the server =
on getting a query on the rootDSE for the information and then re-routing =
the query to the SNMP server or a DNS server should be implementation =
details. Some vendor may want to implement a query re-routing mechanism to =
the SNMP/DNS server for the information and some may actually store it on =
the rootDSE. This would end up providing a more flexible model.

Bruce, Mark and everybody else in the list, is this acceptable ?=20

Sukanta Ganguly
Novell Inc
(W) 801-861-5190

>>> Mark Meredith 02/25/00 10:45AM >>>
Bruce,

I can see your point on duplication of information, but what if a site is =
not running SNMP, or the client being used does not support SNMP how would =
the information be known?

If the information is in the ROOT DSE, I do not care how the information =
is retrieved from a ldap server stand point, the server could query SNMP =
or DNS ..... etc. That way the information would not be duplicated per =
say, but multiply viewable.

Does this sound reasonable to you?

What do the client developers on this list think?

-Mark

>>> Bruce Greenblatt <bgreenblatt@directory-applications.com> 02/24/00 =
06:31PM >>>
I understand that you don't want to look the information up in SNMP.  But,
why not?  It's already there, and SNMP is pretty lightweight (simple =
even).
 Do we really want to duplicate this vendor information in several places?
It could just as easily be added to SRV records in DNS?  What about all of
the other informaiton in RFC 2248 and RFC 2605?  Do you want to plop that
into the RootDSE as well?

Bruce

At 10:49 AM 2/18/00 -0700, Sukanta Ganguly wrote:
>   It is very difficult and unclear at this point whether we should =
assume=20
>that all Internet Directory Client are in the position to talk =
different=20
>Internet protocols. Instead of assuming that the Directory Client will =
talk
>SNMP  and query the MIB for getting the vendor specific information, why
>can't we  state that the Directory Client queries the rootDSE for the
>information and the  implementation would determine whether to go to the
>SNMP MIB for the information  or to have the vendor specific information,
>requested by Mark, within the  Directory Repository.   I think it will
>bring in more value to have the access to the information  through the
>rootDSE but at the same time leave the invididual implementations to=20
>handle them. We all agree, based on the emails that I have seen flowing
>around  related to this matter, that the information is useful so why not
>provide the  flexibility.   Thanks Sukanta Ganguly sganguly@novell.com=20
>
>>>><>>>>
>At 09:13 AM 2/18/00 -0500, Peter Strong  wrote:
>>
>>>
>>>
>>> To be blunt, I don't believe  that there is much use for this draft.
>>
>>For those of us who  attempt to build applications that work with
>>multiple directory  implementations, this information is very useful.
>>
>
>   I said that
>  Get it from there, since that  is
>  I don't see much point in duplicating  this
>  In my opinion, a good internet directory client will  get
>information from a variety of internet servers: DNS, LDAP, SNMP, and  =
others.
>
>>> The information that it proposes to add to the Root DSE  is already
>>> published is
>>>  The
>>>  I think that this draft
>>> should just  point to RFC 2248 (and perhaps 2605) and explain where =
the
>>>  These are already standards  track
>>> documents, and have places to put the information that this  draft
defines.
>>> (Just my $0.02 worth)
>>
>>The products we  build are LDAP clients, not SNMP clients.
>>
>>This information should  be available via LDAP.
>>
>>>
>>>  Bruce
>>>  =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>>> Bruce Greenblatt, Ph.  D.
>>> Directory Tools and Application Services, Inc.
>>> http://www.directory-applications.com=20
>>>
>>
>>------------------------------------------------------------------------
>>Peter  Strong
>>Software Architect
>>Nortel Networks - Optivity Policy  Services (OPS) and NetID
>><>
>>(613)  831-6615
>>
>>
>>
>>
>>
>>
>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>Bruce  Greenblatt, Ph. D.
>Directory Tools and Application Services, Inc.
>http://www.directory-applications.com=20
>
>=20
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Bruce Greenblatt, Ph. D.
Directory Tools and Application Services, Inc.
http://www.directory-applications.com

--=_8ED70DA9.711018FE
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META content=3D"text/html; charset=3Diso-8859-1" http-equiv=3DContent-Type=
>
<META content=3D"MSHTML 5.00.2919.6307" name=3DGENERATOR></HEAD>
<BODY bgColor=3D#ffffff=20
style=3D"FONT: 10pt Arial; MARGIN-LEFT: 2px; MARGIN-TOP: 2px">
<DIV>Whether the information is stored in the rootDSE physically or the =
server=20
on getting a query on the rootDSE for the information and then re-routing =
the=20
query to the SNMP server or a DNS server should be implementation details. =
Some=20
vendor may want to implement a query re-routing mechanism to the SNMP/DNS =
server=20
for the information and some may actually store it on the rootDSE. This =
would=20
end up providing a more flexible model.</DIV>
<DIV>&nbsp;</DIV>
<DIV>Bruce, Mark and everybody&nbsp;else in the list, is this acceptable =
?=20
</DIV>
<DIV>&nbsp;</DIV>
<DIV>Sukanta Ganguly</DIV>
<DIV>Novell Inc</DIV>
<DIV>(W) 801-861-5190<BR><BR>&gt;&gt;&gt; Mark Meredith 02/25/00 10:45AM=20=

&gt;&gt;&gt;<BR>Bruce,<BR><BR>I can see your point on duplication of=20
information, but what if a site is not running SNMP, or the client being =
used=20
does not support SNMP how would the information be known?<BR><BR>If the=20
information is in the ROOT DSE, I do not care how the information is =
retrieved=20
from a ldap server stand point, the server could query SNMP or DNS ..... =
etc.=20
That way the information would not be duplicated per say, but multiply=20
viewable.<BR><BR>Does this sound reasonable to you?<BR><BR>What do the =
client=20
developers on this list think?<BR><BR>-Mark<BR><BR>&gt;&gt;&gt; Bruce =
Greenblatt=20
&lt;bgreenblatt@directory-applications.com&gt; 02/24/00 06:31PM=20
&gt;&gt;&gt;<BR>I understand that you don't want to look the information =
up in=20
SNMP.&nbsp; But,<BR>why not?&nbsp; It's already there, and SNMP is =
pretty=20
lightweight (simple even).<BR>&nbsp;Do we really want to duplicate this =
vendor=20
information in several places?<BR>It could just as easily be added to =
SRV=20
records in DNS?&nbsp; What about all of<BR>the other informaiton in RFC =
2248 and=20
RFC 2605?&nbsp; Do you want to plop that<BR>into the RootDSE as=20
well?<BR><BR>Bruce<BR><BR>At 10:49 AM 2/18/00 -0700, Sukanta Ganguly=20
wrote:<BR>&gt;&nbsp;&nbsp; It is very difficult and unclear at this =
point=20
whether we should assume <BR>&gt;that all Internet Directory Client are in =
the=20
position to talk different <BR>&gt;Internet protocols. Instead of assuming =
that=20
the Directory Client will talk<BR>&gt;SNMP&nbsp; and query the MIB for =
getting=20
the vendor specific information, why<BR>&gt;can't we&nbsp; state that =
the=20
Directory Client queries the rootDSE for the<BR>&gt;information and =
the&nbsp;=20
implementation would determine whether to go to the<BR>&gt;SNMP MIB for =
the=20
information&nbsp; or to have the vendor specific information,<BR>&gt;reques=
ted=20
by Mark, within the&nbsp; Directory Repository.&nbsp;&nbsp; I think it=20
will<BR>&gt;bring in more value to have the access to the information&nbsp;=
=20
through the<BR>&gt;rootDSE but at the same time leave the invididual=20
implementations to <BR>&gt;handle them. We all agree, based on the emails =
that I=20
have seen flowing<BR>&gt;around&nbsp; related to this matter, that the=20
information is useful so why not<BR>&gt;provide the&nbsp;=20
flexibility.&nbsp;&nbsp; Thanks Sukanta Ganguly sganguly@novell.com=20
<BR>&gt;<BR>&gt;&gt;&gt;&gt;&lt;&gt;&gt;&gt;&gt;<BR>&gt;At 09:13 AM =
2/18/00=20
-0500, Peter Strong&nbsp;=20
wrote:<BR>&gt;&gt;<BR>&gt;&gt;&gt;<BR>&gt;&gt;&gt;<BR>&gt;&gt;&gt; To be =
blunt,=20
I don't believe&nbsp; that there is much use for this=20
draft.<BR>&gt;&gt;<BR>&gt;&gt;For those of us who&nbsp; attempt to =
build=20
applications that work with<BR>&gt;&gt;multiple directory&nbsp; implementat=
ions,=20
this information is very useful.<BR>&gt;&gt;<BR>&gt;<BR>&gt;&nbsp;&nbsp; I =
said=20
that<BR>&gt;&nbsp; Get it from there, since that&nbsp; is<BR>&gt;&nbsp; I =
don't=20
see much point in duplicating&nbsp; this<BR>&gt;&nbsp; In my opinion, a =
good=20
internet directory client will&nbsp; get<BR>&gt;information from a variety =
of=20
internet servers: DNS, LDAP, SNMP, and&nbsp; others.<BR>&gt;<BR>&gt;&gt;&gt=
; The=20
information that it proposes to add to the Root DSE&nbsp; is=20
already<BR>&gt;&gt;&gt; published is<BR>&gt;&gt;&gt;&nbsp;=20
The<BR>&gt;&gt;&gt;&nbsp; I think that this draft<BR>&gt;&gt;&gt; =
should=20
just&nbsp; point to RFC 2248 (and perhaps 2605) and explain where=20
the<BR>&gt;&gt;&gt;&nbsp; These are already standards&nbsp;=20
track<BR>&gt;&gt;&gt; documents, and have places to put the information =
that=20
this&nbsp; draft<BR>defines.<BR>&gt;&gt;&gt; (Just my $0.02=20
worth)<BR>&gt;&gt;<BR>&gt;&gt;The products we&nbsp; build are LDAP =
clients, not=20
SNMP clients.<BR>&gt;&gt;<BR>&gt;&gt;This information should&nbsp; be =
available=20
via LDAP.<BR>&gt;&gt;<BR>&gt;&gt;&gt;<BR>&gt;&gt;&gt;&nbsp;=20
Bruce<BR>&gt;&gt;&gt;&nbsp;=20
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<BR>&gt;&gt;=
&gt; Bruce Greenblatt,=20
Ph.&nbsp; D.<BR>&gt;&gt;&gt; Directory Tools and Application Services,=20
Inc.<BR>&gt;&gt;&gt; http://www.directory-applications.com=20
<BR>&gt;&gt;&gt;<BR>&gt;&gt;<BR>&gt;&gt;-----------------------------------=
-------------------------------------<BR>&gt;&gt;Peter&nbsp;=20
Strong<BR>&gt;&gt;Software Architect<BR>&gt;&gt;Nortel Networks - =
Optivity=20
Policy&nbsp; Services (OPS) and NetID<BR>&gt;&gt;&lt;&gt;<BR>&gt;&gt;(613)&=
nbsp;=20
831-6615<BR>&gt;&gt;<BR>&gt;&gt;<BR>&gt;&gt;<BR>&gt;&gt;<BR>&gt;&gt;<BR>&gt=
;&gt;<BR>&gt;=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D<BR>&gt;Bruce&nbsp;=20
Greenblatt, Ph. D.<BR>&gt;Directory Tools and Application Services,=20
Inc.<BR>&gt;http://www.directory-applications.com <BR>&gt;<BR>&gt;=20
<BR>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<BR>Br=
uce Greenblatt, Ph.=20
D.<BR>Directory Tools and Application Services,=20
Inc.<BR>http://www.directory-applications.com</DIV></BODY></HTML>

--=_8ED70DA9.711018FE--



From list@netscape.com  Fri Feb 25 14:15:13 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA18255
	for <ldapext-archive@odin.ietf.org>; Fri, 25 Feb 2000 14:15:13 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id LAA06469;
	Fri, 25 Feb 2000 11:12:01 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id LAA29290; Fri, 25 Feb 2000 11:14:04 -0800 (PST)
Resent-Date: Fri, 25 Feb 2000 11:14:04 -0800 (PST)
Sender: mcs@netscape.com (Mark C Smith)
Message-ID: <38B6D477.78AD089F@netscape.com>
Date: Fri, 25 Feb 2000 14:13:59 -0500
From: Mark Smith <mcs@netscape.com>
Organization: iPlanet E-Commerce Solutions
X-Mailer: Mozilla 4.7 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en-US,en
MIME-Version: 1.0
To: Mark Meredith <MMEREDIT@novell.com>
CC: bgreenblatt@directory-applications.com, ietf-ldapext@netscape.com,
        Sukanta Ganguly <SGANGULY@novell.com>
Subject: Re: draft-mmeredith-rootdse-vendor-info-02.txt
References: <s8b65d63.070@prv-mail20.provo.novell.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"FiKNtC.A.YJH.7Rtt4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

I've written or helped people write dozens of LDAP clients (hundreds?)

