LinuxSecurity.com: It was discovered that Kerberos did not correctly free memory in theGSSAPI and kdb libraries. If a remote attacker were able to manipulatean application using these libraries carefully, the service couldcrash, leading to a denial of service. (Only Ubuntu 6.06 LTS wasaffected.) (CVE-2007-5902, CVE-2007-5971, CVE-2007-5972) [More...]
LinuxSecurity.com: A vulnerability has been found and corrected in krb5:
Use-after-free vulnerability in kadmin/server/server_stubs.c in
kadmind in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote
authenticated users to cause a denial of service (daemon crash) via a
I've setup public key authentication for ssh'ing into my university machine. However, it only logs me in on the local machine and doesn't give me Kerberos credentials which I need for accessing my network folder.
At the moment I am investigating the possibility to use Kerberos as the primary authentication protocol for our cloud structure. We'll probably follow through with this idea and for the sake of HA the best option would be multiple virtual machines.