Internet Assigned Numbers Authority
Kerberos Parameters
Created
2004-06-29
Last Updated
2024-12-06
Available Formats
[IMG]
XML [IMG]
HTML [IMG]
Plain text
Registries included below
??Kerberos Encryption Type Numbers
??Kerberos Checksum Type Numbers
??Kerberos TCP Extensions
??Pre-authentication and Typed Data
??FAST Armor Types
??FAST Options
??Well-Known Kerberos Principal Names
??Well-Known Kerberos Realm Names
??Kerberos Message Transport Types
??Kerberos Second Factor Types
??Kerberos SPAKE Groups
Kerberos Encryption Type Numbers
Registration Procedure(s)
Standards Action for standards-track RFCs; non-standards-track
RFCs must be reviewed by an expert.
Expert(s)
Ken Raeburn
Reference
[RFC3961]
Note
These are signed values ranging from -2147483648 to 2147483647. Positive
values should be assigned only for algorithms specified in accordance
with this specification for use with Kerberos or related protocols.
Negative values are for private use; local and experimental algorithms
should use these values. Zero is reserved and may not be assigned.
Available Formats
[IMG]
CSV
etype encryption type Reference
0 reserved [RFC6448]
1 des-cbc-crc (deprecated) [RFC6649]
2 des-cbc-md4 (deprecated) [RFC6649]
3 des-cbc-md5 (deprecated) [RFC6649]
4 Reserved [RFC3961]
5 des3-cbc-md5 (deprecated) [RFC8429]
6 Reserved [RFC3961]
7 des3-cbc-sha1 (deprecated) [RFC8429]
8 Unassigned
9 dsaWithSHA1-CmsOID [RFC4556]
10 md5WithRSAEncryption-CmsOID [RFC4556]
11 sha1WithRSAEncryption-CmsOID [RFC4556]
12 rc2CBC-EnvOID [RFC4556]
13 rsaEncryption-EnvOID [RFC4556][from PKCS#1 v1.5]]
14 rsaES-OAEP-ENV-OID [RFC4556][from PKCS#1 v2.0]]
15 des-ede3-cbc-Env-OID [RFC4556]
16 des3-cbc-sha1-kd (deprecated) [RFC8429]
17 aes128-cts-hmac-sha1-96 [RFC3962]
18 aes256-cts-hmac-sha1-96 [RFC3962]
19 aes128-cts-hmac-sha256-128 [RFC8009]
20 aes256-cts-hmac-sha384-192 [RFC8009]
21-22 Unassigned
23 rc4-hmac (deprecated) [RFC8429]
24 rc4-hmac-exp (deprecated) [RFC6649]
25 camellia128-cts-cmac [RFC6803]
26 camellia256-cts-cmac [RFC6803]
27-64 Unassigned
65 subkey-keymaterial [(opaque; PacketCable)]
66-2147483647 Unassigned
Kerberos Checksum Type Numbers
Registration Procedure(s)
Standards Action for standards-track RFCs; non-standards-track
RFCs must be reviewed by an expert.
Expert(s)
Ken Raeburn
Reference
[RFC3961]
Note
These are signed values ranging from -2147483648 to 2147483647. Positive
values should be assigned only for algorithms specified in accordance
with this specification for use with Kerberos or related protocols.
Negative values are for private use; local and experimental algorithms
should use these values. Zero is reserved and may not be assigned.
Available Formats
[IMG]
CSV
sumtype value Checksum type checksum size Reference
0 Reserved [RFC3961]
1 CRC32 (deprecated) 4 [RFC6649]
2 rsa-md4 (deprecated) 16 [RFC6649]
3 rsa-md4-des (deprecated) 24 [RFC6649]
4 des-mac (deprecated) 16 [RFC6649]
5 des-mac-k (deprecated) 8 [RFC6649]
6 rsa-md4-des-k (deprecated) 16 [RFC6649]
7 rsa-md5 (deprecated) 16 [RFC8429]
8 rsa-md5-des (deprecated) 24 [RFC6649]
9 rsa-md5-des3 24
10 sha1 (unkeyed) 20
11 Unassigned
12 hmac-sha1-des3-kd (deprecated) 20 [RFC8429]
13 hmac-sha1-des3 (deprecated) 20 [RFC8429]
14 sha1 (unkeyed) 20
15 hmac-sha1-96-aes128 20 [RFC3962]
16 hmac-sha1-96-aes256 20 [RFC3962]
17 cmac-camellia128 16 [RFC6803]
18 cmac-camellia256 16 [RFC6803]
19 hmac-sha256-128-aes128 16 [RFC8009]
20 hmac-sha384-192-aes256 24 [RFC8009]
21-32770 Unassigned
32771 Reserved [RFC1964]
32772-2147483647 Unassigned
Kerberos TCP Extensions
Reference
[RFC5021]
Available Formats
[IMG]
CSV
Range Registration Procedures Note
0-29 Standards Action or IESG Approval
30 Reserved Standards Action that updates or obsoletes [RFC5021]
Value Description Reference
0 Krb5 over TLS [RFC6251]
1-29 Unassigned
30 Reserved [RFC5021]
Pre-authentication and Typed Data
Registration Procedure(s)
Expert Review
Expert(s)
Sam Hartman (primary), Larry Zhu (secondary)
Reference
[RFC6113]
Note
The designated expert may find that IETF Review is required. See
[RFC6113] for more information.
Available Formats
[IMG]
CSV
Type Value Reference
1 PA-TGS-REQ [RFC4120]
2 PA-ENC-TIMESTAMP [RFC4120]
3 PA-PW-SALT [RFC4120]
4 reserved [RFC6113]
5 PA-ENC-UNIX-TIME (deprecated) [RFC4120]
6 PA-SANDIA-SECUREID [RFC4120]
7 PA-SESAME [RFC4120]
8 PA-OSF-DCE [RFC4120]
9 PA-CYBERSAFE-SECUREID [RFC4120]
10 PA-AFS3-SALT [RFC4120][RFC3961]
11 PA-ETYPE-INFO [RFC4120]
12 PA-SAM-CHALLENGE [draft-ietf-cat-kerberos-passwords-04]
13 PA-SAM-RESPONSE [draft-ietf-cat-kerberos-passwords-04]
14 PA-PK-AS-REQ_OLD [draft-ietf-cat-kerberos-pk-init-09]
15 PA-PK-AS-REP_OLD [draft-ietf-cat-kerberos-pk-init-09]
16 PA-PK-AS-REQ [RFC4556]
17 PA-PK-AS-REP [RFC4556]
18 PA-PK-OCSP-RESPONSE [RFC4557]
19 PA-ETYPE-INFO2 [RFC4120]
20 PA-USE-SPECIFIED-KVNO [RFC4120]
20 PA-SVR-REFERRAL-INFO [RFC6806]
21 PA-SAM-REDIRECT [draft-ietf-krb-wg-kerberos-sam-03]
22 PA-GET-FROM-TYPED-DATA [(embedded in typed data)][RFC4120]
22 TD-PADATA [(embeds padata)][RFC4120]
23 PA-SAM-ETYPE-INFO [(sam/otp)][draft-ietf-krb-wg-kerberos-sam-03]
24 PA-ALT-PRINC [draft-ietf-krb-wg-hw-auth-04]
25 PA-SERVER-REFERRAL [draft-ietf-krb-wg-kerberos-referrals-11]
26-29 Unassigned
30 PA-SAM-CHALLENGE2 [draft-ietf-krb-wg-kerberos-sam-03]
31 PA-SAM-RESPONSE2 [draft-ietf-krb-wg-kerberos-sam-03]
32-40 Unassigned
41 PA-EXTRA-TGT [Reserved extra TGT][RFC6113]
42-100 Unassigned
101 TD-PKINIT-CMS-CERTIFICATES [RFC4556]
102 TD-KRB-PRINCIPAL [PrincipalName][RFC6113]
103 TD-KRB-REALM [Realm][RFC6113]
104 TD-TRUSTED-CERTIFIERS [RFC4556]
105 TD-CERTIFICATE-INDEX [RFC4556]
106 TD-APP-DEFINED-ERROR [Application specific][RFC6113]
107 TD-REQ-NONCE [INTEGER][RFC6113]
108 TD-REQ-SEQ [INTEGER][RFC6113]
