Groups | Search | Server Info | Login | Register
Groups > comp.protocols.kerberos > #5246
| From | "Christopher D. Clausen" <cclausen@acm.org> |
|---|---|
| Newsgroups | comp.protocols.kerberos |
| Subject | Re: Protocol benchmarking / auditing inquiry |
| Date | 2024-02-14 13:09 -0600 |
| Organization | TNet Consulting |
| Message-ID | <mailman.18.1707937782.2322.kerberos@mit.edu> (permalink) |
| References | <YT1PR01MB4187CA8C93DE6AC8560FB1BCFA4E2@YT1PR01MB4187.CANPRD01.PROD.OUTLOOK.COM> <YT1PR01MB418752C508C40187D7D88BC8FA4E2@YT1PR01MB4187.CANPRD01.PROD.OUTLOOK.COM> <ba168ba8-161d-47c1-82e2-edf4cba957c7@acm.org> |
I have used this as a guide, but I think MIT Kerberos version 1.10 is the latest available: https://www.cisecurity.org/benchmark/mit_kerberos Not sure if this is what you are looking for or not. <<CDC On 2/14/2024 11:46 AM, Brent Kimberley via Kerberos wrote: > Preferably something smaller and more focused than nmap or OpenSCAP. 😉 > > From: Brent Kimberley > Sent: Wednesday, February 14, 2024 12:44 PM > To: kerberos@mit.edu > Subject: Protocol benchmarking / auditing inquiry > > Hi. > Can anyone point me to some methods to benchmark and/or audit Kerberos v5? > > For example, SSH: > Manual > Read the RFCs and specs. > Semi-automatic. > jtesta/ssh-audit: SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc) (github.com)<https://github.com/jtesta/ssh-audit/> > Automatic > SSH Configuration Auditor (ssh-audit.com)<https://www.ssh-audit.com/> > > > TLS example upon request.
Back to comp.protocols.kerberos | Previous | Next | Find similar
Re: Protocol benchmarking / auditing inquiry "Christopher D. Clausen" <cclausen@acm.org> - 2024-02-14 13:09 -0600
csiph-web