None of these clients includes SNMP client code, although they include
many other protocols (SMTP, IMAP, POP, S/MIME, HTTP and many others).

I conclude that most (LDAP) client applications don't have any need to
speak SNMP today, and therefore we shouldn't force them to do so just to
get at this information.  A little redundancy doesn't seem like a bad
thing in this instance.

-- 
Mark Smith
Directory Product Development / iPlanet E-Commerce Solutions
My words are my own, not my employer's.            Got LDAP?


Mark Meredith wrote:
> 
> Bruce,
> 
> I can see your point on duplication of information, but what if a site is not running SNMP, or the client being used does not support SNMP how would the information be known?
> 
> If the information is in the ROOT DSE, I do not care how the information is retrieved from a ldap server stand point, the server could query SNMP or DNS ..... etc. That way the information would not be duplicated per say, but multiply viewable.
> 
> Does this sound reasonable to you?
> 
> What do the client developers on this list think?
> 
> -Mark
> 
> >>> Bruce Greenblatt <bgreenblatt@directory-applications.com> 02/24/00 06:31PM >>>
> I understand that you don't want to look the information up in SNMP.  But,
> why not?  It's already there, and SNMP is pretty lightweight (simple even).
>  Do we really want to duplicate this vendor information in several places?
> It could just as easily be added to SRV records in DNS?  What about all of
> the other informaiton in RFC 2248 and RFC 2605?  Do you want to plop that
> into the RootDSE as well?
> 
> Bruce
> 
> At 10:49 AM 2/18/00 -0700, Sukanta Ganguly wrote:
> >   It is very difficult and unclear at this point whether we should assume
> >that all Internet Directory Client are in the position to talk different
> >Internet protocols. Instead of assuming that the Directory Client will talk
> >SNMP  and query the MIB for getting the vendor specific information, why
> >can't we  state that the Directory Client queries the rootDSE for the
> >information and the  implementation would determine whether to go to the
> >SNMP MIB for the information  or to have the vendor specific information,
> >requested by Mark, within the  Directory Repository.   I think it will
> >bring in more value to have the access to the information  through the
> >rootDSE but at the same time leave the invididual implementations to
> >handle them. We all agree, based on the emails that I have seen flowing
> >around  related to this matter, that the information is useful so why not
> >provide the  flexibility.   Thanks Sukanta Ganguly sganguly@novell.com
> >
> >>>><>>>>
> >At 09:13 AM 2/18/00 -0500, Peter Strong  wrote:
> >>
> >>>
> >>>
> >>> To be blunt, I don't believe  that there is much use for this draft.
> >>
> >>For those of us who  attempt to build applications that work with
> >>multiple directory  implementations, this information is very useful.
> >>
> >
> >   I said that
> >  Get it from there, since that  is
> >  I don't see much point in duplicating  this
> >  In my opinion, a good internet directory client will  get
> >information from a variety of internet servers: DNS, LDAP, SNMP, and  others.
> >
> >>> The information that it proposes to add to the Root DSE  is already
> >>> published is
> >>>  The
> >>>  I think that this draft
> >>> should just  point to RFC 2248 (and perhaps 2605) and explain where the
> >>>  These are already standards  track
> >>> documents, and have places to put the information that this  draft
> defines.
> >>> (Just my $0.02 worth)
> >>
> >>The products we  build are LDAP clients, not SNMP clients.
> >>
> >>This information should  be available via LDAP.
> >>
> >>>
> >>>  Bruce
> >>>  ==============================================
> >>> Bruce Greenblatt, Ph.  D.
> >>> Directory Tools and Application Services, Inc.
> >>> http://www.directory-applications.com
> >>>
> >>
> >>------------------------------------------------------------------------
> >>Peter  Strong
> >>Software Architect
> >>Nortel Networks - Optivity Policy  Services (OPS) and NetID
> >><>
> >>(613)  831-6615
> >>
> >>
> >>
> >>
> >>
> >>
> >==============================================
> >Bruce  Greenblatt, Ph. D.
> >Directory Tools and Application Services, Inc.
> >http://www.directory-applications.com
> >
> >
> ==============================================
> Bruce Greenblatt, Ph. D.
> Directory Tools and Application Services, Inc.
> http://www.directory-applications.com



From list@netscape.com  Fri Feb 25 15:58:43 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA20514
	for <ldapext-archive@odin.ietf.org>; Fri, 25 Feb 2000 15:58:42 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id MAA22528;
	Fri, 25 Feb 2000 12:55:29 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id MAA03702; Fri, 25 Feb 2000 12:57:31 -0800 (PST)
Resent-Date: Fri, 25 Feb 2000 12:57:31 -0800 (PST)
Message-ID: <01E1D01C12D7D211AFC70090273D20B10139D93C@sothmxs06.entrust.com>
From: Mike Just <mike.just@entrust.com>
To: "'Kurt D. Zeilenga'" <Kurt@OpenLDAP.org>
Cc: "'LDAPExt'" <ietf-ldapext@netscape.com>,
        "'Jim Sermersheim'"
	 <JIMSE@novell.com>,
        "'Mark Smith'" <mcs@netscape.com>,
        Kristianne Leclair
	 <kristianne.leclair@entrust.com>
Subject: RE: draft-just-ldapv3-rescodes-01.txt
Date: Fri, 25 Feb 2000 15:57:17 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.21)
Content-Type: text/plain;
	charset="iso-8859-1"
Resent-Message-ID: <"K81-2B.A.k5.7yut4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Hi Kurt,

> A few comments/questions/suggestions based upon a quick read...
> 

Thanks for looking at the document. Comments below.

