[19217] in Kerberos
Re: Apps aquiring tickets
daemon@ATHENA.MIT.EDU (Jeffrey Altman)
Thu May 8 19:05:41 2003
From: jaltman@columbia.edu (Jeffrey Altman)
Date: 8 May 2003 18:51:04 -0400
Message-ID: <b9en0o$l0$1@watsol.cc.columbia.edu>
To: kerberos@MIT.EDU
Errors-To: kerberos-bounces@mit.edu
In article <1052394033.17867.10.camel@cox-pc.spinnakernet.com>,
Ben Cox <cox@spinnakernet.com> wrote:
: Unfortunately, I think that Windows actually stores your long-term
: secret in the volatile info associated with your login session, and it
: may just use that when it needs to get new tickets on your behalf. But
: I'm really just half-remembering at this point.
:
: -- Ben
In order for Windows to perform NTLM based authentication, it must maintain
the long-term secret in memory. This secret is used to obtain fresh TGTs
prior to their expiration when the system is awake; or upon awaking from
suspension or hibernation.
- Jeff
--
Jeffrey Altman * Volunteer Developer Kermit 95 2.1 GUI available now!!!
The Kermit Project @ Columbia University SSH, Secure Telnet, Secure FTP, HTTP
http://www.kermit-project.org/ Secured with MIT Kerberos, SRP, and
kermit-support@columbia.edu OpenSSL.
________________________________________________
Kerberos mailing list Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos