2010
DOI: 10.17487/rfc5868
|View full text |Cite
|
Sign up to set email alerts
|

Problem Statement on the Cross-Realm Operation of Kerberos

Abstract: This document provides background information regarding large-scale Kerberos deployments in the industrial sector, with the aim of identifying issues in the current Kerberos cross-realm authentication model as defined in RFC 4120.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 1 publication
0
6
0
Order By: Relevance
“…Therefore, it would have been possible to provide identity federation to OpenStack following the standard Kerberos crossrealm model. However, the deployment of Kerberos cross-realm infrastructures has been scarce, due to some recognized issues [RFC5868]. Thus, the usage of Kerberos has been limited to controlling the access of local users registered in the service s domain Recently some alternatives, such as FedKERB [FEDKRB], PanaKERB [PANAKRB] and EduKERB [EDUKRB], have been proposed to obtain the benefits of Kerberos without deploying an alternative cross-realm infrastructure, by using a more common and widely used federation substrate: the AAA-based federation.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, it would have been possible to provide identity federation to OpenStack following the standard Kerberos crossrealm model. However, the deployment of Kerberos cross-realm infrastructures has been scarce, due to some recognized issues [RFC5868]. Thus, the usage of Kerberos has been limited to controlling the access of local users registered in the service s domain Recently some alternatives, such as FedKERB [FEDKRB], PanaKERB [PANAKRB] and EduKERB [EDUKRB], have been proposed to obtain the benefits of Kerberos without deploying an alternative cross-realm infrastructure, by using a more common and widely used federation substrate: the AAA-based federation.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, it would have been possible to provide identity federation to OpenStack following the standard Kerberos cross‐realm model. However, the deployment of Kerberos cross‐realm infrastructures has been scarce, due to some recognized issues . Thus, the usage of Kerberos has been limited to controlling the access of local users registered in the service's domain.…”
Section: Related Workmentioning
confidence: 99%
“…The applicability of Kerberos cross-realm operations in such domains present some issues. We previously outlined these issues with the IETF Kerberos working group [7]. This section provides an overview of the issues in Kerberos cross-realm operations that the XKDCP protocol aims to solve.…”
Section: Issues In Kerberos Cross-realm Operationsmentioning
confidence: 99%
“…The dependability issues of Kerberos lies in its crossrealm operations. The cross-realm authentication capabilities in Kerberos, which allow an administrative domain (called Kerberos realm) to authenticate entities that belong to other administrative domains, suffer from scalability and security issues as we stated in a previous work [7]. The objective of this paper is to outline the shortcomings of the Kerberos cross-realm authentication model and propose a new protocol that solves these issues.…”
Section: Introductionmentioning
confidence: 95%
“…It should be noted that the cross-realm authentication mode can become unreliable and may introduce delays if the number of intermediary KDCs increases. Currently, the Kerberos cross-realm authentication model is under investigation within the IETF [17] and there exist some proposals [18], [19] for using public key cryptography to enable dynamically establish direct trust relationships between Kerberos KDCs.…”
Section: Full Eap-kerberos Authentication In a Visited Access Networkmentioning
confidence: 99%