[1290] in Kerberos

home help back first fref pref prev next nref lref last post

Integrity of MIT source

daemon@ATHENA.MIT.EDU (James R. Clifford)
Thu Mar 7 18:39:23 1991

Date: Thu, 7 Mar 91 15:50:55 MST
From: jrc@snow-white.Lanl.GOV (James R. Clifford)
To: kerberos@ATHENA.MIT.EDU

What measures have been taken to protect MIT's Kerberos software source?  We are investigating using Kerberos for our network authentication system.  For some clients and servers, building the code from the MIT source is the only available/timely alternative.  On the other hand, there are those who contend basing a large part of the campus security on software obtained from an electronic bulletin board is crazy.  "Bulletin boards are where you go to pick up viruses, Trojan horses, and other nasty social diseases", they say. 

What assurances are there that the software that we ftp remains unchanged from what the authors released?  That there are no "wizard" passwords?  No debugging back doors?  Are vendor releases of Kerberos likely to be any better?

Thanks,
Jim Clifford


home help back first fref pref prev next nref lref last post