I thought I sent this out yesterday but I guess I didn't.  Our TAM responded

Microsoft uses a proprietary version of Kerberos in Windows, and it is not
vulnerable to this exploit. Windows stores tickets and keys obtained from
the KDC in a credentials cache, an area of memory protected by the LSA. Only
processes running in the LSA's security context have access to the cache.
Its memory is never paged to disk. All tickets and keys are stored per user
logon session, which means that they are destroyed when a security principal
logs off or the system is turned off.

Todd Myrick

-----Original Message-----
From: Rick Kingslan [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, March 18, 2003 7:05 PM
To: [EMAIL PROTECTED]
Subject: RE: [ActiveDir] Kerberos Vulnerability


Given the high visibility of ANYTHING Microsoft, they have to review these
issues - even though there is likely no connection - other than name....

Rick Kingslan  MCSE, MCSA, MCT
Microsoft MVP - Active Directory
Associate Expert
Expert Zone - www.microsoft.com/windowsxp/expertzone
 
 
-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Myrick, Todd
(NIH/CIT)
Sent: Tuesday, March 18, 2003 2:56 PM
To: '[EMAIL PROTECTED]'

Understood,

I just saw this quote "Microsoft officials said that, while they're still
researching the issue, they don't believe that operating system is
vulnerable." and know that some MSFT people read this list, and maybe they
would be willing to enlighten the list when they have something more
concrete.  

Thanks,

Todd

-----Original Message-----
From: Roger Seielstad [mailto:[EMAIL PROTECTED]
Sent: Tuesday, March 18, 2003 3:17 PM
To: '[EMAIL PROTECTED]'
Subject: RE: [ActiveDir] Kerberos Vulnerability


AD won't be affected. The vulnerability was found in Kerberos v4, while AD
is built on Kerberos v5. Very different beast.

--------------------------------------------------------------
Roger D. Seielstad - MCSE
Sr. Systems Administrator
Inovis Inc.


> -----Original Message-----
> From: Myrick, Todd (NIH/CIT) [mailto:[EMAIL PROTECTED]
> Sent: Tuesday, March 18, 2003 3:12 PM
> To: '[EMAIL PROTECTED]'
> Subject: [ActiveDir] Kerberos Vulnerability
> 
> 
> http://www.eweek.com/article2/0,3959,937385,00.asp
> 
> Just saw this and wondered if anyone on the list has a comment about 
> it.  I sent a request to our MS TAM for comment on the article and 
> will post anything I get to the list.
> 
> Todd Myrick
> List info   : http://www.activedir.org/mail_list.htm
> List FAQ    : http://www.activedir.org/list_faq.htm
> List archive:
> http://www.mail-archive.com/activedir%> 40mail.activedir.org/
> 
List info   : http://www.activedir.org/mail_list.htm
List FAQ    : http://www.activedir.org/list_faq.htm
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/
List info   : http://www.activedir.org/mail_list.htm
List FAQ    : http://www.activedir.org/list_faq.htm
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/


List info   : http://www.activedir.org/mail_list.htm
List FAQ    : http://www.activedir.org/list_faq.htm
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/
List info   : http://www.activedir.org/mail_list.htm
List FAQ    : http://www.activedir.org/list_faq.htm
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/

Reply via email to