Authentication Applications The Kerberos Protocol Standard

Slides:



Advertisements
Similar presentations
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.6 Kerberos.
Advertisements

1 Kerberos Anita Jones November, Kerberos * : Objective Assumed environment Assumed environment –Open distributed environment –Wireless and Ethernetted.
Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi
The Authentication Service ‘Kerberos’ and It’s Limitations
Henric Johnson1 Chapter 4 Authentication Applications Henric Johnson Blekinge Institute of Technology,Sweden
In this ppt file Kerberos Passwords and password management.
Authentication Applications Kerberos And X.509. Kerberos Motivation –Secure against eavesdropping –Reliable – distributed architecture –Transparent –
KERBEROS LtCdr Samit Mehra (05IT 6018).
Authentication Applications
1 Authentication Applications Ola Flygt Växjö University, Sweden
Chapter 14 – Authentication Applications
NETWORK SECURITY.
Kerberos and X.509 Fourth Edition by William Stallings
CSCE 815 Network Security Lecture 10 KerberosX.509 February 13, 2003.
IT 221: Introduction to Information Security Principles Lecture 8:Authentication Applications For Educational Purposes Only Revised: October 20, 2002.
SCSC 455 Computer Security
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Network Security Essentials Chapter 4
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 23: Internet Authentication Applications.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
Winter 2006Prof. R. Aviv: Kerberos1 Kerberos Authentication Systems.
AUTHENTICATION APPLICATIONS - Chapter 14 Kerberos X.509 Directory Authentication (S/MIME)
Information Security Principles & Applications Topic 4: Message Authentication 虞慧群
Kerberos versions 4 and 5 X.509 Authentication Service
Lecture 23 Internet Authentication Applications
Authentication & Kerberos
Cryptography and Network Security Chapter 15 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Kerberos Jean-Anne Fitzpatrick Jennifer English. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open.
1 Authentication Applications Digital Signatures Security Concerns X.509 Authentication Service Kerberos Based on slides by Dr. Lawrie Brown of the Australian.
Henric Johnson1 Chapter 4 Authentication Applications Henric Johnson Blekinge Institute of Technology,Sweden
1 Authentication Applications Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Information Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Kerberos: An Authentication Service for Open Network Systems Jennifer G. Steiner Clifford Neuman Jeffrey I. Schiller.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Authentication Applications Unit 6. Kerberos In Greek and Roman mythology, is a multi-headed (usually three-headed) dog, or "hellhound” with a serpent's.
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
Authentication 3: On The Internet. 2 Readings URL attacks
Module 4 Network & Application Security: Kerberos – X509 Authentication service – IP security Architecture – Secure socket layer – Electronic mail security.
KERBEROS. Introduction trusted key server system from MIT.Part of project Athena (MIT).Developed in mid 1980s. provides centralised private-key third-party.
31/03/2005Authentication Applications 1 Authentication Applications: Kerberos, X.509 and Certificates REYHAN AYDOĞAN.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Network Security Lecture 25 Presented by: Dr. Munam Ali Shah.
Kerberos Guilin Wang School of Computer Science 03 Dec
1 Kerberos – Private Key System Ahmad Ibrahim. History Cerberus, the hound of Hades, (Kerberos in Greek) Developed at MIT in the mid 1980s Available as.
Winter 2006Prof. R. Aviv: Kerberos1 Kerberos Authentication Systems.
AUTHENTICATION APPLICATIONS - Chapter 14 Kerberos X.509 Directory Authentication (S/MIME)
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Dr. Nermi hamza.  A user may gain access to a particular workstation and pretend to be another user operating from that workstation.  A user may eavesdrop.
KERBEROS. Introduction trusted key server system from MIT.Part of project Athena (MIT).Developed in mid 1980s. provides centralised private-key third-party.
1 Cryptography CSS 329 Lecture 12: Kerberos. 2 Lecture Outline Kerberos - Overview - V4 - V5.
Chapter 14. Authentication Applications
Chapter 14 – Authentication Applications
Cryptography and Network Security
CSCE 715: Network Systems Security
Authentication Applications
Authentication Protocol
CSCE 715: Network Systems Security
KERBEROS Miah, Md. Saef Ullah.
Authentication Applications
Presentation transcript:

Authentication Applications The Kerberos Protocol Standard Rabie A. Ramadan Lecture 7

