[7] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

[Lei_Tang@gs59.sp.cs.cmu.edu: Re: Kerberos authentication for X-Mosaic 2.4 and NCSA HTTPD]

daemon@ATHENA.MIT.EDU (yandros@MIT.EDU)
Fri Aug 12 14:44:17 1994

From: yandros@MIT.EDU
Date: Fri, 12 Aug 1994 14:44:13 +0500
To: www-security.discuss@charon.LOCAL

  
  From: Lei_Tang@gs59.sp.cs.cmu.edu
  To: Doug Rosenthal <rosenthl@mcc.com>
  Cc: www-security@ns1.rutgers.edu
  Subject: Re: Kerberos authentication for X-Mosaic 2.4 and NCSA HTTPD 
  In-Reply-To: Your message of "Fri, 12 Aug 94 10:21:19 CDT."
               <9408121521.AA17462@krypton.mcc.com> 
  Date: Fri, 12 Aug 94 11:55:59 -0400
  
  >>Also, "(it is impossible to assign a public key to every user on the
  >>internet practically)"; I think having an on-line certificate service
  >>will help here.
  
  If the server and the client are in the same realm(kerberos name), 
  it is OK since the TGS knows the secret key of the server. But if the 
  client and the server are not in the same realm(that is the most often
  case in Internet), the server must share some secret with TGS to 
  gurantee privacy and integrity. 
  
  Personally, I do not think the on-line service is good because the 
  on-line certifcate server is a bottleneck and hence affect the scalability of
  the system since the system is indended for Internet community.
  Also on-line certificate increasing the cost of charging. 
  (for example, credit card company uses on-line certificate server.
  guess what is the cost for using VISA card: $3/per transaction, this number
  was from some guy working for VISA, while the cost for check transaction
  is 50-60 cents /per transaction.) But the main problem is scalability.
  Also you have to think about fault tolerance, what happens if the 
  on-line service crash? ......
  --ltang

home help back first fref pref prev next nref lref last post