As noted, [Kerberos] authenticators rely on machines' clocks … can be replayed without any trouble at all. … The design philosophy of building an authentication service … sense to build an authentication system assuming an … it is not cryptographically difficult [ref].
Google-1
Google-2
Copyright clearance needed for quotation.