Authenticating users can be dangerous when the method used by the protocol is inherently insecure. Kerberos is a way to eliminate unsafe methods of authentication.

Massachusetts Institute of Technology

Developer Tools

Source Code Browsing Tools

The MIT Kerberos Consortium supports multiple mechanisms for reviewing our source code:

Bug Tracking

You may view our bug tracking database in Request Tracker (RT) here: MIT Kerberos Bug Database


We also maintain a wiki containing useful information for developers: K5Wiki