> Internal Errors: operationsError vs other
>   You have defined operationsError as being used to indicate internal
>   errors?  Is this actually appropriate since operationsErrors are
>   prescribed to be returned in a number of specific situations, such
>   as documented by bind and start tls operations.  I do not believe
>   operationsError should not be used as a catch all for "internal
>   errors".  Instead, I suggested servers return other.
> 

Good point. Your reference to Bind is from Section 4.2.1 of RFC 2251. We'll
have to investigate further to see how we should classify operationsError.

> Precedence?
>   Seems to imply that if multiple errors were detected, that
>   more "specific" should be returned over less "specific" errors.
>   I believe that the most severe error detected be returned.
>   In particular, a protocolError should take precedence over any
>   "specific" error.
> 

At first thought, I would suspect that a protocolError would be detected
before any other condition could be checked. However, each server may decide
on the order in which it will validate the success of a request, and we
certainly didn't include this section to prescribe how a server should
validate a request.

We wanted to include the precedence section since it is in X.511. The
particular example you cite results from our pigeon-holing of protocolError,
which is not included in X.511, as a general error. There may be other
examples though. We've never felt too strongly about a need to keep the
precendence section in any case.  I'll propose that we remove it unless
anyone has a reason for keeping it. 

>   I would also note that a server is not required to detect
>   multiple errors.  It is allowed to return the first error
>   detected.
> 

Yes. That's why it is phrased "in the case that more than one error is
detected".  In any case, as noted above, we'll likely not keep this section.

> Controls
>   No meantion of controls are made.  As controls can significantly
>   change the behavior of operations, it may be appropriate for a
>   control to specify that a result code be returned which would
>   normally returned by the base operation.
> 

Right. We'll make mention of this. Since no specific controls are defined in
RFC 2251, we'll just point the readers to the respective RFCs for details.

> Extended Operations
>   I would suggest adding a sentence to your extended operation
>   section:  Extended Operations MAY return any result code
>   (excepting 81-90).
> 
> API Errors (81-90):
>   A note stating that server MUST NOT return these result codes.
> 

Both of these sound fine.

Mike J.



From list@netscape.com  Sun Feb 27 12:07:13 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA09570
	for <ldapext-archive@odin.ietf.org>; Sun, 27 Feb 2000 12:07:13 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id JAA17473;
	Sun, 27 Feb 2000 09:04:01 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id JAA23624; Sun, 27 Feb 2000 09:06:03 -0800 (PST)
Resent-Date: Sun, 27 Feb 2000 09:06:03 -0800 (PST)
Message-Id: <3.0.5.32.20000227091107.0092a100@pop.walltech.com>
X-Sender: bgreenblatt@pop.walltech.com
X-Mailer: QUALCOMM Windows Eudora Light Version 3.0.5 (32)
Date: Sun, 27 Feb 2000 09:11:07 -0800
To: Mark Smith <mcs@netscape.com>, Mark Meredith <MMEREDIT@novell.com>
From: Bruce Greenblatt <bgreenblatt@directory-applications.com>
Subject: Re: draft-mmeredith-rootdse-vendor-info-02.txt
Cc: ietf-ldapext@netscape.com, Sukanta Ganguly <SGANGULY@novell.com>
In-Reply-To: <38B6D477.78AD089F@netscape.com>
References: <s8b65d63.070@prv-mail20.provo.novell.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"h-o_t.A.2wF.5lVu4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

It would be acceptable to me if wording similar to the following were
included in the "vendor info" draft:

"Server implementations conforming to this document must also support RFC
2248.  In particular the strings that are stored in the vendorName and
vendorVersion attribute values defined here must be also available via SNMP
from the applName and applVersion fields of the applTable MIB defined in
RFC 2248."

Note that I'd mandate this, so that the information is duplicated rather
than in place of.  Does any one produce an LDAP server on a platform where
there is no SNMP agent?

