LDAPEXT Minutes 31-July-2000  1-3pm   Chair: Mark Wahl

Recorded by Mark Smith <[email protected]>

1:05pm Start

- Discussion of agenda
       Kurt Z.: add grouping at the end?
       Mark W.: may come up under charter review

- Other groups and BOFS (Mark Wahl and everyone)
       LDUP (Tuesday)
       LDAPbis (Wed afternoon)
       LDAP Grouped Operations (dinner BOF: 5:30pm near palms)
       SP-DNA intro. session (7:30pm in N. meeting room 2)
       SP-DNA working groups (8:00pm)
       Evolving LDAP Schema Entries (ELSE - not scheduled)
       VPIM 2nd meeting - LDAP schema (Thu afternoon)

- New RFCs: startTLS, LDAP auth. methods, Digest/MD5

- Pending RFCs: server side sorting and VLV

- Duplicate entries - Jim S. (1 transparency)
       last call comments handled:
               added option for server to selectively apply the dupent ctrl
               a control is now returned with each searchResultEntry
               allow any LDAPv3 result code to be returned in result ctrl
               updated examples, etc.
       outstanding issues:
               attribute subtypes ignored (goes against X.500 + LDAPv3)
               what if returned attr. list does not include dup ctrl attr?
       next step: revise and issue another last call

- Java API (Jim S.)
       last call comments handled:
               main/sync. and async. drafts combined into one document
               changes to schema abstraction classes
       next step: issue another last call.  Mark W. to issue last call.
       Kurt Z.: still some outstanding LDAPv2 & charset issues to work on.

- Server discovery
       Taxonomy doc. is waiting on its dependencies (last call completed OK)
       Locating servers through DNS (Michael Armijo) - last call comments
               fully qualified domain names syntax and text
               conversion of domain names into DNs
               security considerations additions (DNS spoofing)
               next step: review and reissue last call

- LDAP access control - Ellen Stokes (3 electronic slides)
       Engineering subteam has made good progress over the past 3-4 months
               Trying to take the good things from X.500
               BNF and ASN.1 clean up
               strength of authentication added (SASL issues remain)
               management (access control for ldapaci)
               subEntries: need to add scoping?
               text added on alias derefering and referrals
               version of ldapaci: punting (define a new attr later if needed)
               security considerations, examples, etc. updated
       Other work to be done:
               discloseOnError to be moved to a permission ala X.500
               browse/read/search clarifications needed
               rename to possibly be removed in favor of other permissions
               scoping: divide into two attributes (David Chadwick)
               implicit vs. explicity deny "conflicts"
               support filters in the aci?  leaning is towards "no"
               subentry issues
               specificity of permissions
       Jim S.: meetings or mailing list to resolve open issues?
       Ellen: get together after this meeting to schedule more face-2-face time
       ?: replicated area issues not addressed (replication of acis)
       Ellen: that is an oversight
       Mark W.: time table for new draft
       Ellen: by end of August if progress can be made; then issue last call

- Referrals and knowledge references - Roland Hedberg (elec. slides)
       plan: split into 2 documents
               a) superior & subordinate plus general schema, etc.
               b) other kinds of references
       Bruce Greenblatt (?): what is a superior reference?
       Roland: open issue to be resolved
       Kurt Z.: global superior (doc a) vs. immediate superior (doc b)
       Open issues:
               replication related issues
               manageDSAIT control definition ("unhide" knowledge info
                       vs. see only knowledge info.)
       ???: Do we need NSSR?
       Roland: 2 places something similar to NSSR is useful:
               a) efficient support for one level searches (spot shadowing)
               b) master info. below a country node plus org. specific info.
       Mark W.: can we publish document a) (immediate subordinates)
               by end of August?
       Roland: yes, hopefully.

- CLDAP - Leif J. (transparencies)
       motivation: simple, fast anonymous reads
       Open issues:
               No updates (hard to do over UDP)
               No new security mechanisms (rely on ipsec and friends)
               Retry scheme using same LDAP msgid to be specified
       Bruce G. ?: Active Directory does this today.  How does this align?
       Leif: Unknown, but it is still early in the CLDAPv3 specification process.
       Mark W.: there are at least 3 LDAPv2 CLDAP implementations
       Mark W.: wants updates, SASL, etc.

