Writing Secure SLP Enabled Applications

Introduction

Major changes were made to the OpenSLP 0.8.x codebase to add SLPv2 message authentication support for OpenSLP 0.9.0.   Until this time, there were no plans to ever implement SLPv2 security due to the ideas expressed in a internal Caldera document entitled "OpenSLP and SLPv2 Authentication".    The document  (full text available) mostly references and draws conclusions from discussion from the srvloc@srvloc.org mailing list.   The following is the concluding paragraphs of the document.
 
For those that are not willing to endure the tedium of reading the entire mailing list discussion,  the conclusion was eventually made (at least by the author) that though SLP authentication may be  appropriate in some specialized SLP deployments, it is probably not beneficial in normal network computer environments.    This conclusion is based on the following premises:
The existence of SLPv2 authentication in OpenSLP does not eliminate the need to provide secure end-to-end communication for service specific protocols   (read the full text of the paper if you don't know what I'm talking about here).  OpenSLP security does not do any good at all if the authentication, integrity, and/or privacy of service specific communication weak.
 

Who should read this document?

If you are a developer that writes SLP enabled software, you should read this document.  If you are a system or network administrator that is concerned with how to setup and maintain secure SLP installations, you should read the Security section of the OpenSLP Users guide.
 
 

*** PLEASE PATIENT UNTIL I GET SOME TIME TO WRITE THE REST OF THIS DOCUMENT ***