revocation feature in Kerberos

Nordgren, Bryce L -FS bnordgren at fs.fed.us
Thu Jul 31 19:22:23 EDT 2014


Beware the asymmetry.

When considering schemes like this, please be on the lookout for new connectivity requirements. Consider an organization with a tightly guarded KDC on their intranet, to which all the employees authenticate. Outside their firewall is another KDC with "supplemental" external users and hosts. The normal connection pattern for employees would be to kinit inside the firewall, traverse a trust outside the firewall, and finally connect to the server.

The server outside the firewall cannot contact the KDC which manages the user principals.

Neither can the KDC which manages the public-facing, company managed network.

Revocation schemes must account for situations where parties other than the authenticated user cannot contact the user's home KDC.

Bryce






This electronic message contains information generated by the USDA solely for the intended recipients. Any unauthorized interception of this message or the use or disclosure of the information it contains may violate the law and subject the violator to civil or criminal penalties. If you believe you have received this message in error, please notify the sender and delete the email immediately.



More information about the Kerberos mailing list