Bruce

At 02:13 PM 2/25/00 -0500, Mark Smith wrote:
>I've written or helped people write dozens of LDAP clients (hundreds?)
>
>None of these clients includes SNMP client code, although they include
>many other protocols (SMTP, IMAP, POP, S/MIME, HTTP and many others).
>
>I conclude that most (LDAP) client applications don't have any need to
>speak SNMP today, and therefore we shouldn't force them to do so just to
>get at this information.  A little redundancy doesn't seem like a bad
>thing in this instance.
>
>-- 
>Mark Smith
>Directory Product Development / iPlanet E-Commerce Solutions
>My words are my own, not my employer's.            Got LDAP?
>
>
>Mark Meredith wrote:
>> 
>> Bruce,
>> 
>> I can see your point on duplication of information, but what if a site
is not running SNMP, or the client being used does not support SNMP how
would the information be known?
>> 
>> If the information is in the ROOT DSE, I do not care how the information
is retrieved from a ldap server stand point, the server could query SNMP or
DNS ..... etc. That way the information would not be duplicated per say,
but multiply viewable.
>> 
>> Does this sound reasonable to you?
>> 
>> What do the client developers on this list think?
>> 
>> -Mark
>> 
>> >>> Bruce Greenblatt <bgreenblatt@directory-applications.com> 02/24/00
06:31PM >>>
>> I understand that you don't want to look the information up in SNMP.  But,
>> why not?  It's already there, and SNMP is pretty lightweight (simple even).
>>  Do we really want to duplicate this vendor information in several places?
>> It could just as easily be added to SRV records in DNS?  What about all of
>> the other informaiton in RFC 2248 and RFC 2605?  Do you want to plop that
>> into the RootDSE as well?
>> 
>> Bruce
>> 
>> At 10:49 AM 2/18/00 -0700, Sukanta Ganguly wrote:
>> >   It is very difficult and unclear at this point whether we should assume
>> >that all Internet Directory Client are in the position to talk different
>> >Internet protocols. Instead of assuming that the Directory Client will
talk
>> >SNMP  and query the MIB for getting the vendor specific information, why
>> >can't we  state that the Directory Client queries the rootDSE for the
>> >information and the  implementation would determine whether to go to the
>> >SNMP MIB for the information  or to have the vendor specific information,
>> >requested by Mark, within the  Directory Repository.   I think it will
>> >bring in more value to have the access to the information  through the
>> >rootDSE but at the same time leave the invididual implementations to
>> >handle them. We all agree, based on the emails that I have seen flowing
>> >around  related to this matter, that the information is useful so why not
>> >provide the  flexibility.   Thanks Sukanta Ganguly sganguly@novell.com
>> >
>> >>>><>>>>
>> >At 09:13 AM 2/18/00 -0500, Peter Strong  wrote:
>> >>
>> >>>
>> >>>
>> >>> To be blunt, I don't believe  that there is much use for this draft.
>> >>
>> >>For those of us who  attempt to build applications that work with
>> >>multiple directory  implementations, this information is very useful.
>> >>
>> >
>> >   I said that
>> >  Get it from there, since that  is
>> >  I don't see much point in duplicating  this
>> >  In my opinion, a good internet directory client will  get
>> >information from a variety of internet servers: DNS, LDAP, SNMP, and
others.
>> >
>> >>> The information that it proposes to add to the Root DSE  is already
>> >>> published is
>> >>>  The
>> >>>  I think that this draft
>> >>> should just  point to RFC 2248 (and perhaps 2605) and explain where the
>> >>>  These are already standards  track
>> >>> documents, and have places to put the information that this  draft
>> defines.
>> >>> (Just my $0.02 worth)
>> >>
>> >>The products we  build are LDAP clients, not SNMP clients.
>> >>
>> >>This information should  be available via LDAP.
>> >>
>> >>>
>> >>>  Bruce
>> >>>  ==============================================
>> >>> Bruce Greenblatt, Ph.  D.
>> >>> Directory Tools and Application Services, Inc.
>> >>> http://www.directory-applications.com
>> >>>
>> >>
>> >>------------------------------------------------------------------------
>> >>Peter  Strong
>> >>Software Architect
>> >>Nortel Networks - Optivity Policy  Services (OPS) and NetID
>> >><>
>> >>(613)  831-6615
>> >>
>> >>
>> >>
>> >>
>> >>
>> >>
>> >==============================================
>> >Bruce  Greenblatt, Ph. D.
>> >Directory Tools and Application Services, Inc.
>> >http://www.directory-applications.com
>> >
>> >
>> ==============================================
>> Bruce Greenblatt, Ph. D.
>> Directory Tools and Application Services, Inc.
>> http://www.directory-applications.com
>
>
==============================================
Bruce Greenblatt, Ph. D.
Directory Tools and Application Services, Inc.
http://www.directory-applications.com



From list@netscape.com  Sun Feb 27 13:21:23 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA10005
	for <ldapext-archive@odin.ietf.org>; Sun, 27 Feb 2000 13:21:22 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id KAA28358;
	Sun, 27 Feb 2000 10:16:15 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id KAA03445; Sun, 27 Feb 2000 10:20:19 -0800 (PST)
Resent-Date: Sun, 27 Feb 2000 10:20:19 -0800 (PST)
From: bizop.foryou@belgium.com
Date: Mon, 28 Feb 2000 03:16:40 +0900 (KST)
Message-Id: <200002271816.DAA29081@ns.icec.or.kr>
To: any5one@mail.com
Subject: The Net Spy And You!!
MIME-Version: 1.0
Content-Type: text/plain; charset=unknown-8bit
Resent-Message-ID: <"sXBOzC.A.j1.irWu4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


                        LOOKING FOR GEMS !

It Is So Simple And Easy To Earn $2,000 - $5,000 Per Week...
We're searching for 10 quality individuals with integrity and the work
ethic necessary to generate a positive cash-flow for themselves of $2,000 -
$5,000 per week, and to increase that to over $20,000 per month, in as
little as four to six months. And you know what ? If you really have a
burning desire and a commitment to yourself to succeed, we "GUARANTEE" that
you will achieve this explosive income !

Ask yourself these easy questions: 
1) Do you have a burning desire to take complete personal and financial
control of your life and earn an extraordinary income by helping others to
do the same?
2) Are you looking for a strong and legitimate home-based business
opportunity, that is not a chain-letter scheme or multi-level marketing
(MLM) ?
3) Can you read a short script to our qualified leads, and then turn the
interested prospects over to our electronic sales medium ? (you are not
required to do any selling.)

If the answer is "YES" to ANY of these questions and you have the
self-discipline to ignore the TV and other distractions for a few hours per
day, then this is the opportunity for you to earn an extraordinary income
and learn how to have that income grow "lightning-fast" ! Under our
guidance and support you can build a highly successful business without
having to attend meetings or sell people things they don't want or need.

CALL NOW  for our TOLL FREE, Pre-Recorded Message (800) 742-6549 Ext. 3526
We market a real product, that is high in demand and pays incredible
commissions directly to you ($1,000.00 minimum) just for making the initial
contacts. With our turn-key lead generation systems you will always talk to
people who actually WANT to talk with you.
So call now ! The call is FREE and you have absolutely nothing to lose.
There is "No Risk" involved, and no obligation whatsoever. You may be
qualified to earn thousands of extra dollars per month !

CALL NOW TOLL FREE (800) 742-6549 Ext. 3526
This is a once-in-a-lifetime opportunity ! Get involved now ! Don't wait
for this one to go by and then regret it later. This could be the most
fascinating and profitable business of your life !  Remember, you have
absolutely nothing to loose and EVERYTHING to gain.

PS - Serious inquiries only, please 


to be removed reply and enter remove in the subject.
Thanks



From list@netscape.com  Sun Feb 27 21:01:33 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA14781
	for <ldapext-archive@odin.ietf.org>; Sun, 27 Feb 2000 21:01:32 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id RAA05670;
	Sun, 27 Feb 2000 17:58:44 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id SAA00679; Sun, 27 Feb 2000 18:00:41 -0800 (PST)
Resent-Date: Sun, 27 Feb 2000 18:00:41 -0800 (PST)
Message-Id: <3.0.5.32.20000227180026.00955100@infidel.boolean.net>
X-Sender: guru@infidel.boolean.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Sun, 27 Feb 2000 18:00:26 -0800
To: Bruce Greenblatt <bgreenblatt@directory-applications.com>
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Re: draft-mmeredith-rootdse-vendor-info-02.txt
Cc: Mark Meredith <MMEREDIT@novell.com>, ietf-ldapext@netscape.com
In-Reply-To: <3.0.5.32.20000227091107.0092a100@pop.walltech.com>
References: <38B6D477.78AD089F@netscape.com>
 <s8b65d63.070@prv-mail20.provo.novell.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"oI9SgC.A.VK.Ibdu4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 09:11 AM 2/27/00 -0800, Bruce Greenblatt wrote:
>It would be acceptable to me if wording similar to the following were
>included in the "vendor info" draft:
>
>"Server implementations conforming to this document must also support RFC
>2248.  In particular the strings that are stored in the vendorName and
>vendorVersion attribute values defined here must be also available via SNMP
>from the applName and applVersion fields of the applTable MIB defined in
>RFC 2248."