109 TD_DH_PARAMETERS [RFC4556]
110 Unassigned
111 TD-CMS-DIGEST-ALGORITHMS [RFC8636]
112 TD-CERT-DIGEST-ALGORITHMS [RFC8636]
113-127 Unassigned
128 PA-PAC-REQUEST [MSKILE][http://msdn2.microsoft.com/en-us/library/cc206927.aspx]
129 PA-FOR_USER [MSKILE][http://msdn2.microsoft.com/en-us/library/cc206927.aspx]
130 PA-FOR-X509-USER [MSKILE][http://msdn2.microsoft.com/en-us/library/cc206927.aspx]
131 PA-FOR-CHECK_DUPS [MSKILE][http://msdn2.microsoft.com/en-us/library/cc206927.aspx]
132 PA-AS-CHECKSUM [MSKILE][http://msdn2.microsoft.com/en-us/library/cc206927.aspx]
133 PA-FX-COOKIE [RFC6113]
134 PA-AUTHENTICATION-SET [RFC6113]
135 PA-AUTH-SET-SELECTED [RFC6113]
136 PA-FX-FAST [RFC6113]
137 PA-FX-ERROR [RFC6113]
138 PA-ENCRYPTED-CHALLENGE [RFC6113]
139-140 Unassigned
141 PA-OTP-CHALLENGE [RFC6560]
142 PA-OTP-REQUEST [RFC6560]
143 PA-OTP-CONFIRM (OBSOLETED) [RFC6560]
144 PA-OTP-PIN-CHANGE [RFC6560]
145 PA-EPAK-AS-REQ [(sshock@gmail.com)][RFC6113]
146 PA-EPAK-AS-REP [(sshock@gmail.com)][RFC6113]
147 PA_PKINIT_KX [RFC8062]
148 PA_PKU2U_NAME [draft-zhu-pku2u-09]
149 PA-REQ-ENC-PA-REP [RFC6806]
150 PA_AS_FRESHNESS [RFC8070]
151 PA-SPAKE [RFC9588]
152 PA-REDHAT-IDP-OAUTH2 [Pavel_B?ezina]
153 PA-REDHAT-PASSKEY [Pavel_B?ezina]
154-164 Unassigned
165 PA-SUPPORTED-ETYPES [MSKILE][http://msdn2.microsoft.com/en-us/library/cc206927.aspx]
166 PA-EXTENDED_ERROR [MSKILE][http://msdn2.microsoft.com/en-us/library/cc206927.aspx]
FAST Armor Types
Registration Procedure(s)
Standards Action
Reference
[RFC6113]
Available Formats
[IMG]
CSV
Type Name Description Reference
0 Reserved Reserved [RFC6113]
1 FX_FAST_ARMOR_AP_REQUEST Ticket armor using an ap-req. [RFC6113]
FAST Options
Registration Procedure(s)
Standards Action
Reference
[RFC6113]
Available Formats
[IMG]
CSV
Type Name Description Reference
0 RESERVED Reserved for future expansion of this field. [RFC6113]
1 hide-client-names Requesting the KDC to hide client names in the KDC response [RFC6113]
16 kdc-follow-referrals reserved [RFC6113]
Well-Known Kerberos Principal Names
Registration Procedure(s)
Specification Required
Expert(s)
Unassigned
Reference
[RFC6111]
Available Formats
[IMG]
CSV
Well-Known Kerberos Principal Name Reference
anonymous [RFC8062]
Well-Known Kerberos Realm Names
Registration Procedure(s)
Specification Required
Expert(s)
Unassigned
Reference
[RFC6111]
Available Formats
[IMG]
CSV
Well-Known Kerberos Realm Name Reference
anonymous [RFC8062]
Kerberos Message Transport Types
Registration Procedure(s)
IETF Review
Reference
[RFC6784]
Available Formats
[IMG]
CSV
Value Description Reference
0 Reserved [RFC6784]
1 UDP [RFC6784]
2 TCP [RFC6784]
3 TLS [RFC6784]
4-254 Unassigned
255 Reserved [RFC6784]
Kerberos Second Factor Types
Registration Procedure(s)
Specification Required
Expert(s)
Simo Sorce, Greg Hudson
Reference
[RFC9588]
Note
Registration requests should be sent to the mailing list described
in [RFC9588]. If approved, designated experts should notify IANA
within three weeks. For assistance, please contact iana@iana.org.
