Presentation is loading. Please wait.

Presentation is loading. Please wait.

Kerberos Presented By: Pratima Vijayakumar Rafi Qureshi Vinay Gaonkar CS 616 Course Instructor: Dr. Charles Tappert.

Similar presentations


Presentation on theme: "Kerberos Presented By: Pratima Vijayakumar Rafi Qureshi Vinay Gaonkar CS 616 Course Instructor: Dr. Charles Tappert."— Presentation transcript:

1 Kerberos Presented By: Pratima Vijayakumar Rafi Qureshi Vinay Gaonkar CS 616 Course Instructor: Dr. Charles Tappert

2 Introduction Kerberos History Kerberos Environment Kerberos Architecture Kerberos Protocols Kerberos Version 5 Kerberos Advantages Kerberos Weaknesses and Solutions

3 History Developed at MIT in early 1980’s Computing shift from mainframes to workstations Pools of distributed workstations connected to servers Concept of ”Network Credentials” Commercial versions V4 and V5 Principles and systems are relevant until today Concepts incorporated in DCE, AFS, NT, etc.

4 Kerberos Environment (I)

5 Kerberos Environment (II) KRB consists of: AS – Authentication Server TGS – Ticket Granting Server DB – Database of entity keys Separation between two actions: Authentication – ”logging into the network” Communication – ”holding a session between two parties”

6 Kerberos Architecture (I)

7 Kerberos Architecture (II) Kerberos implements the ”Internet Scenario” User A has password PWA to authenticate to KRB KRB stores key KA that is derived from password PWA Server B has key KB to authenticate to KRB KRB stores key KB that is identical to the server’s key Workstations are stateless – they don’t know the users and their passwords, and they don’t have keys Kerberos provides tickets to the source party (A+WS), which requested the session, and it does not bother the destination party (B)

8 Kerberos V5 Protocols (I) Acquiring Network Credentials: 1.) User A starts working at workstation WS by entering its name ”A” and password PWA. Workstation WS computes key KA from PWA, and it then erases password PWA from its memory. 2.) Workstation WS contacts Authentication Server (AS) and requests ”Network Credentials” to A+WS. Workstation WS sends following clear data – to AS (where Times gives the time validity interval, and Nonce1 is random value). 3.) Authentication Server AS replies to A+WS with following two items: AND sealed by key KA (where TKTTGS = sealed by key KTGS). Workstation WS now tries to open the sealed item using the computed key KA.

9 Kerberos V5 Protocols (II) Establishing Connection with Server: 4.) Workstation WS contacts Ticket Granting Server (TGS) and requests ticket for B as follows: (where Auth1 = sealed by key KA,TGS). 5.) Ticket Granting Server TGS replies to A+WS with following two items: AND sealed by KA,TGS (where TKTB = sealed by KB). Workstation WS opens the sealed item using key KA,TGS. 6.) Workstation WS requests a session from B by sending (where Auth2 = sealed by key KA,B). Fields Subkey and Seq# are optional. 7.) Server B opens ticket TKTB with key KB and replies to A+WS with authentication Auth3 = sealed by A,B.

10 Kerberos V5 Options and Flags INITIAL: Indicates that a ticket was issues by AS and not by a TGS. PRE-AUTHENT: Indicates that the user was pre-authenticated by some means before a TGS ticket was issued. HW-AUTHENT: Indicates that the user was authenticated with a hardware token before a TGS ticket was issued. RENEWABLE: Tells TGS that this ticket can be used to obtain a replacement ticket that expires at a later date. INVALID: Indicates that this ticket is invalid and must be validated by the TGS before use.

11 Kerberos V5 Options and Flags MAY-POSTDATE: Tells TGS that a post-dated ticket may be issued based on this ticket-granting ticket. POSTDATED: Indicated that this ticket has been postdated. PROXYABLE: Tells TGS that a new service-granting ticket with a different network address may be issued based on this ticket. FORWARDABLE: Tells TGS that a new ticket-granting ticket with different network address may be issued based on this ticket-granting ticket. FORWARDED: Indicates that this ticket has either been forwarded or that it was issued based on authentication involving a forwarded ticket.

12 Kerberos - Advantages Passwords aren’t exposed to eavesdropping Single Sign-on More convenient: only one password, entered once Stolen tickets hard to reuse Need authenticator as well, which can’t be reused Wide support in various operating systems. Prevents transmission of passwords over the network.

13 Kerberos - Weaknesses and Solutions If TGT stolen, can be used to access network services. Ticket expires in a few hours. Subject to dictionary attack.Timestamps require hacker to guess in 5 minutes. Very bad if Authentication Server compromised. KDC is centralized. Physical protection for the server. Replicated KDC.


Download ppt "Kerberos Presented By: Pratima Vijayakumar Rafi Qureshi Vinay Gaonkar CS 616 Course Instructor: Dr. Charles Tappert."

Similar presentations


Ads by Google