2 Key management questions:

1. It is my understanding that client secret keys must not be passed in the clear.  If 
someone ever gets hold of a clients secret key, what exactly can they do to compromise 
Kerberos?

2. I'll get to test this soon but until then, does anyone know what might happen in 
the following scenario:

ATM switch is a Kerberos client
ATM switch secret key needs to be updated
The "most practical" way to update the secret key on the ATM switch is to log onto it 
via Kerberized (w/ data encryption on) telnet (ssh not available) and perform the ATM 
switch "Get secret key" function which uses either FTP or HTTP (scp not available) 
(I'm hoping Kerberized FTP is available).

My question is, what happens to the established Kerberized telnet session when the ATM 
switch sectret key is updated?

Out of band management would be nice but it isnt very practical in this particular 
application.

Thanks for any input.

-bacolod



Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2 

Big $$$ to be made with the HushMail Affiliate Program: 
https://www.hushmail.com/about.php?subloc=affiliate&l=427
________________________________________________
Kerberos mailing list           [EMAIL PROTECTED]
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to