Note
These are signed integers ranging from -2147483648 to 2147483647,
inclusive. Positive values must be assigned only for algorithms
specified in accordance with these rules for use with Kerberos
and related protocols. Negative values should be used for private
and experimental algorithms only. Zero is reserved and must not
be assigned. Values should be assigned in increasing order.
Available Formats
[IMG]
CSV
ID Number Name Reference
0 Reserved [RFC9588]
1 SF-NONE [RFC9588]
Kerberos SPAKE Groups
Registration Procedure(s)
Specification Required
Expert(s)
Simo Sorce, Greg Hudson
Reference
[RFC9588]
Note
Registration requests should be sent to the mailing list described
in [RFC9588]. If approved, designated experts should notify IANA
within three weeks. For assistance, please contact iana@iana.org.
Note
These are signed integers ranging from -2147483648 to 2147483647,
inclusive. Positive values must be assigned only for algorithms
specified in accordance with these rules for use with Kerberos
and related protocols. Negative values should be used for private
and experimental algorithms only. Zero is reserved and must not
be assigned. Values should be assigned in increasing order.
Available Formats
[IMG]
CSV
ID Name Serialization Multiplier Multiplier SPAKE M Constant SPAKE N Constant Hash Reference
Number Length Conversion Function
0 Reserved [RFC9588]
[RFC8032, [RFC8032, SHA-256 [RFC7748, Section
1 edwards25519 Section 3.1] 32 Section d048032c6ea0b6d697ddc2e86bda85a33adac920f1bf18e1b0c6d166a5cecdaf d3bfb518f44f3430f29d0c92af503865a1ed3281dc69b35dd868ba85f886c4ab [RFC6234] 4.1][(edwards25519)]
3.1]
[SECG-SEC1,
Section [SECG-SEC1, SHA-256 [SECG-SEC2, Section
2 P-256 2.3.3] 32 Section 02886e2f97ace46e55ba9dd7242579f2993b64e16ef3dcab95afd497333d8fa12f 03d8bbd6c639c62937b04d997f38c3770719c629d7014d49a24b4f98baa1292b49 [RFC6234] 2.4.2]
[(compressed 2.3.8]
format)]
[SECG-SEC1,
Section [SECG-SEC1, SHA-384 [SECG-SEC2, Section
3 P-384 2.3.3] 48 Section 030ff0895ae5ebf6187080a82d82b42e2765e3b2f8749c7e05eba366434b363d3dc36f15314739074d2eb8613fceec2853 02c72cf2e390853a1c1c4ad816a62fd15824f56078918f43f922ca21518f9c543bb252c5490214cf9aa3f0baab4b665c10 [RFC6234] 2.5.1]
[(compressed 2.3.8]
format)]
[SECG-SEC1,
Section [SECG-SEC1, SHA-512 [SECG-SEC2, Section
4 P-521 2.3.3] 48 Section 02003f06f38131b2ba2600791e82488e8d20ab889af753a41806c5db18d37d85608cfae06b82e4a72cd744c719193562a653ea1f119eef9356907edc9b56979962d7aa 0200c7924b9ec017f3094562894336a53c50167ba8c5963876880542bc669e494b2532d76c5b53dfb349fdf69154b9e0048c58a42e8ed04cef052a3bc349d95575cd25 [RFC6234] 2.6.1]
[(compressed 2.3.8]
format)]
Contact Information
ID Name Contact URI Last Updated
[Pavel_B?ezina] Pavel B?ezina mailto:pbrezina&redhat.com 2023-03-29
Licensing Terms
Presently we were in a very dark road, and at a point where it dropped suddenly between steep sides we halted in black shadow. A gleam of pale sand, a whisper of deep flowing waters, and a farther glimmer of more sands beyond them challenged our advance. We had come to a "grapevine ferry." The scow was on the other side, the water too shoal for the horses to swim, and the bottom, most likely, quicksand. Out of the blackness of the opposite shore came a soft, high-pitched, quavering, long-drawn, smothered moan of woe, the call of that snivelling little sinner the screech-owl. Ferry murmured to me to answer it and I sent the same faint horror-stricken tremolo back. Again it came to us, from not farther than one might toss his cap, and I followed Ferry down to the water's edge. The grapevine guy swayed at our side, we heard the scow slide from the sands, and in a few moments, moved by two videttes, it touched our shore. Soon we were across, the two videttes riding with us, and beyond a sharp rise, in an old