[2357] in Kerberos_V5_Development
Re: kerberos through the firewall
daemon@ATHENA.MIT.EDU (Mark Eichin)
Sat Apr 19 15:58:04 1997
To: Ken Raeburn <raeburn@cygnus.com>
Cc: krbdev@MIT.EDU
From: Mark Eichin <eichin@MIT.EDU>
Date: 19 Apr 1997 15:57:37 -0400
In-Reply-To: Ken Raeburn's message of 19 Apr 1997 15:20:42 -0400
> If they're going to do it, they're going to do it... it could be done
> with an abuse of other protocols as well (e.g., finger). Anything
Right. As a few of us have mentioned privately, this makes more sense
as a spec for "IP tunnelling over HTTP" -- don't both with the
kerberos-specific bits, if you do it right there aren't any. You
might even do a java implementation, so that people inside the
firewall can just run it from their browsers, without needing to
understand the issues...