[39345] in Kerberos
Re: Protocol benchmarking / auditing inquiry
daemon@ATHENA.MIT.EDU (Christopher D. Clausen)
Wed Feb 14 14:09:54 2024
Message-ID: <ba168ba8-161d-47c1-82e2-edf4cba957c7@acm.org>
Date: Wed, 14 Feb 2024 13:09:34 -0600
MIME-Version: 1.0
Content-Language: en-US
To: Brent Kimberley <Brent.Kimberley@Durham.ca>,
"kerberos@mit.edu" <kerberos@mit.edu>
From: "Christopher D. Clausen" <cclausen@acm.org>
In-Reply-To: <YT1PR01MB418752C508C40187D7D88BC8FA4E2@YT1PR01MB4187.CANPRD01.PROD.OUTLOOK.COM>
Content-Type: text/plain; charset="utf-8"; Format="flowed"
Errors-To: kerberos-bounces@mit.edu
Content-Transfer-Encoding: 8bit
I have used this as a guide, but I think MIT Kerberos version 1.10 is
the latest available:
https://www.cisecurity.org/benchmark/mit_kerberos
Not sure if this is what you are looking for or not.
<<CDC
On 2/14/2024 11:46 AM, Brent Kimberley via Kerberos wrote:
> Preferably something smaller and more focused than nmap or OpenSCAP. 😉
>
> From: Brent Kimberley
> Sent: Wednesday, February 14, 2024 12:44 PM
> To: kerberos@mit.edu
> Subject: Protocol benchmarking / auditing inquiry
>
> Hi.
> Can anyone point me to some methods to benchmark and/or audit Kerberos v5?
>
> For example, SSH:
> Manual
> Read the RFCs and specs.
> Semi-automatic.
> jtesta/ssh-audit: SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc) (github.com)<https://github.com/jtesta/ssh-audit/>
> Automatic
> SSH Configuration Auditor (ssh-audit.com)<https://www.ssh-audit.com/>
>
>
> TLS example upon request.
________________________________________________
Kerberos mailing list Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos