goldkamp@rex.cs.tulane.edu (Richard Goldkamp) (04/12/91)
Hello again. Many thanks to John Carr at MIT who provided the AIX patches for Kerberos which I requested the other day! :-) I am trying to do some analysis of Kerberos' performance for a Distrubuted Systems class project, so I have a few more questions. - Does anyone know of any studies of Kerberos which have been published in any of the technical journals (or anywhere else ) ? Specifically, I am interested in issues relating to the performance of Kerberos -- overhead incurred, resource usage, network traffic, any analysis on penetrability, documented deficiencies, profiles of usage patterns, etc. - Can anyone point me in the direction of software capable of listening to network traffic and intercepting packets as they come across the network ? Thanks in advance for any and all help ! :-) - Rich Goldkamp
cjr@UUNET.UU.NET (Chris Riddick) (04/15/91)
There is a recent paper by Bellovin and Merritt published at the Winter '91 USENIX conference in Dallas. It is titled "Limitations of the Kerberos Authentication System" and covers many of the issues you are interested in. Chris Riddick UUNET: uunet!nss1!cjr Internet: nss1!cjr@UUNET.UU.NET USSnail: Simpact Associates, Inc. 12007 Sunrise Valley Drive Reston, Virginia 22091 Phone: 703-758-0190 x2156 FAX: 703-758-0941