opening made by the swoop of a hurricane, we entered the silent unlighted bivouac of Ferry's scouts. Ferry got down and sat on the earth talking with Quinn, while the sergeants quietly roused the sleepers to horse. Plotinus is driven by this perplexity to reconsider the whole theory of Matter.477 He takes Aristotle¡¯s doctrine as the groundwork of his investigation. According to this, all existence is divided into Matter and Form. What we know of things¡ªin other words, the sum of their differential characteristics¡ªis their Form. Take away this, and the unknowable residuum is their Matter. Again, Matter is the vague indeterminate something out of which particular Forms are developed. The two are related as Possibility to Actuality, as the more generic to the more specific substance through every grade of classification and composition. Thus there are two Matters, the one sensible and the other intelligible. The former constitutes the common substratum of bodies, the other the common element of ideas.478 The general distinction between Matter and Form was originally suggested to Aristotle by Plato¡¯s remarks on the same subject; but he differs325 from his master in two important particulars. Plato, in his Timaeus, seems to identify Matter with space.479 So far, it is a much more positive conception than the ?λη of the Metaphysics. On the other hand, he constantly opposes it to reality as something non-existent; and he at least implies that it is opposed to absolute good as a principle of absolute evil.480 Thus while the Aristotelian world is formed by the development of Power into Actuality, the Platonic world is composed by the union of Being and not-Being, of the Same and the Different, of the One and the Many, of the Limit and the Unlimited, of Good and Evil, in varying proportions with each other. The Lawton woman had heard of an officer's family at Grant, which was in need of a cook, and had gone there. [See larger version] On the 8th of July an extraordinary Privy Council was summoned. All the members, of whatever party, were desired to attend, and many were the speculations as to the object of their meeting. The general notion was that it involved the continuing or the ending of the war. It turned out to be for the announcement of the king's intended marriage. The lady selected was Charlotte, the second sister of the Duke of Mecklenburg-Strelitz. Apart from the narrowness of her education, the young princess had a considerable amount of amiability, good sense, and domestic taste. These she shared with her intended husband, and whilst they made the royal couple always retiring, at the same time they caused them to give, during their lives, a moral air to their court. On the 8th of September Charlotte arrived at St. James's, and that afternoon the marriage took place, the ceremony being performed by the Archbishop of Canterbury. On the 22nd the coronation took place with the greatest splendour. Mother and girls were inconsolable, for each had something that they were sure "Si would like," and would "do him good," but they knew Josiah Klegg, Sr., well enough to understand what was the condition when he had once made up his mind. CHAPTER V. THE YOUNG RECRUITS Si proceeded to deftly construct a litter out of the two guns, with some sticks that he cut with a knife, and bound with pawpaw strips. His voice had sunk very low, almost to sweetness. A soft flurry of pink went over her face, and her eyelids drooped. Then suddenly she braced herself, pulled herself taut, grew combative again, though her voice shook. HoME²Ô¾®Ïè̫ʲôÐÇ×ù
ENTER NUMBET 0016hohsyu.com.cn
www.fgchain.com.cn
lcchain.com.cn
www.t9179.com.cn
www.qn0538.org.cn
www.opnyen.com.cn
qnchain.com.cn
www.qgchain.com.cn
rzchain.com.cn
www.xfchain.com.cn