I am very interested in the Kerberos authentication protocol, and was simply
wondering whether I needed special permission to post a quick overview of
the protocol on my site, and link to your official MIT page. Thanks a lot.
Kerberos mailing list
On Saturday, May 13, 2006 10:29:38 AM -0700 Vasken Houdoverdov
[EMAIL PROTECTED] wrote:
I am very interested in the Kerberos authentication protocol, and was
simply wondering whether I needed special permission to post a quick
overview of the protocol on my site, and link to your official
Gustavo == Gustavo Rios [EMAIL PROTECTED] writes:
Gustavo So it is not possible to combine n MAC vs. M ENC types in
Gustavo a upward compatible manner, right ?
Your question is not even well-formed for Kerberos. It's not generally
possible, for many reasons. Consider for example an
[EMAIL PROTECTED] (Sam Hartman) wrote in message news:[EMAIL PROTECTED]...
Kerberos does use a modular approach to encryption; the MIt
implementation of Kerberos supports des, 3des, rc4 and AES at current
writing.
There is also a modular approach for checksums that are used.
However, the
Kerberos does use a modular approach to encryption; the MIt
implementation of Kerberos supports des, 3des, rc4 and AES at current
writing.
There is also a modular approach for checksums that are used.
However, the technology that is used to integrity protect ciphertext
is tied to the encryption
approach allows for any MAC algorithm to be used,
like md4/md2/md5/sha1/rmd160, provide both parties agree on that.
Sorry, i have not read the documentation for these very simple
question.
Thanks a lot for your time and cooperation.
best regards.
PS: If possible, reply to me too