[24096] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Offline password attacks on AS-REQ

daemon@ATHENA.MIT.EDU (brian.joh@comcast.net)
Thu Jun 16 11:27:51 2005

From: brian.joh@comcast.net
Date: 16 Jun 2005 08:23:23 -0700
Message-ID: <1118935403.348879.15430@g14g2000cwa.googlegroups.com>
To: kerberos@mit.edu
Errors-To: kerberos-bounces@mit.edu

Tunneling sounds like the best option.

We have over 500 Windows 2000 and Windows 2003 domain
controllers (KDCs in Active Directory), that we don't want to have
to modify or install new software on.  These domain controllers
(KDCs) do have SSL properly configured, so I suppose, we could
tunnel the AS-REQ and AS-REP inside of SSL.  I'll try this unless
anyone knows of a better way, keeping in mind no major changes
can be made to these Domain Controllers.

Thanks!

________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post