Outline I. Introduction II. Introduction to Kerberos v4 III. Details of Kerberos v4 IV. Kerberos v5 V. Realms and Inter-Realm Authentication

Introduction Note: some of the slides and figures are taken from Dr. Jean-Anne presnetation

Introduction Open distributed environment Workstation Introduction Open distributed environment Users at workstations wish to access servers distributed throughout the network Servers must restrict access to authorized users Servers must authenticate request for service

Introduction Workstation (your computer) can not be trusted to authenticate its user correctly to network services: Three threats exist: User pretends to be another user. User alters the network address of a workstation. User eavesdrops on exchanges and use a replay attack.

Solutions AS knows all the passwords of all users Server (V) Authentication Server (AS) Client (C) AS knows all the passwords of all users AS shares unique secret Keys with each server

A Simple Authentication Dialogue Server (V) Authentication Server (AS) Client (C) Security holes? Password sent as plain ASCII No time limits for tickets Man-in-the middle can steal the ticket and fake IDC ( simple, because it is sent as clear text).

More Secure Dialogue Idea: Introducing a Ticket Granting Server (TGS) Kc’ : A key that is derived from the user password

Problems with the Previous Protocol 1. Lifetime associated with the ticket-granting ticket: If too short → the user is repeatedly asked for the password If too long → a greater opportunity to replay exists. The threat is that an opponent will steal the ticket and use it before it expires. 2. There may be a requirement for servers to authenticate themselves to users. The false server would then be in a position to act as a real server and capture any information from the user and deny the true service to the user. An opponent could eavesdrop on the network and capture a copy of the ticket-granting ticket and then wait for the legitimate user to log out. Then the opponent could forge the legitimate user's network address and send the message of step (3) to the TGS. This would give the opponent unlimited access to the resources and files available to the legitimate user. Therefore, a network service (the TGS or an application service) must be able to prove that the person using a ticket is the same person to whom that ticket was issued.

What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Relies on conventional encryption, making no use of public-key encryption. Available as open source or in supported commercial software Two versions: version 4 (passing slowly away) and 5 coexist.

Kerberos 4 Overview Stallings Fig 14.1. Discuss in relation to Table 14.1 which details message exchanges.

Version 4: Authentication Dialogue Authenticatorc

First Step : C to AS

Second step: AS to C

Third step: C to TGS

Fourth step: TGS to C

Fifth step: C to V

Sixth step: V to C

Kerberos Realms A Kerberos environment consists of: a Kerberos server a number of clients, all registered with server application servers, sharing keys with server This is termed a realm typically a single administrative domain

Request for Service in Another Realm V.4 Users on one realm may need access to servers in other realms Please consult the book for more details

Difference Between Version 4 and 5 Encryption system dependence (v.4 DES) Message byte ordering (v.4 arbitrary; v.5 defined by ASN1 Standard) Ticket lifetime (v.4 21h max; v.5 arbitrary) Authentication forwarding to other hosts (v.4 no; v.5 yes), A client accesses a server. The server can not act on another server on behalf of the client) Inter-realm authentication: v.4 (v5. simpler)

Kerberos Version 5 Developed in mid 1990’s Provides improvements over v4 addresses environmental shortcomings encryption algoithms, network protocol, byte order, ticket lifetime, authentication forwarding, interrealm authentication Specified as Internet standard RFC 1510

New Fields in V5 Realm: Indicates realm of user Options: Used to request that certain flags be set in the returned ticket Times: Used by the client to request the following time settings in the ticket: from: the desired start time for the requested ticket till: the requested expiration time for the requested ticket rtime: requested renew-till time Nonce: A random value to be repeated in message (2) to assure that the response is fresh and has not been replayed by an opponent

New Fields in V5 Subkey: The client's choice for an encryption key to be used to protect this specific application session. If this field is omitted, the session key from the ticket (Kc,v) is used. Sequence number: An optional field that specifies the starting sequence number to be used by the server for messages sent to the client during this session. Messages may be sequence numbered to detect replays.

Kerberos Limitations Every network service must be individually modified for use with Kerberos Doesn’t work well in time sharing environment Requires a secure Kerberos Server Requires a continuously available Kerberos Server Stores all passwords encrypted with a single key Assumes workstations are secure Scalability