There should be no requirement for a implementation of LDAP to
implement any other application level protocol.  LDAP should be
sufficient for accessing directories.

>Does any one produce an LDAP server on a platform where
>there is no SNMP agent?

Yes.  And even where there is an SNMP agent, that agent is not
necessarily aware of directory services.

Kurt



From list@netscape.com  Mon Feb 28 10:17:48 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA11144
	for <ldapext-archive@odin.ietf.org>; Mon, 28 Feb 2000 10:17:48 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id HAA22823;
	Mon, 28 Feb 2000 07:12:17 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id HAA00298; Mon, 28 Feb 2000 07:16:23 -0800 (PST)
Resent-Date: Mon, 28 Feb 2000 07:16:23 -0800 (PST)
From: "Ryan Moats" <jayhawk@att.com>
To: "LDAPEXT Mailing List" <ietf-ldapext@netscape.com>,
        "I-D Editor" <internet-drafts@ietf.org>
Cc: "Roland Hedberg" <roland@catalogix.ac.se>
Subject: -02 draft of taxonomy
Date: Mon, 28 Feb 2000 09:15:47 -0600
Message-ID: <003c01bf81fe$b06d69a0$e3c8090a@schooner.local.windrose.omaha.ne.us>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook 8.5, Build 4.71.2377.0
X-MimeOLE: Produced By Microsoft MimeOLE V4.72.3155.0
Importance: Normal
Resent-Message-ID: <"tB5R-D.A.5D.FFpu4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

I-D Editor:

Please replace draft-ietf-ldapext-ldap-taxonomy-01.txt in the repository
with the following draft.  Thanks.

LDAPEXT:

Here is the -02 draft of the LDAP taxonomy with editorial changes based
on WGLC comments.

The authors

=====cut here







Internet-Draft                                                Ryan Moats
draft-ietf-ldapext-ldap-taxonomy-02                                 AT&T
Expires in six months                                     Roland Hedberg
Track: Informational                                           Catalogix
                                                           February 2000


         A Taxonomy of Methods for LDAP Clients Finding Servers
           Filename: draft-ietf-ldapext-ldap-taxonomy-02.txt


Status of this Memo

   This document is an Internet-Draft and is in full conformance with
   all provisions of Section 10 of RFC2026.  Internet-Drafts are working
   documents of the Internet Engineering Task Force (IETF), its areas,
   and its working groups.  Note that other groups may also distribute
   working documents as Internet-Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet- Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

Abstract

   There are several different methods for a LDAP client to find a LDAP
   server. This draft discusses these methods and provides pointers for
   interested parties to learn more about implementing a particular
   method.

1. Introduction

   The Lightweight Directory Access Protocol (LDAP) [1] can be used to
   build "islands" of servers that are not a priori tied into a single
   Directory Information Tree (DIT.) Here, it is necessary to determine
   how a client can discover LDAP servers. This documents discusses the
   currently available methods and provides pointers for interested
   parties to learn more about implementing a particular method.

   This draft documents only those methods that are currently being
   pursued in the IETF.  Other methods have been considered for this



Expires 8/31/2000                                               [Page 1]





INTERNET DRAFT                LDAP Taxonomy                February 2000


   problem and the history of these other methods are presented in the
   Appendix.

2. Methods

2.1 Client Configuration

   The simplest method of enabling a LDAP client to discover LDAP
   servers is for the client administrator to configure the client with
   a list of known LDAP servers (and associated base objects) to send
   queries to.  While this method has the advantage of being correct
   (initially), it adds the requirement that the list of initial servers
   be kept small and constant.  Otherwise, the required client update
   process won't scale.

2.2 Well known DNS aliases

   If the DIT uses a naming scheme similar to that in RFC 2377 [2], then
   it is possible to build the DNS names of potential servers using well
   known DNS aliases, like those documented in RFC 2219 [3].  When a
   different naming scheme is used, it is also possible to build
   potential server names based on the client's fully qualified domain
   name or local (within the organization or country) environment.

   One shortcoming of this method are that it is not exact.  Multiple
   DNS lookups and LDAP protocol operations may be necessary to find the
   proper LDAP server to serve the client requests.  To support client
   roaming, it is necessary that either the RFC 2377 (or similar) naming
   scheme be used or that roaming be implemented through tunnels.

   Because this method uses DNS, it inherits all the security
   considerations of using DNS to discover LDAP servers: see the
   security consideration in [3] for more details.

2.3 Service Location Protocol

   If a client supports the service location protocol [4], it could use
   a SLP query for LDAP servers.  The SLP template that is used to
   describe LDAP servers is presented in [5], and requires that the
   servers announce themselves using SLP and this template.

   Using this method inherits the scaling and security considerations
   for the service location protocol, which are documented further in
   [4].







Expires 8/31/2000                                               [Page 2]





INTERNET DRAFT                LDAP Taxonomy                February 2000


2.4 Referrals

   In LDAPv3, servers can return referrals to the client if the server
   has knowledge of where a query might be satisfiable.  Two ways of
   deploying referral information are deploying a LDAP knowledge server
   or exchanging CIP index objects [6] between servers.

   A LDAP knowledge server would hold cross references to possibly
   hundreds of other LDAP  servers, so that a client would only need to
   know about its local LDAP server and the knowledge server.  As an
   optimization, the local LDAP server could also act as a knowledge
   server.

   If CIP index objects are exchanged between LDAP servers, then those
   objects can also carry URL information for providing referrals to
   clients. Here, the client would only need to know about the local
   server. Using CIP index objects inherits the security considerations
   of CIP: see [6, 7, 8] for more details.

