> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
> Sent: Friday, 14 July 2000 12:51 PM
> To: Frank Knobbe; 'David Lang'; Frank Knobbe
> Cc: [EMAIL PROTECTED]
> Subject: RE: Citrx Metaframe/NT4-TSE
> 
> 
> Whoa,
> 
> This is way overkill.  The solution provided earlier was a 
> very simple and 
> elegant solution using existing and proven technology that is freely 
> available and does not require more than a couple of weeks of 
> interoperability testing.

[ranting snipped]

Hang on a second...if I understand your earlier solution, you were basically
saying this:

Put an external box in the DMZ, then run Kerberos to do session/host level
auth to an internal box with hardening and logging where appropriate.

Seems to me that you're solving a different problem to the two-factor auth
proponents. Kerberos is only a fancy way of authenticating users and
endpoints at the same time - it doesn't add any actual strength to your
authentication mechanism.

In essence, all I'm asserting is that your solution can be no stronger than
user passwords. (Not that I don't like it). The two-factor people get better
auth - this doesn't mean that they couldn't do everything else you suggested
_as well_ to add DMZ host level auth as well as user auth.

Cheers,


--
Ben Nagy
Network Consultant, Volante IT
PGP Key ID: 0x1A86E304  Mobile: +61 414 411 520  
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to