[19221] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Apps aquiring tickets

daemon@ATHENA.MIT.EDU (Sam Hartman)
Fri May 9 11:16:00 2003

To: jaltman@columbia.edu (Jeffrey Altman)
From: Sam Hartman <hartmans@MIT.EDU>
Date: Fri, 09 May 2003 11:14:32 -0400
In-Reply-To: <b9en0o$l0$1@watsol.cc.columbia.edu> (Jeffrey Altman's message
 of "8 May 2003 18:51:04 -0400")
Message-ID: <tsladdwtanb.fsf@konishi-polis.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
cc: kerberos@mit.edu
Errors-To: kerberos-bounces@mit.edu

>>>>> "Jeffrey" == Jeffrey Altman <jaltman@columbia.edu> writes:

    Jeffrey> In order for Windows to perform NTLM based
    Jeffrey> authentication, it must maintain the long-term secret in
    Jeffrey> memory.  This secret is used to obtain fresh TGTs prior
    Jeffrey> to their expiration when the system is awake; or upon
    Jeffrey> awaking from suspension or hibernation.

Then why does it bother getting renewable tickets?

    Jeffrey> - Jeff

    Jeffrey> -- Jeffrey Altman * Volunteer Developer Kermit 95 2.1 GUI
    Jeffrey> available now!!!  The Kermit Project @ Columbia
    Jeffrey> University SSH, Secure Telnet, Secure FTP, HTTP
    Jeffrey> http://www.kermit-project.org/ Secured with MIT Kerberos,
    Jeffrey> SRP, and kermit-support@columbia.edu OpenSSL.
    Jeffrey> ________________________________________________ Kerberos
    Jeffrey> mailing list Kerberos@mit.edu
    Jeffrey> https://mailman.mit.edu/mailman/listinfo/kerberos

________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post