[426] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Misc Kerberos questions

daemon@TELECOM.MIT.EDU (Mike Kazar)
Tue Jul 5 21:37:05 1988

From: Mike Kazar <kazar+@ANDREW.CMU.EDU>
To: kerberos@ATHENA.MIT.EDU, MILLER%erlang.DEC@DECWRL.DEC.COM
In-Reply-To: <8807052151.AA17136@decwrl.dec.com>

The problem with short ticket lifetimes is that our researchers *do* find it
unreasonable to login (more than) once a day to keep their computation running.
 And they've told us so.  They like to start long batch jobs and walk away,
often for a weekend.  Most of them do things like setup cron jobs to
re-authenticate themselves periodically so that they can store their data back
to the file servers.

When they make some mistake in setting up these re-authentication jobs, they do
not blame themselves for their lost efforts, they blame us.  And to a certain
extent, they're right.  They have physically secure machines and are not really
concerned with a cryptographic attack on their tickets.  A ticket expiring in
O(72) hours is exactly the level of security they want.

While I realize that ticket lengths must be minimized to keep encryption costs
down, I think the expiration field was trimmed down just a bit too much in the
original design.  An extra byte encrypted in a 60 byte or so ticket shouldn't
really be noticible.

home help back first fref pref prev next nref lref last post