Jeffrey Altman <[EMAIL PROTECTED]> writes: [...] > usernames and passwords across the network to a potentially > compromised machine in order for them to be validated against the > copies stored in LDAP. [...]
And what prevents a Kerberos server from being compromised? Any system can have a root-kit installed on it. -- David Magda <dmagda at ee.ryerson.ca>, http://www.magda.ca/ Because the innovator has for enemies all those who have done well under the old conditions, and lukewarm defenders in those who may do well under the new. -- Niccolo Machiavelli, _The Prince_, Chapter VI ________________________________________________ Kerberos mailing list [EMAIL PROTECTED] https://mailman.mit.edu/mailman/listinfo/kerberos