   In either of these cases, the local LDAP server could be determined
   using another of the methods discussed.

2.5 Using SRV records

   RFC 2052 [12] defined SRV records for DNS, which bound a host name
   and port to a label in the DNS. This makes it possible for a client
   to look up information about a supported protocol for a domain and
   get back a  weighted list of fully qualified domain names and ports
   for where that protocol is supported.  For more information, see
   [13].

3. Implementation

   The Norwegian Directory Forum plans to start a service based on a
   central LDAP service containing contact information for every
   organization within Norway [10]. If an organization has more
   information about its sub-units, employees or functions that it wants
   to publish it can do so by placing this information in a publicly
   available LDAP server and providing the management of the central
   service with a pointer (URL) to this server.

   The TISDAG project is running a test service based on the TISDAG
   specification [11]. This service gathers indices from connected White
   Pages Service Providers using CIP Tagged Index Objects [9].  The
   rationale for this service is that by supplying the name of a person
   or a function/role to the service it will return pointers to where
   more information can be found about persons/functions with that name.




Expires 8/31/2000                                               [Page 3]





INTERNET DRAFT                LDAP Taxonomy                February 2000


   The European cofunded project DESIRE (www.desire.org) is designing a
   system to use a LDAP server that communicates with a referral index
   that in turn, uses CIP Tagged Index Objects [9] and is fed by LDAP
   crawlers.  DANTE plans to set up a European infrastructure of such
   referral index servers.

4. References

   Request For Comments (RFC) and Internet Draft documents are available
   from numerous mirror sites.

[1]         M. Wahl, T. Howes, S. Kille, Lightweight Directory Access
            Protocol (v3), RFC 2251, December 1997.

[2]         A. Grimstad, R. Huber, S. Sataluri, M. Wahl, Naming Plan for
            Internet Directory-Enabled Applications, RFC 2377, September
            1998.

[3]         M. Hamilton, R. Wright, "Use of DNS Aliases for Network Ser-
            vices," RFC 2219 (Also BCP 17), October 1997.

[4]         E. Guttman, C. Perkins, J. Veizades, M. Day, "Service Loca-
            tion Protocol, Version 2," RFC 2608, June 1999.

[5]         J. Wood, R. Tam, "The LDAP Service Type," Internet Draft
            (work in progress), July 1999.

[6]         J. Allen, M. Mealling, "The Architecture of the Common
            Indexing Protocol (CIP)," RFC 2651, August 1999.

[7]         J. Allen, M. Mealling, "MIME Object Definitions for the Com-
            mon Indexing Protocol (CIP)," RFC 2652, August 1999.

[8]         J. Allen, P. Leach, R. Hedberg, "CIP Transport Protocols,"
            RFC 2653, August 1999.

[9]         R. Hedberg, B. Greenblatt, R. Moats, M. Wahl, "A Tagged
            Index Object for use in the Common Indexing Protocol," RFC
            2654, August 1999.

[10]        R. Hedberg, H. Alverstrand, "Technical Specification, The
            Norwegian Directory of Directories (NDD)," Internet Draft
            (work in progress), May 1999.

[11]        R. Hedberg, L. Daigle, "Technical Infrastructure for Swedish
            Directory Access Gateways (TISDAG)," Internet Draft (work in
            progress), February 2000.




Expires 8/31/2000                                               [Page 4]





INTERNET DRAFT                LDAP Taxonomy                February 2000


[12]        A. Gulbrandsen, P. Vixie, "A DNS RR for specifying the loca-
            tion of services (DNS SRV)," RFC 2052, October 1996.

[13]        M. Armijo, L. Esibov, P. Leach, "Discovering LDAP Services
            with DNS," Internet Draft (work in progress), July 1999.

5. Author's Addresses

      Ryan Moats                  Roland Hedberg
      AT&T                        Catalogix
      15621 Drexel Circle         Dalsveien 53
      Omaha, NE 68135             0775 Oslo
      USA                         Norway
      Email: jayhawk@att.com      Email: roland@catalogix.ac.se

Appendix A. Historical Methods

A.1 Discovery

   The discovery approach was to use a combination of other methods pre-
   sented in this taxonomy along with storing either the search DN or a
   related URL in the DNS in some way.  Using both TXT or NAPTR records
   in the DNS were considered.  This approach requires an administrator
   to configure the DNS with necessary information.  Further, the idea
   of storing standards based information (either a DN or an URL) in a
   DNS RR has been an extremely controversial one in the IETF.

A.2 DHCP extensions

   Another proposed method was to use DHCP to deliver information about
   LDAP server to a DHCP client. This would require that such informa-
   tion be configured into the DHCP server and that the client use DHCP
   to load host configuration information. While there has been some
   nascent interest in this method, there has been no interest in imple-
   mentation of this approach.
















Expires 8/31/2000                                               [Page 5]





From list@netscape.com  Mon Feb 28 12:12:19 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA14970
	for <ldapext-archive@odin.ietf.org>; Mon, 28 Feb 2000 12:12:18 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id JAA04203;
	Mon, 28 Feb 2000 09:07:03 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id JAA06765; Mon, 28 Feb 2000 09:11:05 -0800 (PST)
Resent-Date: Mon, 28 Feb 2000 09:11:05 -0800 (PST)
Message-ID: <5B34AF33D291D311A06D0004AC1509D7C5B98F@unity-mail.icomverse.com>
From: "Vilenchik, Osnat" <Osnat_Vilenchik@icomverse.com>
To: ldap@umich.edu, ietf-ldapext@netscape.com
Cc: "Kessler, Dror" <Dror_Kessler@icomverse.com>
Subject: Netscape SDK Socket Blocking Problem? (WSAEINPROGRESS)
Date: Mon, 28 Feb 2000 19:09:09 +0200
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.21)
Content-Type: text/plain;
	charset="iso-8859-1"
Resent-Message-ID: <"Hj5VEB.A.bpB.owqu4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


Hi

> We are having problems with heavy loads on the Netscape SDK. When running
> many threads (200 or so), each one issuing a search request, the socket
> layer (window sockets) starts returning a WSAEINPROGRESS error to the SDK.
> This indicates that the socket is blocked (full of pending data) and can
> not accept data for now (the condition is temporary since soon after, the
> socket gets out of the blocked mode as it sends the buffered data to the
> server). 
> 
> The SDK code (as available from Mozilla, Sdk version 3) regards any error
> from the socket layer on a write (send) as a cause for returning an
> LDAP_SERVER_DOWN error. 
> 
> This causes a problem since although the connection is not actually down,
> the Sdk says so. This results in our error recovery code being triggered,
> causing all sorts of other complications.
> 
> Question: is it really so - that once an error code (even one that
> represents a temporary difficulty) is received by the Netscape Sdk code it
> regards the connection is dead? 
> 
Did anyone had such an experience? Are you aware of any SDK which handles
such cases?

