Re: Kerberos Encryption techniques

2002-01-10 Thread Marc Horowitz
[EMAIL PROTECTED] (hot ice) writes: >> From what I have digested so far about Kerberos - kerberos seems to >> use DES. any specific reason for choosing DES? IMHO - there are >> faster and m ore secure techniques out there - for instance >> Blowfish. In 1992, what would you have chosen? DES is

Kerberos Encryption techniques

2002-01-10 Thread hot ice
>From what I have digested so far about Kerberos - kerberos seems to use DES. any specific reason for choosing DES? IMHO - there are faster and m ore secure techniques out there - for instance Blowfish. Thanks for all responses.

Re: Authentication negotation has failed, which is required for encryption. Goodbye

2002-01-10 Thread matt glogowski
[EMAIL PROTECTED] (Julian Williams) wrote in message news:<[EMAIL PROTECTED]>... > This error message appears each time we try to access our AIX 4.3.3 > box by any method, including telnet -x. Its Kerberos 1.2.2, and its a > permanent and total failure: > > "Authentication negotation has failed,

Authentication Replay Cache

2002-01-10 Thread Sreedhar Gupta
hi, I am using MIT Kerberos 5 release 1.2 on AIX Box. I want to know more about what is Authentication Replay Cache for KDC and Applications and how it will be handled at KDC (like file/memory). Thanks in Advance. Sreedhar Gupta

Re: USER/username@REALM naming style

2002-01-10 Thread Jason Heiss
An ACL like: principal **@REALM does seem to prevent that principal from actions on host/* principals. The kadmind man page says: operation-target [Optional] may specify a partially or fully quali­ fied Kerberos version 5 principal name. Each com­

Report to Recipient(s)

2002-01-10 Thread NotesSrvC01
Incident Information:- Originator:"Jonathan Vidrine"<[EMAIL PROTECTED]> Recipients:[EMAIL PROTECTED] Subject: PC inventory 4-14-2000 WARNING: The file PC inventory 4-14-2000.xls.bat you received was infected with the W32/SirCam@MM virus. The file attachment was not successfully cleane

Report to Recipient(s)

2002-01-10 Thread NotesSrvC01
Incident Information:- Originator:"Jonathan Vidrine"<[EMAIL PROTECTED]> Recipients:[EMAIL PROTECTED] Subject: PC inventory 4-14-2000 WARNING: The file PC inventory 4-14-2000.xls.bat you received was infected with the W32/SirCam@MM virus. The file attachment was not successfully cleane

Report to Recipient(s)

2002-01-10 Thread NotesSrvC01
Incident Information:- Originator:"Jonathan Vidrine"<[EMAIL PROTECTED]> Recipients:[EMAIL PROTECTED] Subject: Linda 991117 WARNING: The file Linda 991117.doc.bat you received was infected with the W32/SirCam@MM virus. The file attachment was not successfully cleaned.

Report to Recipient(s)

2002-01-10 Thread NotesSrvC01
Incident Information:- Originator:"Jonathan Vidrine"<[EMAIL PROTECTED]> Recipients:[EMAIL PROTECTED] Subject: Linda 991117 WARNING: The file Linda 991117.doc.bat you received was infected with the W32/SirCam@MM virus. The file attachment was not successfully cleaned.

off topic

2002-01-10 Thread HuYan
Sorry for the off topic. I am studying the modeling and specifications of network security. Is there a good forum or other stuff for the title? Can anyone point me? It is appreciated for your help.     

Re: Kerberos implemenation

2002-01-10 Thread Sam Hartman
Hi. I'm trying to be helpful and answering your question. I speak for myself not for the MIT Kerberos team. > "hot" == hot ice <[EMAIL PROTECTED]> writes: hot> Hello everyone - This is a newbie question. I would like to hot> use the Kerberos algorithm but have my own implementat