[comp.protocols.kerberos] Analysis of Kerberos -- Help needed

goldkamp@rex.cs.tulane.edu (Richard Goldkamp) (04/12/91)

Hello again.  Many thanks to John Carr at MIT who provided the AIX patches
for Kerberos which I requested the other day!  :-)

I am trying to do some analysis of Kerberos' performance for a Distrubuted
Systems class project, so I have a few more questions.

   - Does anyone know of any studies of Kerberos which have been published
     in any of the technical journals (or anywhere else ) ?  Specifically,
     I am interested in issues relating to the performance of Kerberos --
     overhead incurred, resource usage, network traffic, any analysis on
     penetrability, documented deficiencies, profiles of usage patterns, etc.

   - Can anyone point me in the direction of software capable of listening
     to network traffic and intercepting packets as they come across the
     network ?

Thanks in advance for any and all help !  :-)

- Rich Goldkamp

cjr@UUNET.UU.NET (Chris Riddick) (04/15/91)

There is a recent paper by Bellovin and Merritt published at the Winter '91
USENIX conference in Dallas.  It is titled "Limitations of the Kerberos
Authentication System" and covers many of the issues you are interested in.

Chris Riddick


UUNET:		uunet!nss1!cjr
Internet: 	nss1!cjr@UUNET.UU.NET
USSnail:  	Simpact Associates, Inc.
	  	12007 Sunrise Valley Drive
	  	Reston, Virginia  22091
Phone:	  	703-758-0190 x2156
FAX:	  	703-758-0941