[5641] in Kerberos

home help back first fref pref prev next nref lref last post

Re: SSL as Kerb replacement?

daemon@ATHENA.MIT.EDU (W. Donald Rolph III)
Wed Aug 9 13:47:07 1995

Date: Wed, 09 Aug 1995 13:27:32 -0400
To: orion@iastate.edu (Phi H Truong), kerberos@MIT.EDU
From: "W. Donald Rolph III" <w-rolph@ds.mc.ti.com>

At 02:56 PM 8/9/95 GMT, Phi H Truong wrote:
>In article <199508090323.UAA17585@ihtfp.org>,
>Derek Atkins <warlord@ihtfp.org> wrote:
>>The problem with using SSL is that there is no authentication.  Yes,
>>you can easily encrypt the connection, but you still do not get any
>>kind of user<->server authentication.  There is no way for the server
>>to know who you are, save for you typing your password, which defeats
>>the idea of single signon.
>>
>>Kerberos gives you a means to signon once, obtain kerberos tickets,
>>and then log into as many hosts as you want without requiring you to
>>re-authenticate.  SSL does not, and can not, provide this
>>functionality.
>>
>>SSL has its uses, but so does Kerberos.
>>
>
>According to the authors of SSLeay, there will be kerberos authentication
>incoporate into SSL in the future.
>
>

Which means that SSL is not a replacement for Kerberos.

There are no easy fixes here, and no one is going to hand us a candy which
solves our distributed security problem.  If we want distributed vendor
neutral security, we have to work for it.  We are in the middle of early
Kerberos/Athena in M&C and the planning and checking we are going through to
make sure we dont bruise our shines is the worst I have ever gone through on
a system integration project.

Regards.
 
Don Rolph w-rolph@ds.mc.ti.com WD3 MS10-13 (508)-236-1263


home help back first fref pref prev next nref lref last post