Kerberized Apps

Sam Hartman hartmans at MIT.EDU
Wed Mar 31 15:22:48 EST 2004


>>>>> "Erik" == Erik Arneson <erik at aarg.net> writes:

    Erik> On 30-Mar-2004, Ken Hornstein <kenh at cmf.nrl.navy.mil> wrote:
    >> How about putting the master outside of the firewall, instead
    >> of the slave?  I suspect you'll say you're worried about the
    >> security of doing that, but you shouldn't; it's just as bad if
    >> someone breaks into your slave KDC if they break into your
    >> master (from a Kerberos perspective, that is).

    Erik> Hmmm, that's true, I suppose.  I will take a look at that
    Erik> option.  Thanks for the suggestion!

The only problem I can see having the master outside the firewall is
that if you have a compromise, it will be harder for you to determine
if any changes were made.

However if you have a compromise, you want to be changing veerything
shortly there after, so you probably don't care.



More information about the Kerberos mailing list