Errata
The errata list is a list of errors and their corrections that were found after the product was released. If the error was corrected in a later version or reprint the date of the correction will be displayed in the column titled "Date Corrected".
The following errata were submitted by our customers and approved as valid errors by the author or editor.
Color key: Serious technical mistake Minor technical mistake Language or formatting error Typo Question Note Update
Version | Location | Description | Submitted By | Date submitted | Date corrected |
---|---|---|---|---|---|
Printed | Page 7 last paragraph, 2nd to last line |
Errol Young |
Anonymous | ||
Printed | Page 19 Just before 'Kerberos 5 prinicals' heading |
service.hostanem@REALM |
Anonymous | ||
Printed | Page 24 5th paragraph |
"Since the Needham and Schroeder protocol" |
Anonymous | ||
Printed | Page 25 last paragraph, line 2 |
The line as printed reads: |
Anonymous | ||
Printed | Page 27 2nd paragraph of the locked box inset |
identiacal |
Anonymous | ||
Printed | Page 29 Caption on figure 3-5 |
'reply attack' should read 'replay attack' |
Anonymous | ||
Printed | Page 67 last sentence on page |
"since the Kerberos libraries will be smart enough to figure those |
Anonymous | ||
Printed | Page 91 Top of page |
Another tool that can be helpful is the Kerberized telnet daemon. It has rather |
Anonymous | Oct 01, 2003 | |
Printed | Page 111 In Chapter 6, in the page 111 footnote, |
the URL is broken: |
Anonymous | Oct 01, 2003 | |
Printed | Page 115 1st paragraph in the section entitled "Heimdal", 4th line |
"in 30 day's time" |
Anonymous | ||
Printed | Page 129 Paragraph entitled "Logon Auditing" |
line 5: "severs" should be "servers" |
Anonymous | ||
Printed | Page 138 6th line on page |
"change to a client application does support Kerberos" |
Anonymous | ||
Printed | Page 142 lines 2-3 on page |
"such as a PAM module to check if the potential users' shell, |
Anonymous | ||
Printed | Page 142 line 15 |
password required /lib/security/pam_cracklib.so retry=3 type= |
Anonymous | ||
Printed | Page 146 3rd paragraph |
"Simple and Protected GSSAPI Protection Mechanism" |
Anonymous | ||
Printed | Page 150 9th line from bottom |
"om which" should be "of which" |
Anonymous | ||
Printed | Page 150 4th line from bottom |
"gleamed" should read "gleaned" |
Anonymous | ||
Printed | Page 156 3rd paragraph, sentence |
".. placed in a keytab that can be read by the OpenLDAP server, slurpd" |
Anonymous | ||
Printed | Page 179 3rd paragraph |
It concerns the ktpass command example. |
Anonymous | ||
Printed | Page 213 3rd paragraph |
"to carry out an attach on a smart card" |
Anonymous | ||
Printed | Page 233 In Appendix A, on page 233, |
the first item in the list under the text para was |
Anonymous | Oct 01, 2003 | |
Printed | Page 253 index entry |
Young, Errol, 7 |
Anonymous |