MIT Launching Kerberos Consortium 62
alphadogg writes to tell us that next week MIT will be throwing a 20th birthday party for their Kerberos authentication system. In celebration of this milestone they will also be launching a new consortium dedicated to preserving and evolving this standard for years to come. "Kerberos, originally created for MIT's Project Athena, is used mainly by enterprises and MIT's goal is to see the IETF security standard develop into a universal system for single sign-on. [...] 'Kerberos has.... become successful beyond MIT's internal capacity to respond to the world's demands for development, testing and support. So we need a new organizational structure that can accommodate the demand.'"
Kerberos (Score:4, Insightful)
Re:Kerberos (Score:4, Funny)
Re: (Score:1)
US Export Laws and Kerberos (Score:2)
The US seems to be a lot more flexible now about not harassing code websites, and John Gilmore and the EFF beat them up by building a machi
And how wil MS influence this? (Score:3, Insightful)
Re:And how wil MS influence this? (Score:4, Informative)
With MS embedding thier version of Kerberos into their OS's it's fairly certain they will try to influence the direction of this in thier favor. Just something to watch out for.
Didn't we just cover this aspect of MS embedding crap in the EU ruling? They can do it in the US, perhaps Asia, but the EU will be telling them to OPEN UP. So if I wanted to use my own authentication system in the OS I should be able to, not Microsoft's.
Oranisational Restructuring: "No, you want Bodkin, he shuffles orange and white papers, I now shuffle green and baby blue papers. Yellow and tan papers are down the hall to the left, shuffled by Morris."
Re:And how wil MS influence this? (Score:4, Informative)
MIT: Whitewash much? (Score:4, Informative)
Truth be told, there was a big falling out between MS and MIT over Kerberos. Microsoft, as they are wont to do, tried to take Kerberos and proprietize it. The MIT guys said "not so fast," and took them to court over it. On the eve of what most assumed would be a judgment not in their favor, Microsoft suddenly had an 11th-hour change of heart and revealed their changes (although with poison-pill licensing terms attached, at least initially).
From an article [networkworld.com] published in 2000: "Joint proposal" my ass. Microsoft got dragged into that kicking and screaming. They would have buried Kerberos long ago if they had gotten their way.
As an eventual result of this, some of Microsoft's changes were written up as an (informational, non-standards-track) RFC [ietf.org], which takes pains to repeat, over and over, that Microsoft's implementation was compatible with the original. The monopolist doth protest too much, I think.
Re: (Score:2)
Re: (Score:2, Interesting)
(Actually my OS prof last semester was one of the developers on the W2K kerberos stuff.)
Party! (Score:4, Funny)
Re: (Score:2, Funny)
Someone has to ask it... (Score:5, Interesting)
Long ago, people were all upset when Microsoft did the ole embrace and extend thing with Kerberos. I haven't heard much about that for years. Has it been a problem for anyone? Will the Kerberos consortium take whatever Microsoft did into account so as not to break what other people have done to work with and around Microsoft?
Re:Someone has to ask it... (Score:5, Insightful)
MS and the MIT Kerberos crowd get along just fine. I believe the things MS did are generally thought of as good. Some are starting to make it into the Kerberos distros (e.g. I think Heimdal has support for constrained delegation). The PAC business was a little overblown. The Samba guys were able to figure out how to sign the PAC from the doc MS provided and with some carefull network analysis. Of course the Samba guys are not happy overall. I don't know if they have a problem with their Kerberos code but other modes of communication and the semantics to go with are not adequately documented.
Re: (Score:3, Interesting)
You mean the doc that came as a self-extracting archive that presented an EULA that looked suspiciously like an NDA? A license that was eventually dropped after much screaming from the rest of the computing world in the direction of Seattle?
MartRe: (Score:2)
No, I mean this:
http://msdn2.microsoft.com/en-us/library/aa302203.aspx [microsoft.com]
When it was first released they tried to claim no one could implement it. But that was knocked down to an un-naturally long copyright statement and a copyright statement only covers the
Re: (Score:2)
No, I am talking about the self-extracting CAB file mentioned in this [slashdot.org] discussion. The spec you link to may be the same document, but it is undeniable that Microsoft did try to publish it under an EULA that essentially forbade using any of that information to implement the PAC for yourself.
Mart
Re: (Score:2)
You seem to be in denial, like a woman who refuses to believe her husband is a mobster. It is time
Re: (Score:2)
After so much screaming, Microsoft backed down and made their changes available and open.
Used in national labs (Score:2)
Re: (Score:1)
I don't know much about kerberos, but I do know that it has always been used in the national lab where I worked the last few years (Sandia Natl Labs). So apparently the government trusts it (not sure if that counts for anything)...
Software they trust, it's people [wikipedia.org] ...
Re: (Score:2)
Re:Laughably outdated (Score:4, Informative)
FYI: Kerberos is the standard authentication protocol used on just about every enterprise network on the planet. All Windows clients that are members of an Active Directory domain use Kerberos to authenticate with fileservers, web services, LDAP servers and just about anything else that has domain credentials. That's probably 80% of Enterprise users alone. And the rest are probably using NFS which is rapidly moving to Kerberos authn' for everything.
NFS v4 uses Kerberos (Score:5, Informative)
http://developer.osdl.org/dev/nfsv4/site/architecture/ [osdl.org]
Re: NFS v4 uses Kerberos (Score:3, Informative)
Here is Linux's NFS v4 architecture. Other implementation's use kerberos too. Kerberos is one of the major improvements to NFS v4.
