<s>
Kerberized	B-Protocol
Internet	I-Protocol
Negotiation	I-Protocol
of	I-Protocol
Keys	I-Protocol
(	O
KINK	O
)	O
is	O
a	O
protocol	O
defined	O
in	O
RFC	O
4430	O
used	O
to	O
set	O
up	O
an	O
IPsec	B-Protocol
security	B-Protocol
association	I-Protocol
(	O
SA	O
)	O
,	O
similar	O
to	O
Internet	B-Protocol
Key	I-Protocol
Exchange	I-Protocol
(	O
IKE	B-Protocol
)	O
,	O
utilizing	O
the	O
Kerberos	B-Protocol
protocol	I-Protocol
to	O
allow	O
trusted	O
third	O
parties	O
to	O
handle	O
authentication	O
of	O
peers	O
and	O
management	O
of	O
security	O
policies	O
in	O
a	O
centralized	O
fashion	O
.	O
</s>
<s>
Its	O
motivation	O
is	O
given	O
in	O
RFC	O
3129	O
as	O
an	O
alternative	O
to	O
IKE	B-Protocol
,	O
in	O
which	O
peers	O
must	O
each	O
use	O
X.509	O
certificates	O
for	O
authentication	O
,	O
use	O
Diffie	B-Protocol
–	I-Protocol
Hellman	I-Protocol
key	I-Protocol
exchange	I-Protocol
(	O
DH	O
)	O
for	O
encryption	O
,	O
know	O
and	O
implement	O
a	O
security	O
policy	O
for	O
every	O
peer	O
with	O
which	O
it	O
will	O
connect	O
,	O
with	O
authentication	O
of	O
the	O
X.509	O
certificates	O
either	O
pre-arranged	O
or	O
using	O
DNS	B-Protocol
,	O
preferably	O
with	O
DNSSEC	B-Protocol
.	O
</s>
<s>
Utilizing	O
Kerberos	B-Protocol
,	O
KINK	O
peers	O
must	O
only	O
mutually	O
authenticate	O
with	O
the	O
appropriate	O
Authentication	O
Server	O
(	O
AS	O
)	O
,	O
with	O
a	O
key	O
distribution	O
center	O
(	O
KDC	O
)	O
in	O
turn	O
controlling	O
distribution	O
of	O
keying	O
material	O
for	O
encryption	O
and	O
therefore	O
controlling	O
the	O
IPsec	B-Protocol
security	O
policy	O
.	O
</s>
<s>
KINK	O
is	O
a	O
command/response	O
protocol	O
that	O
can	O
create	O
,	O
delete	O
,	O
and	O
maintain	O
IPsec	B-Protocol
SAs	O
.	O
</s>
<s>
This	O
is	O
in	O
contrast	O
to	O
IKE	B-Protocol
,	O
which	O
uses	O
Main	O
Mode	O
to	O
first	O
establish	O
an	O
Internet	B-Protocol
Security	I-Protocol
Association	I-Protocol
and	I-Protocol
Key	I-Protocol
Management	I-Protocol
Protocol	I-Protocol
(	O
ISAKMP	B-Protocol
)	O
SA	O
followed	O
by	O
subsequent	O
Quick	O
Mode	O
exchanges	O
.	O
</s>
<s>
KINK	O
uses	O
Kerberos	B-Protocol
mechanisms	O
to	O
provide	O
mutual	O
authentication	O
and	O
replay	O
protection	O
.	O
</s>
<s>
For	O
establishing	O
SAs	O
,	O
KINK	O
provides	O
confidentiality	O
for	O
the	O
payloads	O
that	O
follow	O
the	O
Kerberos	B-Protocol
AP-REQ	O
payload	O
.	O
</s>
<s>
KINK	O
also	O
provides	O
a	O
means	O
of	O
using	O
Kerberos	B-Protocol
User-to-User	O
mechanisms	O
when	O
there	O
is	O
not	O
a	O
key	O
shared	O
between	O
the	O
server	O
and	O
the	O
KDC	O
.	O
</s>
<s>
This	O
is	O
typically	O
,	O
but	O
not	O
limited	O
to	O
,	O
the	O
case	O
with	O
IPsec	B-Protocol
peers	O
using	O
PKINIT	O
for	O
initial	O
authentication	O
.	O
</s>
<s>
KINK	O
directly	O
reuses	O
Quick	O
Mode	O
payloads	O
defined	O
in	O
section	O
5.5	O
of	O
IKE	B-Protocol
,	O
with	O
some	O
minor	O
changes	O
and	O
omissions	O
.	O
</s>
<s>
KINK	O
also	O
provides	O
rekeying	O
and	O
Dead	B-Protocol
Peer	I-Protocol
Detection	I-Protocol
.	O
</s>
<s>
The	O
following	O
open	B-License
source	I-License
implementations	O
of	O
KINK	O
are	O
currently	O
available	O
:	O
</s>
