I would like to understand Kerberos authentication at a fundamental
level, and most of my research is turning up examples that are way too
complicated or way too simple... 

Do you know of (or could jot down) a basic, packet-level breakdown of
the authentication process?  

By that, I mean, what the conversation looks like between client and
server in relation to time and direction of traffic  

Kinda like the old 

syn --->
<------- ack
syn ack --->


I think if I could find that basic foundation (in my language as a
network person) perhaps that would help me with my studies (our mgmt
wants us all Security+...)

> Adam Yavner, CCNP, MCSE, NNCSS
> Global Lab Manager: North America
> 
> McAfee Network Security
> 
> 972.987.2185  |       Direct
        469.853.6721    |       cell
> [EMAIL PROTECTED]     |       E-mail
> www.mcafeesecurity.com        |       Web
> 
> 

________________________________________________
Kerberos mailing list           [EMAIL PROTECTED]
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to