In all honesty, though, Kerberos isn't precisely new to NFSv4, it's just that support for it has been mandated by NFSv4. Kerberos authentication is supported at the RPC layer, which is the same regardless if being used for NFSv4, v3, v2 or even portmapper, NIS or SGI FAM, if you will. AFAIK, Linux's NFSv2/3 implementation supports Kerberos authentication as well, ever since the support was added to support NFSv4. I shan't bet on it, but I think Solaris has supported Kerberos authentication for earlier NFS
Re: (Score:2, Informative)
Re: (Score:2)
Re: (Score:2)
Better authentication mechanisms? Like what?
Re: (Score:2)
Kerberos was nice when it came out, but there are better authentication mechanisms available out there.
Only in the specific case where you're going across domains in some way, and then only because serious security people (quite reasonably) get antsy about trusting each other Kerberos domain controllers deeply. But within a domain, Kerberos works nicely. (IIRC, it can work in harmony with SSH; if that was the "better authentication mechanism" then shame on you!)
Mind you, I don't use the Kerberized stuff at work that much, mostly because I prefer to keep everything I need local on a laptop so I can continue
Re:Laughably outdated (Score:5, Informative)
Kerberos is used extensively within Microsoft enterprise scenarios and is used in other non-Microsoft environments as well.
Both Kerberos and PKI present management difficulties as you try to expand across large numbers of domains / forests with diverse security policies.
If quantum computing ever truly breaks classic PKI approaches, the alternatives will be to develop PKI approaches that are more resistant to quantum attacks (problems are known that are believed to be resistant) and/or to use NS / Kerberos with doubled key length (quantum search attacks roughly square root the effective key size).
Just not true (Score:2)
Kerberos's authentication isn't tied to a specific service and the same token can be used across a many daemons. In fact, SSH is one of the daemons supports Kerberos authentication (ie, is kerberized).
Kerberos can be a pain to setup, but once you take the time to understand how it works it's actually pre
Re: (Score:2)
Kerberos Rocks my world! (Score:4, Interesting)
Still, Kerberos rocks my world. I couldn't do without it.
Re: (Score:3, Funny)
Do math teachers learn that phrase in math teacher school, is it that people who say things like that grow up to be math teachers?
Re: (Score:1)
Do math teachers learn that phrase in math teacher school, is it that people who say things like that grow up to be math teachers?
QED
Re: (Score:2)
Re: (Score:2)
"The Kerberos Konsortium" would be even kooler.
Shouldn't that be... (Score:1)
Can someone answer this? (Score:2)
What does Kerberos+LDAP give you that LDAP on its own doesn't? My reading is that with kerberos-capable client software, once the user's entered their password once for one thing they don't have to for everything else - at least until their token expires - but ICBW.
Re: (Score:3, Insightful)
LDAP is just a directory protocol. Kerberos is a network-wide authentication protocol. I'm a little rusty on Kerberos myself, but I believe the following summary to be a reasonable description of what Kerberos does:
Kerberos is basically an infrastructure which applies cryptography to the problems of intra-domain and inter-domain authentication. It is based around the concept of "tickets", which are cryptographic tokens that can be presented to services in order to authenticate. Each ticket is applicable on
Re: (Score:2)
I am, but the difficulty I've been facing is getting an idiot's introduction to it. Most seem to assume you already know all about how it works.
The other thing I notice is that it alleviates the problem of passwords or hashes of passwords flying around the network in the clear. But I'd imagine that's a bit less of an issue if everything runs over SSL.
Re: (Score:1)
Re: (Score:2)
Kerberos is a bit rough to understand at first. The documentation exists out there (Microsoft has some of the better stuff), but it can be pretty detailed if you're not comforta
Re: (Score:2)
Re: (Score:2)
It would appear that klist.exe actually comes from the Windows Network Resource Kit rather than being in Windows itself. Sorry.
Re: (Score:1)
Security. LDAP by itself stores passwords in the user record in the directory. Kerberos abstracts the authentication mechanism out of the directory in a much more secure fashion. Passwords are never sent over the network.
Re: (Score:2)
Kerberos abstracts the authentication mechanism out of the directory in a much more secure fashion.
This is true in general, too. Rather than coming up with some convoluted auth scheme on your own, you can just standardize on Kerberos for your application and trust that other people who know a lot more about this than I ever will have gotten it right.
In one sense, it's a single point of failure. In other, it means that you only have to get it right one time and everything else can take advantage of it.
Athena ? (Score:2)
Project Athena (Score:2)
Athena involved setting up a network of workstations so that you could log onto any one of them and have access to your home directory, mail, etc. as if they were local to that machine.
This doesn't sound like a big deal until you find out that it started in 1983. Kerberos and X are children of Project Athena.
Wikipedia is your friend: Project Athena [wikipedia.org]
Re: (Score:2)
This is a simplification and Athena has grown up quite a bit in the two dozen or so yea
Re: (Score:2)
You can get tickets to the party.... (Score:1)
Kerberos needs some merging with LDAP (Score:2)
IMHO the future direction taken with Kerberos [wikipedia.org] should be merging the protocol into LDAP [wikipedia.org] (e.g. for the future LDAPv4 revision of LDAP protocol).
Here's my rationale behind this: The problem with Kerberos being a distinct protocol from LDAP is that the distinction causes lots of confusion among the implementors, system architects, developers and administrators. This results in lots of cases where the two protocols are misused.
The correct distinction should be that you use Kerberos for authentication (that
Re: (Score:1)