[2357] in Kerberos_V5_Development

home help back first fref pref prev next nref lref last post

Re: kerberos through the firewall

daemon@ATHENA.MIT.EDU (Mark Eichin)
Sat Apr 19 15:58:04 1997

To: Ken Raeburn <raeburn@cygnus.com>
Cc: krbdev@MIT.EDU
From: Mark Eichin <eichin@MIT.EDU>
Date: 19 Apr 1997 15:57:37 -0400
In-Reply-To: Ken Raeburn's message of 19 Apr 1997 15:20:42 -0400


> If they're going to do it, they're going to do it... it could be done
> with an abuse of other protocols as well (e.g., finger).  Anything

Right.  As a few of us have mentioned privately, this makes more sense
as a spec for "IP tunnelling over HTTP" -- don't both with the
kerberos-specific bits, if you do it right there aren't any.  You
might even do a java implementation, so that people inside the
firewall can just run it from their browsers, without needing to
understand the issues...

home help back first fref pref prev next nref lref last post