Tech Insider					     Technology and Trends

		     Kerberos V5 Mailing List Archives

Date: Wed, 28 Nov 90 10:20:50 -0500
From: John T Kohl < jtkohl@ATHENA.MIT.EDU>

Status reports:
jtkohl:		working on RFC
		minor source work
jfc:		comments on GSS sent off to DEC folks
		"thinking" about user2user issues/API stuff, with an eye
			toward X11 needs
		RT build in progress
don:		KDC v4 compatibility code is working
		looking at other compatibility issues
tytso:		des v4/v5 compat done (doesn't save much code space :-<)
		will do db load/unload stuff (for slave code)

		will do some des library cleanup (long *'s instead of
			char's, etc)
		will do a "v4 extract srvtab" function for kdb5_edit
jon:		absent
raeburn:	AWOL

string2key discussion, w.r.t. conversion possibilities from v4 to v5
Probable solution:
	In KDC response, indicate in some fashion which algorithm to use
for converting password to key.  This may be the string to mix in, or
some shorthand for indicating same.
	KDC database has information (extra word, probably) to indicate
which algorithm was used at password-setting time.

discussion of scheduling stuff, and confusion about what OSF/HP wants;
this should be cleared up soon with some expected communication.

build issues:  before shipping, we should merge the libraries to reduce
the needs for -l (ideally applications would just use -lkrb5 -ldes -lisode)

documentation: who's going to do it?  We really need some build
documentation, and will soon need API/application/user documentation.

			        About USENET

USENET (Users’ Network) was a bulletin board shared among many computer
systems around the world. USENET was a logical network, sitting on top
of several physical networks, among them UUCP, BLICN, BERKNET, X.25, and
the ARPANET. Sites on USENET included many universities, private companies
and research organizations. See USENET Archives.

		       SCO Files Lawsuit Against IBM

March 7, 2003 - The SCO Group filed legal action against IBM in the State 
Court of Utah for trade secrets misappropriation, tortious interference, 
unfair competition and breach of contract. The complaint alleges that IBM 
made concentrated efforts to improperly destroy the economic value of 
UNIX, particularly UNIX on Intel, to benefit IBM's Linux services 
business. See SCO v IBM.

The materials and information included in this website may only be used
for purposes such as criticism, review, private study, scholarship, or

Electronic mail:			       WorldWideWeb: