Errata
The errata list is a list of errors and their corrections that were found after the product was released.
The following errata were submitted by our customers and have not yet been approved or disproved by the author or editor. They solely represent the opinion of the customer.
Color Key: Serious technical mistake Minor technical mistake Language or formatting error Typo Question Note Update
Version | Location | Description | Submitted by | Date submitted |
---|---|---|---|---|
10 Figures |
Text on page 10 says that Figure 2.3 illustrates transitive trust, but it's actually 2.4 that does so. The current Fig 2.4 should be moved to 2.3. |
Cris Simpson | Jul 12, 2013 | |
Printed | Page 85 "How to Work with Bit Masks" sidebar |
Book states "In order to do this, you need to do a binary OR operation, which is equivalent to addition:" |
Anonymous | Sep 12, 2017 |
Page 152 Figure 7-1 |
all referencing arrows in the table Point from the same number. e.g. line 2 1787 to line 1787. |
Anonymous | Mar 24, 2015 | |
Printed, PDF | Page 268 Within Figure 10-4 |
Figure 10-4 which states "The ticket granting service response packet" but yet the actual diagram shows it is a TGS_REQ when it should be a TGS_REP |
CurtusR | Jun 24, 2014 |
Page 268, 269 Figure 10-4 and Service Ticket paragraph |
You explain that the entire Service Ticket in a TGS_REP is encrypted with a hash of the service's password, but this is not true. If you go to the chapter 5.3 of the RFC4120, the tkt-vno, realm, and sname (Service Principal) are part of the Service Ticket but are not encrypted!! More info can be found in the Ticket Contents table on https://technet.microsoft.com/en-us/library/cc772815(v=ws.10).aspx: "The first three fields in a ticket are not encrypted". This is important because most of the vulnerabilities of the Kerberos protocol are because of this. |
Angel Munoz | Nov 25, 2015 | |
Printed, PDF | Page 269 1st section, 3rd paragraph |
This paragraph (Inside the service ticket is a copy of the access token...) implies that there should be a field (value) listed in the ST section of Figure 10-4 though there is not one. |
CurtusR | Jun 24, 2014 |
Printed, PDF | Page 269 Under the Application Access section, last paragraph |
Last sentence in this paragraph states, "This is optional and not implemented in most cases" |
CurtusR | Jun 24, 2014 |