Groups | Search | Server Info | Login | Register


Groups > comp.protocols.kerberos > #5246

Re: Protocol benchmarking / auditing inquiry

From "Christopher D. Clausen" <cclausen@acm.org>
Newsgroups comp.protocols.kerberos
Subject Re: Protocol benchmarking / auditing inquiry
Date 2024-02-14 13:09 -0600
Organization TNet Consulting
Message-ID <mailman.18.1707937782.2322.kerberos@mit.edu> (permalink)
References <YT1PR01MB4187CA8C93DE6AC8560FB1BCFA4E2@YT1PR01MB4187.CANPRD01.PROD.OUTLOOK.COM> <YT1PR01MB418752C508C40187D7D88BC8FA4E2@YT1PR01MB4187.CANPRD01.PROD.OUTLOOK.COM> <ba168ba8-161d-47c1-82e2-edf4cba957c7@acm.org>

Show all headers | View raw


I have used this as a guide, but I think MIT Kerberos version 1.10 is 
the latest available:
https://www.cisecurity.org/benchmark/mit_kerberos

Not sure if this is what you are looking for or not.

<<CDC

On 2/14/2024 11:46 AM, Brent Kimberley via Kerberos wrote:
> Preferably something smaller and more focused than nmap or OpenSCAP. 😉
> 
> From: Brent Kimberley
> Sent: Wednesday, February 14, 2024 12:44 PM
> To: kerberos@mit.edu
> Subject: Protocol benchmarking / auditing inquiry
> 
> Hi.
> Can anyone point me to some methods to benchmark and/or audit Kerberos v5?
> 
> For example, SSH:
>                 Manual
>                                Read the RFCs and specs.
>                Semi-automatic.
>                                jtesta/ssh-audit: SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc) (github.com)<https://github.com/jtesta/ssh-audit/>
>                 Automatic
>                                SSH Configuration Auditor (ssh-audit.com)<https://www.ssh-audit.com/>
> 
> 
> TLS example upon request.

Back to comp.protocols.kerberos | Previous | Next | Find similar


Thread

Re: Protocol benchmarking / auditing inquiry "Christopher D. Clausen" <cclausen@acm.org> - 2024-02-14 13:09 -0600

csiph-web