Thanx, 
Ossie Vilenchik
Office: 972-3-7655759 Fax: 972-3-6452855
e-mail: osnat_vilenchik@icomverse.com





From list@netscape.com  Mon Feb 28 14:19:26 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA17974
	for <ldapext-archive@odin.ietf.org>; Mon, 28 Feb 2000 14:19:24 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id LAA22047;
	Mon, 28 Feb 2000 11:15:20 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id LAA12004; Mon, 28 Feb 2000 11:17:20 -0800 (PST)
Resent-Date: Mon, 28 Feb 2000 11:17:20 -0800 (PST)
Message-ID: <38BAC845.C786614D@whistle.com>
Date: Mon, 28 Feb 2000 11:11:01 -0800
From: Terry Lambert <terry@whistle.com>
X-Mailer: Mozilla 4.06 [en] (Win95; I)
MIME-Version: 1.0
To: "Vilenchik, Osnat" <Osnat_Vilenchik@icomverse.com>
CC: ldap@umich.edu, ietf-ldapext@netscape.com,
        "Kessler, Dror" <Dror_Kessler@icomverse.com>
Subject: Re: [ldap] Netscape SDK Socket Blocking Problem? (WSAEINPROGRESS)
References: <LYR5164-66515-2000.02.28-12.11.31--terry#whistle.com@listserver.itd.umich.edu>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"vSY5KD.A.F7C.-msu4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Vilenchik, Osnat wrote:
> > We are having problems with heavy loads on the Netscape
> > SDK. When running many threads (200 or so), each one
> > issuing a search request, the socket layer (window
> > sockets) starts returning a WSAEINPROGRESS error to the
> > SDK.  This indicates that the socket is blocked (full
> > of pending data) and can not accept data for now (the
> > condition is temporary since soon after, the socket
> > gets out of the blocked mode as it sends the buffered
> > data to the server).

This is arguably a bug in the sockets implementation; the
write attempt should be blocked until it can be successfully
completed by the operating system, instead of returning a
"try again later, I have brain damage right now" error.

Clearly, the SDK needs to work around the brain damage of
the OS on which it is expected to run (unfortunate but true,
I'm afraid).

It's terrifically tempting to "punish" the damaged OS by
spinning on the write until it can be successfully
completed... moreso because it would avoid having to write
a seperate retry latency mechanism to work around the OS
being "too busy to take commands from you right now".

Conventional "wisdom" would tell us "start another thread to
hold the retry"...

8-p


-- Terry Lambert
-- Whistle Communications, Inc., an I.B.M. Company
-- terry@whistle.com
-------------------------------------------------------------------
This is formal notice under California Assembly Bill 1629, enacted
9/26/98 that any UCE sent to my email address will be billed $50
per incident to the legally allowed maximum of $25,000.



From list@netscape.com  Mon Feb 28 21:23:25 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA25814
	for <ldapext-archive@odin.ietf.org>; Mon, 28 Feb 2000 21:23:24 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id SAA16503;
	Mon, 28 Feb 2000 18:18:06 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id SAA07420; Mon, 28 Feb 2000 18:22:12 -0800 (PST)
Resent-Date: Mon, 28 Feb 2000 18:22:12 -0800 (PST)
Message-ID: <38BB2DF0.D3B7596F@us.oracle.com>
Date: Mon, 28 Feb 2000 18:24:48 -0800
From: Hari Sastry <hsastry@us.oracle.com>
X-Mailer: Mozilla 4.51 [en] (Win95; U)
X-Accept-Language: en
MIME-Version: 1.0
To: ietf-ldapext@netscape.com
Subject: (no subject)
Content-Type: text/html; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"qZRm2.A.qzB.T1yu4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

<!doctype html public "-//w3c//dtd html 4.0 transitional//en">
<html>
Add me.</html>



From list@netscape.com  Tue Feb 29 06:27:59 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA14936
	for <ldapext-archive@odin.ietf.org>; Tue, 29 Feb 2000 06:27:59 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.8.5/8.8.5) with ESMTP id DAA17817;
	Tue, 29 Feb 2000 03:22:40 -0800 (PST)
Received: (from list@localhost) by aka.mcom.com (8.8.5/8.7.3) id DAA21378; Tue, 29 Feb 2000 03:26:47 -0800 (PST)
Resent-Date: Tue, 29 Feb 2000 03:26:47 -0800 (PST)
Message-Id: <200002291126.GAA14849@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ietf-ldapext@netscape.com
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-ldapext-ldap-taxonomy-02.txt
Date: Tue, 29 Feb 2000 06:26:42 -0500
Sender: nsyracus@cnri.reston.va.us
Resent-Message-ID: <"Pa3tsD.A.qNF.1z6u4"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the LDAP Extension Working Group of the IETF.

	Title		: A Taxonomoy of Methods for LDAP Clients Finding
                          Servers
	Author(s)	: R. Moats, R. Hedberg
 	Filename	: draft-ietf-ldapext-ldap-taxonomy-02.txt
	Pages		: 5
	Date		: 28-Feb-00
	
There are several different methods for a LDAP client to find a LDAP
server. This draft discusses these methods and provides pointers for
interested parties to learn more about implementing a particular
method.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ldapext-ldap-taxonomy-02.txt

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ldapext-ldap-taxonomy-02.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ldapext-ldap-taxonomy-02.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20000228125616.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ldapext-ldap-taxonomy-02.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ldapext-ldap-taxonomy-02.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20000228125616.I-D@ietf.org>

--OtherAccess--

--NextPart--




