See also "Network Security: Private Communication in a Public World"
(2nd ed), by Charlie Kaufman, Radia Perlman, and Mike Speciner.
Chapters 13 and 14 cover Kerberos versions 4 and 5 in around 60 pages
or so.  Naturally, they don't go into all the details of the protocol
and the ways in which it can be used in that much space, but looking
it over briefly (I only just got around to getting my copy now) I'd
say it looks like they cover it rather well.

Ken
________________________________________________
Kerberos mailing list           [EMAIL PROTECTED]
http://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to