[19217] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Apps aquiring tickets

daemon@ATHENA.MIT.EDU (Jeffrey Altman)
Thu May 8 19:05:41 2003

From: jaltman@columbia.edu (Jeffrey Altman)
Date: 8 May 2003 18:51:04 -0400
Message-ID: <b9en0o$l0$1@watsol.cc.columbia.edu>
To: kerberos@MIT.EDU
Errors-To: kerberos-bounces@mit.edu

In article <1052394033.17867.10.camel@cox-pc.spinnakernet.com>,
Ben Cox <cox@spinnakernet.com> wrote:
: Unfortunately, I think that Windows actually stores your long-term
: secret in the volatile info associated with your login session, and it
: may just use that when it needs to get new tickets on your behalf.  But
: I'm really just half-remembering at this point.
: 
: -- Ben

In order for Windows to perform NTLM based authentication, it must maintain
the long-term secret in memory.  This secret is used to obtain fresh TGTs
prior to their expiration when the system is awake; or upon awaking from
suspension or hibernation.

- Jeff

-- 
 Jeffrey Altman * Volunteer Developer      Kermit 95 2.1 GUI available now!!!
 The Kermit Project @ Columbia University  SSH, Secure Telnet, Secure FTP, HTTP
 http://www.kermit-project.org/            Secured with MIT Kerberos, SRP, and 
 kermit-support@columbia.edu               OpenSSL.
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post