Books on kerberos
Frank Balluffi
frank.balluffi at db.com
Mon Sep 23 08:59:15 EDT 2002
Besides the Kerberos RFCs (e.g., 1510) and the documentation to the MIT implementation (http://web.mit.edu/kerberos/www/krb5-1.2/index.html#documentation), the following are worth reading:
1. http://web.mit.edu/kerberos/www/dialogue.html
2. Kerberos section in William Stallings' Cryptography and Network Security (which is based on 1.)
3. Sun GSS-API Programming Guide (http://docs.sun.com/?p=/doc/816-1331&a=load)
Frank
"Eric Lee
Steadle" To: "Leong Tim" <timleong20 at yahoo.com>, <kerberos at mit.edu>
<esteadle at spinnak cc:
ernet.com> Subject: RE: Books on kerberos
Sent by:
kerberos-admin at mi
t.edu
09/20/2002 05:04
PM
Please respond to
esteadle
Well, I read the same 150 piece of garbage you're probably referring to and I know what you mean.
The book that I learned the most about Kerberos from was "Windows 2000 Security" by Roberta Bragg (New Riders Publishing). While this book is Windows oriented, it does a very good job of explaining the basics of Kerberos. Chapter 5 is called "Kerberos in the Raw" and takes a OS independent look at the protocol. From the introduction of that chapter:
"Before you begin the study of MS's implementation of the Kerberos standard, and certainly before you compare their implementation to those from other vendors, it is important to study the standard itself, uncooked -- in the raw. "
And that's exactly what it does.
ERX
-----Original Message-----
From: kerberos-admin at mit.edu [mailto:kerberos-admin at mit.edu]On Behalf Of Leong Tim
Sent: Friday, September 20, 2002 3:00 PM
To: kerberos at mit.edu
Subject: Books on kerberos
What do you think is the best book I could get on kerberos? The only thing I could find is some 150 page piece of garbage. Any ideas?
-Tim
Do you Yahoo!?
New DSL Internet Access from SBC & Yahoo!
--
This e-mail may contain confidential and/or privileged information. If you are not the intended recipient (or have received this e-mail in error) please notify the sender immediately and destroy this e-mail. Any unauthorized copying, disclosure or distribution of the material in this e-mail is strictly forbidden.
More information about the Kerberos
mailing list