[35988] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Distributed Kerberos5? Fwd: NSA backdoor risks in Kerberos

daemon@ATHENA.MIT.EDU (Russ Allbery)
Wed Apr 2 16:35:45 2014

From: Russ Allbery <eagle@eyrie.org>
To: Wang Shouhua <shouhuaw@gmail.com>
In-Reply-To: <CANzOW++FGZiOq+-PswdW_GBv7nUV7mjzLRwdzr_QhX9T3+mEGg@mail.gmail.com>
	(Wang Shouhua's message of "Wed, 2 Apr 2014 21:52:29 +0200")
Date: Wed, 02 Apr 2014 13:35:28 -0700
Message-ID: <87eh1fxyen.fsf@windlord.stanford.edu>
MIME-Version: 1.0
Cc: kerberos@mit.edu
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu

Wang Shouhua <shouhuaw@gmail.com> writes:
> On 2 April 2014 20:45, Russ Allbery <eagle@eyrie.org> wrote:

>> With Kerberos, it's always worth being aware that it's a trusted
>> central authentication system.

> Isn't there a distributed version of Kerberos5 which avoids this
> problem?

Trusted third party is inherent in the Kerberos protocol, and indeed
inherent in Needham-Schroeder.  If it didn't use trusted third party, it
wouldn't be Kerberos, it would be something else.

-- 
Russ Allbery (eagle@eyrie.org)              <http://www.eyrie.org/~eagle/>
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post