[OpenAFS] why kerberos only works in monolithic organizations
Russ Allbery
rra@stanford.edu
Fri, 30 Dec 2005 10:12:56 -0800
Ken Hornstein <kenh@cmf.nrl.navy.mil> writes:
> In theory you don't need to encrypt the CA certificate, but you should
> verify it's integrity somehow. This is one of the places where PKI
> tends to cheat; it works great in the usual case where web browsers have
> a standard list of CAs that they accept.
For values of great equal to "trusting a bunch of commercial CAs proven to
be willing to hand out signed certificates to random people with only a
minimum of identification." I definitely would not trust, say, Verisign
to do identity management properly. They're more interested in making
money.
> While I agree it removes the need to share a _secret_, they still need
> to have some sort of trust relationship that should in theory involve
> some out-of-band initialization. At the end of the day, I don't see
> this fundamentally easier than the initialization that Kerberos does.
Agreed.
--
Russ Allbery (rra@stanford.edu) <http://www.eyrie.org/~eagle/>