A generic kerberizing project

Sam Hartman hartmans at MIT.EDU
Mon May 14 19:39:10 EDT 2007


>>>>> "Pete" == Pete Martin <kerberos at pnmartin.fsnet.co.uk> writes:

    Pete> Sam, Apologies for sending to the wrong list - and thanks
    Pete> for the useful pointers.

    Pete> To answer your points, I'm not planning to use Kerberos
    Pete> solely to secure network traffic (authentication
    Pete> also). Since both end-points share a secret session key
    Pete> after the Kerberos exchange, the key is optionally used for
    Pete> symmetric AES traffic encryption.

securing network traffic implies authentication.


    Pete> Depending on the network service concerned, there may well
    Pete> be a weaker application-level authentication protocol; the
    Pete> solution proposed would not eliminate this, but wrap it with
    Pete> an additional stronger, required authentication protocol.

This is a significant problem.  We have lots of evidence that such
designs--where you have two authentication layers, but where they are
not bound--tend to create significant security problems in practice.




More information about the Kerberos mailing list