Electronics Home»Top Flaws in Distributed Authentication Systems and how they are Attacked, High Tech, Page 31

Top Flaws in Distributed Authentication Systems and how they are Attacked, High Tech, Page 31

Top Flaws in Distributed Authentication Systems and how they are Attacked

Share  Email
  Page: 31
See entire paper: http://electronics.wesrch.com/pdfEL11TZ3XNMONP
Page URL: http://electronics.wesrch.com/31-pdfEL11TZ3XNMONP
Note : Best viewed in FF3 or above, IE7 or above
Page(s): 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64
 
Page content:

Beware of this flaw when federating

 Internet systems that postdate and don't
depend on PKIX seem to be mostly robust
against this issue.

 Intranet and corporate “federation” systems
often are not.

 E.g. SID history bug in MS Cross-Realm Kerberos



Insert presenter logo
here on slide master.
See hidden slide 2 for
directions