I would like to understand Kerberos authentication at a fundamental level, and most of my research is turning up examples that are way too complicated or way too simple...
Do you know of (or could jot down) a basic, packet-level breakdown of the authentication process? By that, I mean, what the conversation looks like between client and server in relation to time and direction of traffic Kinda like the old syn ---> <------- ack syn ack ---> I think if I could find that basic foundation (in my language as a network person) perhaps that would help me with my studies (our mgmt wants us all Security+...) > Adam Yavner, CCNP, MCSE, NNCSS > Global Lab Manager: North America > > McAfee Network Security > > 972.987.2185 | Direct 469.853.6721 | cell > [EMAIL PROTECTED] | E-mail > www.mcafeesecurity.com | Web > > ________________________________________________ Kerberos mailing list [EMAIL PROTECTED] https://mailman.mit.edu/mailman/listinfo/kerberos