- Subentries - Ed Reed (elect. slides)
       Presentation of resolved issues:
               cn is a "may" although it will typically be the naming attribute
               auxiliary objectclass
       Scoping: Ed assumed it would be derived from the definition of the administrative areas and naming contexts, i.e., this is like an X.501 subentry that does not have a subtreeSpecifier
       But: inheritance across naming contexts, etc. is a tricky area
               Some implementations (e.g., Novell) "cache" inherited rights across naming context boundaries
       Input so far:  need scoping for access control
               make it clear, regardless
       Mark W.: make the default clear and allow subclasses to override the definition
       Ellen Stokes: access control spec. currently assumes ldapaci applies from its location down the tree until another ldapaci is encountered (or to the leaves if no additional ldapaci's)
       Ed: where can these subEntries be defined?  Intent was to limit the locations to a few "well known" areas
       David Chadwick: administrative areas and naming contexts need to be treated separately -- be more flexible.  Say that subEntries always reside within AA boundaries, i.e., drop naming contexts from the ldapSubEntry specification.
       XXX: Agree with David.  Note that naming contexts are within one server but AAs can span servers.
       Ed: But we don't have a way to denote the AAs in LDAP.  Define an auxiliary class to hold an attribute for this.
       Mark W.: adopt the one from X.500 (the attribute's value is an OID).
       XXX: Does this discussion belong in the ELSE BOF?
       Mark W.: ELSE is focused on user schema, not admin./operational schema
       David C.: Need operational attr. within each entry to locate the nearest AA.  Could also have a list in the rootDSE of AAs.
       Ed: Also need a way to decorate ldapSubEntries.
       Helmut Volpers: operational attribute vs. aux class
       Ed: I find aux. classes more elegant
       David C.: Not needed.  AAs are implicitly defined.
       Kurt Z.: Subentries within subentries.  What does each entry apply to?
       Ed: Intent was that all subentries that are together are one set.
       Mark W.: Could express how nesting is handled (in a specification for a particular flavor of subentry).
       David C.: This would disallow one subentry to hold two kinds of info., e.g. replication and access control
       Mark W.: Typically they would be separate anyway.
       Next step: Ed to initiate discussion on the list.
       Robert Byrne: Should demonstrate how many applications really need scoping vs. those that do not.  If there are many applications, we should address it in a common way but if not we can leave it up to each application.
       Ed: Trying to avoid copy/paste of subtreeSpecifier from X.500.  People can use that today if they like (MUST X.500 in RFC 2251)
       Kurt Z.: Why do we need this if we have X.500 subentries already?
       Ed: Doesn't allow nesting of replication subentries.
       Mark W.: Doesn't allow for other naming attributes.
       Ed: Will need to clarify this point.

Charter Review (Mark Wahl led discussion; elect. slides)
       Probably need one or two more IETF meetings to wrap up current work
       Other work to be done
               Simple extensions
               Complex extensions (requirements needed)
                       LCUP
                       operation grouping
                       families of entries
                       schema issues
               Schema specification issues (some specs. are circa 1991)
               LDAPv3 bug fixes (how to move to DS)
               Documents LDAP depends on, e.g., SASL.
       Patrik F.: area directors want two working groups
               a) core protocol group to focus on MUSTs (attend the BOF)
               b) optional extensions as a separate group
       Patrik F.: What else is needed to take LDAPv3 to DS?
       Next steps: attend the LDAPbis BOF
                       rechartering discussion w/ADs and so on.

Non Work Item - Matched values only - David Chadwick (elec. slides)
       Simplified approach specified; new I-D released in July.
       Next steps: new draft followed by last call
               remove complex examples (no longer interesting)
               add/keep 3 useful examples
               take into account recent comments
       Open issue: some people say this work is not needed.
       Mark W.: the matched values filter is not the same as search filter
       David: Yes, it is simpler.   Just the basic filter items.  Subset.
       Helmut Volpers: So I can't use the same filter in both places?
       David: Yes, the use of the filter is different.

Non Work Item - Password extended op - Kurt Z.
       Submitted to area directors

Non Work Item - Auth Password - Kurt Z.
       Still some open issues; to be discussed on the list.

Non Work Item - Password Policy - Jim S.
       Almost ready for last call
       Will reissue with replication related fix.

Non Work Item - Reply Signatures (no one to represent this)

Non Work Item - LDAP Grouping discussion
       Mark W.: motivation comes from LDUP (grouping of repl. updates)
               Also, various transaction drafts.
               Also, bulk update (LBURP)
               Beginning and ending (framing) is useful.  But semantics are challenging to specify.  ACID?  A stream of operations?
               Kurt Z. draft specified semantics using an OID.
               Many people working on this at the same time.  We need 3 things:
                       - a requirements document
                       - framing
                       - semantics of grouping (several documents?)
       Roger Harrison: Mark's comments stand: this is generally useful.
       Kurt Z.: Need to get on the same sheet of music, but there are some semantic differences.  Should have an engineering team meeting.
       Mark W.: 5:30pm today!
       XXX: Multiple groups on the same connection at the same time.
       Mark W.: Yes, if control is used.
       XXX: Not going to use the word "transactions?"
       Mark W.: ACID is not needed for everthing.  Let's do the core work and let the struggles continue where there are hard issues)
       Rick Huber: Replication is a useful property of directories.  Make sure we take that into account.
       Kurt Z.: Single master only?
       Rick: Disagree.
       XXX: There is somewhat of an analagous situation in the SCSI world:  linking of commands (e.g., sequence plus link flag)
       Mark W.: One interesting thing is that operations need not be performed in the order sent by the client.

Send slides and presos. to Mark W.

2:50pm Break.