Next: Copying Information, Previous: Criticism of Kerberos, Up: Top [Contents][Index]
This appendix specifies the non-standard protocol elements implemented by Shishi. By nature of being non-standard, everything described here is experimental. Comments and feedback is appreciated.
• STARTTLS protected KDC exchanges | How Shishi talks to KDC protected by TLS. | |
• Telnet encryption with AES-CCM | Integrity and privacy protected telnet. | |
• Kerberized rsh and rlogin | Description of KCMD protocol. | |
• Key as initialization vector | Some cryptography discussion. | |
• The Keytab Binary File Format | Format of keytab files. | |
• The Credential Cache Binary File Format | Format of ccache files. |