
XEROX WorkCentre
5735/5740/5745/5755/5765/5775/5790
Information Assurance Disclosure Pa er
Ver. 2.00, March 2011 Page 19 of 50
2.8.2.5. Port 88, Kerberos
This ort is only o en when the device is communicating with the Kerberos server to authenticate a user, and is only
used only to authenticate users in conjunction with the Network Scanning feature. To disable this ort,
authentication must be disabled, and this is accom lished via the Local User Interface.
This version of software has Kerberos 5.1.1 with DES (Data Encry tion Standard) and 64-bit encry tion. The Kerberos
code is limited to user authentication, and is used to authenticate a user with a given Kerberos server as a valid user
on the network. Please note that the Kerberos server (a 3rd arty device) needs to be set u for each user. Once the
user is authenticated, the Kerberos software has com leted its task. This code will not and cannot be used to encry t
or decry t documents or other information.
This feature is based on the Kerberos rogram from the Massachusetts Institute of Technology (MIT). The Kerberos
network authentication rotocol is ublicly available on the Internet as freeware at
htt ://web.mit.edu/kerberos/www/. Xerox has determined that there are no ex ort restrictions on this version of the
software. However, there are a few deviations our version of Kerberos takes from the standard Kerberos
im lementation from MIT. These deviations are:
1) The device does not kee a user’s initial authentication and key after the user has been authenticated. In a
standard Kerberos im lementation, once a user is authenticated, the device holds onto the authentication for a
rogrammed timeout (the usual default is 12 hours) or until the user removes it ( rior to the timeout eriod). In
the Xerox im lementation, all traces of authentication of the user are removed once they have been
authenticated to the device. The user can send any number of jobs until the user logs off the system, either
manually or through system timeout.
2) The device ignores clock skew errors. In a standard im lementation of Kerberos, authentication tests will fail if a
device clock is 5 minutes (or more) different from the Kerberos server. The reason for this is that given enough
time, someone could reverse engineer the authentication and gain access to the network. With the 5-minute
timeout, the erson has just 5 minutes to reverse engineer the authentication and the key before it becomes
invalid. It was determined during the im lementation of Kerberos for our device that it would be too difficult for
the user/SA to kee the device clock in sync with the Kerberos server, so the Xerox instantiation of Kerberos has
the clock skew check removed. The disadvantage is that this gives malicious users unlimited time to reverse
engineer the user’s key. However, since this key is only valid to access the Network Scanning features on a
device, ossession of this key is of little use for nefarious ur oses.
3) The device ignores much of the information rovided by Kerberos for authenticating. For the most art, the
device only ays attention to information that indicates whether authentication has assed. Other information
that the server may return (e.g. what services the user is authenticated for) is ignored or disabled in the Xerox
im lementation. This is not an issue since the only service a user is being authenticated for is access to an e-
mail directory. No other network services are accessible from the Local UI.
Xerox has received an o inion from its legal counsel that the device software, including the im lementation of a
Kerberos encry tion rotocol in its network authentication feature, is not subject to encry tion restrictions based on
Ex ort Administration Regulations of the United States Bureau of Ex ort Administration (BXA). This means that it
can be ex orted from the United States to most destinations and urchasers without the need for revious a roval
from or notification to BXA. At the time of the o inion, restricted destinations and entities included terrorist-
su orting states (Cuba, Iran, Libya, North Korea, Sudan and Syria), their nationals, and other sanctioned entities
such as ersons listed on the Denied Parties List. Xerox rovides this information for the convenience of its customers
and not as legal advice. Customers are encouraged to consult with legal counsel to assure their own com liance with
a licable ex ort laws.
2.8.2.6. Port 110, POP-3 C ient
This unidirectional ort is used when receiving an Internet Fax (I-Fax) or E-Mail. These jobs may only be rinted, and
the ort is only o en if I-Fax is enabled and while receiving the job. It is not configurable.