Jeffrey Altman <[EMAIL PROTECTED]> writes:

[...]
> usernames and passwords across the network to a potentially
> compromised machine in order for them to be validated against the
> copies stored in LDAP.
[...]

And what prevents a Kerberos server from being compromised? Any
system can have a root-kit installed on it.

-- 
David Magda <dmagda at ee.ryerson.ca>, http://www.magda.ca/
Because the innovator has for enemies all those who have done well under
the old conditions, and lukewarm defenders in those who may do well 
under the new. -- Niccolo Machiavelli, _The Prince_, Chapter VI
________________________________________________
Kerberos mailing list           [EMAIL PROTECTED]
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to