[19221] in Kerberos
Re: Apps aquiring tickets
daemon@ATHENA.MIT.EDU (Sam Hartman)
Fri May 9 11:16:00 2003
To: jaltman@columbia.edu (Jeffrey Altman)
From: Sam Hartman <hartmans@MIT.EDU>
Date: Fri, 09 May 2003 11:14:32 -0400
In-Reply-To: <b9en0o$l0$1@watsol.cc.columbia.edu> (Jeffrey Altman's message
of "8 May 2003 18:51:04 -0400")
Message-ID: <tsladdwtanb.fsf@konishi-polis.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
cc: kerberos@mit.edu
Errors-To: kerberos-bounces@mit.edu
>>>>> "Jeffrey" == Jeffrey Altman <jaltman@columbia.edu> writes:
Jeffrey> In order for Windows to perform NTLM based
Jeffrey> authentication, it must maintain the long-term secret in
Jeffrey> memory. This secret is used to obtain fresh TGTs prior
Jeffrey> to their expiration when the system is awake; or upon
Jeffrey> awaking from suspension or hibernation.
Then why does it bother getting renewable tickets?
Jeffrey> - Jeff
Jeffrey> -- Jeffrey Altman * Volunteer Developer Kermit 95 2.1 GUI
Jeffrey> available now!!! The Kermit Project @ Columbia
Jeffrey> University SSH, Secure Telnet, Secure FTP, HTTP
Jeffrey> http://www.kermit-project.org/ Secured with MIT Kerberos,
Jeffrey> SRP, and kermit-support@columbia.edu OpenSSL.
Jeffrey> ________________________________________________ Kerberos
Jeffrey> mailing list Kerberos@mit.edu
Jeffrey> https://mailman.mit.edu/mailman/listinfo/kerberos
________________________________________________
Kerberos mailing list Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos