Lo stesso Kerberos è generalmente sicuro da usare su Internet. Dopotutto, è stato progettato per essere sicuro su una delle reti pubbliche più ostili al mondo: la rete del campus del MIT.
Un whitepaper su Kerberos, "Perché Kerberos è una soluzione di sicurezza credibile?" risolve tutti i punti che hai sollevato . Per citare in parte:
A password that is never disclosed or sent over a network is much more difficult for an attacker to purloin. Consequently, Kerberos authentication of users does not require that passwords be presented to the authentication service. Instead, the Kerberos authentication service uses cryptographic protocols whereby the user can prove possession of a password without actually revealing it.
In a distributed environment, it would be awkward in the extreme to maintain shared secrets such as passwords on every client and server that needs to authenticate requests. Furthermore, distributing shared secrets across many systems increases potential vulnerabilities in direct proportion to the number of systems—a problem exacerbated by the “weakest link” phenomenon. Kerberos addresses this requirement by maintaining a centralized database that is distributed across only a few authentication servers. While overall security is critically dependent on protecting this central database, it is much easier to harden a few special-purpose servers against attacks than to protect many general-purpose systems. The central control over authentication secrets also makes it easier to issue new credentials, revoke existing ones, and recover from compromised credentials.
The Kerberos developers assumed that anyone could eavesdrop on network traffic, could claim to be any user, and could set up rogue servers capable of posing as any legitimate service, including the Kerberos services themselves. Encryption was used to prevent eavesdropping attacks, and session keys were introduced along with timestamps to prevent replay attacks. When users (or hosts/services) authenticate to the Kerberos authentication service, the authentication service in turn authenticates itself to the user (or host/service) by proving it knows the previously established shared secret. A by-product of these counter-measures is that Kerberos provides protection against man-in-the-middle attacks, which were generally regarded as infeasible at the time, and for more than a decade after Kerberos was initially deployed. Sadly, man-in-the-middle attacks are no longer mere conjecture, and are all too common in today’s Internet web, which was not designed with a hostile environment in mind.
Se riesci a unire in modo ragionevole tutti i sistemi all'ambito Kerberos, ad esempio sono tutti siti all'interno della tua azienda, quindi dovrebbe essere appropriato. Tuttavia, non cripta necessariamente tutto ; per esempio, HTTP sarebbe ancora non criptato. Alcuni servizi come NFS, tuttavia, possono crittografare i loro flussi di dati utilizzando Kerberos. A seconda delle applicazioni e dei dati che trasmetti, potresti comunque voler utilizzare una VPN tra i siti.
Ma se le tue applicazioni saranno aperte al pubblico, allora Kerberos probabilmente non è quello che vuoi.