[36630] in Kerberos

home help back first fref pref prev next nref lref last post

Re: PPTP / L2TP with Kerberos -- what specs does it follow?

daemon@ATHENA.MIT.EDU (Benjamin Kaduk)
Sat Nov 29 15:48:52 2014

Date: Sat, 29 Nov 2014 15:48:43 -0500 (EST)
From: Benjamin Kaduk <kaduk@mit.edu>
To: Frank Cusack <frank@linetwo.net>
In-Reply-To: <CAAyYNQjfsKNxCDp-TFdHAwJsL4MKKE5YUR_C8N0z_w386tofjA@mail.gmail.com>
Message-ID: <alpine.GSO.1.10.1411291546030.23489@multics.mit.edu>
MIME-Version: 1.0
Cc: Hugh Cole-Baker <sigmaris@gmail.com>,
        "kerberos@mit.edu" <kerberos@mit.edu>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu

Sorry to focus in on just a single offhand remark, but ...

On Fri, 28 Nov 2014, Frank Cusack wrote:

> implemented/supported/documented.  It would require the KDC to be out in
> the open (to get the ticket used for the VPN auth) and most folks aren't
> going to do that.

... can you say more about *why* most folks aren't going to do that?

We have our KDC open to the public here at MIT, and the Kerberos protocol
is explicitly designed to be usable over public (untrusted) networks.

Now, if users are using weak passwords, this can cause problems, but there
are technologies to work around those as well, such as FAST tunnels or an
https proxy, or even passwordless authentication such as via PKINIT.

We would really like to understand better (and hopefully counter) this
idea that KDCs should not be exposed to the public internet.

Thanks,

Ben
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post