goldkamp@rex.cs.tulane.edu (Richard Goldkamp) (04/12/91)
Hello again. Many thanks to John Carr at MIT who provided the AIX patches
for Kerberos which I requested the other day! :-)
I am trying to do some analysis of Kerberos' performance for a Distrubuted
Systems class project, so I have a few more questions.
- Does anyone know of any studies of Kerberos which have been published
in any of the technical journals (or anywhere else ) ? Specifically,
I am interested in issues relating to the performance of Kerberos --
overhead incurred, resource usage, network traffic, any analysis on
penetrability, documented deficiencies, profiles of usage patterns, etc.
- Can anyone point me in the direction of software capable of listening
to network traffic and intercepting packets as they come across the
network ?
Thanks in advance for any and all help ! :-)
- Rich Goldkampcjr@UUNET.UU.NET (Chris Riddick) (04/15/91)
There is a recent paper by Bellovin and Merritt published at the Winter '91 USENIX conference in Dallas. It is titled "Limitations of the Kerberos Authentication System" and covers many of the issues you are interested in. Chris Riddick UUNET: uunet!nss1!cjr Internet: nss1!cjr@UUNET.UU.NET USSnail: Simpact Associates, Inc. 12007 Sunrise Valley Drive Reston, Virginia 22091 Phone: 703-758-0190 x2156 FAX: 703-758-0941