> From: Jonathan Billings [mailto:billi...@negate.org]
> 
> I suggest looking at how Kerberos works.  Maybe a better understanding
> might help improve your product?

If I hadn't already done that, I would have no business talking about any of 
this. The same information is available from every resource, this is just the 
first one I got on google just now:
http://web.mit.edu/kerberos/krb5-1.5/krb5-1.5.4/doc/krb5-install/What-is-Kerberos-and-How-Does-it-Work_003f.html

"client (generally either a user or a service) sends a request for a ticket to 
the Key Distribution Center (KDC). The KDC creates a ticket-granting ticket 
(TGT) for the client, encrypts it using the client's password as the key, and 
sends the encrypted TGT back to the client. The client then attempts to decrypt 
the TGT, using its password."

Notice that the KDC had the client's password to encrypt the TGT, and then the 
client decrypts using the password. After the client has received the TGT, it's 
able to authenticate to other servers with no *further* password exposure, but 
the password was exposed to the KDC.
_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to