[7595] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Question about the security of forwarded TGTs

daemon@ATHENA.MIT.EDU (Sam Hartman)
Thu Jul 4 15:12:52 1996

To: kenh@cmf.nrl.navy.mil (Ken Hornstein)
Cc: kerberos@MIT.EDU
From: Sam Hartman <hartmans@MIT.EDU>
Date: 04 Jul 1996 14:59:51 -0400
In-Reply-To: kenh@cmf.nrl.navy.mil's message of 2 Jul 1996 18:54:51 -0400

>>>>> "Ken" == Ken Hornstein <kenh@cmf.nrl.navy.mil> writes:

    Ken> In article <tslhgrqed3c.fsf@tertius.mit.edu>, Sam Hartman


    Ken> Okay, I see.  So as long as I've authenticated to the server,
    Ken> then it will use the session key that it got for talking with
    Ken> that principal, right?  (Assuming that I use krb5_fwd_tgt(),
    Ken> which I am).


	Yes, this is sufficient so long as you pass in the
auth_context that you used with krb5_mk_req or krb5_sendauth when you
forward the credentials.  If you use an auth_context that isn't
correct, you should get a decrypt integrity error on the remote side.

home help back first fref pref prev next nref lref last post