Protocol benchmarking / auditing inquiry

Ken Hornstein kenh at cmf.nrl.navy.mil
Thu Feb 15 12:38:36 EST 2024


>This approach is taught in first year engineering.

Geez dude, no need to drag me; I'll be the first one to admit that I'm old
and don't know everything!  Back in my day our curriculums didn't cover
any computer security topics at all.

But I stand by my original statements: I, personally, have not encountered
those terms before and I've feel it's fair to say I've done a large amount
of accreditation and audit work and some of it involves Kerberos.  And
even with your followup emails I'm still unclear what you are asking for.
Is this because I am old and don't know everything?  Certainly!  Maybe
it's like Zero Trust Security and I am already mostly doing it.  Maybe
it's something we have never been asked to do, so I've never done it
(because in the accreditation world you don't seem to get extra credit
for doing stuff that the accreditors do not ask for).

--Ken


More information about the Kerberos mailing list