home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!olivea!spool.mu.edu!agate!stanford.edu!ulysses.att.com!smb
- From: smb@ulysses.att.com
- Newsgroups: comp.protocols.kerberos
- Subject: Re: Local password validation (was: kerberizing xlock)
- Message-ID: <9211050809.AA26271@Athena.MIT.EDU>
- Date: 5 Nov 92 08:08:49 GMT
- Sender: news@shelby.stanford.edu (USENET News System)
- Organization: Internet-USENET Gateway at Stanford University
- Lines: 14
-
-
- OK, now I see what your getting at, and I agree that it is
- theoretically possible to accomlish this. I think that V could be
- designed and located on the network in such a way as to make this
- attact extremely difficult, if not impossible
-
- Anyone who thinks that active spoofing of a server is impossible or
- even prohibitively difficult should read ``A Unix Network Protocol
- Security Study: Network Information Service'', by Hess, Safford, and
- Pooch, in the October '92 (vol 22, no 5) issue of Computer
- Communications Review.
-
-
- --Steve Bellovin
-