On Nov 3, 2014, at 4:28 AM, Jérémie Courrèges-Anglas <[email protected]> wrote:

> Philip Guenther <[email protected]> writes:
>
>> [apologies for the contentless previous message]
>>
>> On Sun, Nov 2, 2014 at 4:43 PM, Philip Guenther <[email protected]>
wrote:
>>> On Sun, Nov 2, 2014 at 4:41 PM, Nex6|Bill <[email protected]> wrote:
>>> ...
>>>> what about kerberos? (windows K5 vs Unix K5?)
>>
>> There's a bunch of *really good* papers on Kerberos's design which
>> discuss exactly these sorts of issues and how they are addressed or
>> completely avoided.  I remember finding the one cast as a dialog
>> between two system programmers (one named Athena...) as a good intro
>> on this stuff.
>
> Yup.  First "tutorial" link on this page:
>
>  http://web.mit.edu/kerberos/papers.html
>
> --
> jca | PGP : 0x1524E7EE / 5135 92C1 AD36 5293 2BDF  DDCC 0DFA 74AE 1524 E7EE


Here is a pretty good blackhat talk about this:  though its windows specific
the gist of it is Kerberos is just as
broken as NTLM.  since enforcement is client side….


-Nex6

[demime 1.01d removed an attachment of type application/pgp-signature which had 
a name of signature.asc]

Reply via email to