Information Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel: 62932135

Slides:



Advertisements
Similar presentations
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.6 Kerberos.
Advertisements

1 Kerberos Anita Jones November, Kerberos * : Objective Assumed environment Assumed environment –Open distributed environment –Wireless and Ethernetted.
Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi
The Authentication Service ‘Kerberos’ and It’s Limitations
CS5204 – Operating Systems 1 A Private Key System KERBEROS.
Authentication Applications Kerberos And X.509. Kerberos Motivation –Secure against eavesdropping –Reliable – distributed architecture –Transparent –
Authentication Applications
1 Authentication Applications Ola Flygt Växjö University, Sweden
Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
Chapter 14 – Authentication Applications
NETWORK SECURITY.
Kerberos and X.509 Fourth Edition by William Stallings
Authentication Applications The Kerberos Protocol Standard
SCSC 455 Computer Security
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Kerberos Part 2 CNS 4650 Fall 2004 Rev. 2. PARC Once Again Once again XEROX PARC helped develop the basis for wide spread technology Needham-Schroeder.
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
PIS: Unit III Digital Signature & Authentication Sanjay Rawat PIS Unit 3 Digital Sign Auth Sanjay Rawat1 Based on the slides of Lawrie.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Network Security Essentials Chapter 4
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 23: Internet Authentication Applications.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
Winter 2006Prof. R. Aviv: Kerberos1 Kerberos Authentication Systems.
AUTHENTICATION APPLICATIONS - Chapter 14 Kerberos X.509 Directory Authentication (S/MIME)
Kerberos versions 4 and 5 X.509 Authentication Service
Lecture 23 Internet Authentication Applications
Authentication & Kerberos
Cryptography and Network Security Chapter 15 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Authentication Applications Digital Signatures Security Concerns X.509 Authentication Service Kerberos Based on slides by Dr. Lawrie Brown of the Australian.
Henric Johnson1 Chapter 4 Authentication Applications Henric Johnson Blekinge Institute of Technology,Sweden
1 Authentication Applications Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW.
KerberSim CMPT 495 Fall 2004 Jerry Frederick. Project Goals Become familiar with Kerberos flow Create a simple Kerberos simulation.
Vitaly Shmatikov CS 361S Kerberos. slide 2 Reading Assignment uKaufman Chapters 13 and 14 u“Designing an Authentication System: A Dialogue in Four Scenes”
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Kerberos: An Authentication Service for Open Network Systems Jennifer G. Steiner Clifford Neuman Jeffrey I. Schiller.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Authentication Applications Unit 6. Kerberos In Greek and Roman mythology, is a multi-headed (usually three-headed) dog, or "hellhound” with a serpent's.
1 Authentication Applications Behzad Akbari Fall 2010 In the Name of the Most High.
Cryptography and Network Security Chapter 14 Authentication Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed and extended by.
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
Network Security Essentials Chapter 4 Fourth Edition by William Stallings (Based on lecture slides by Lawrie Brown.
Authentication 3: On The Internet. 2 Readings URL attacks
Module 4 Network & Application Security: Kerberos – X509 Authentication service – IP security Architecture – Secure socket layer – Electronic mail security.
KERBEROS. Introduction trusted key server system from MIT.Part of project Athena (MIT).Developed in mid 1980s. provides centralised private-key third-party.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Network Security Lecture 25 Presented by: Dr. Munam Ali Shah.
Kerberos Guilin Wang School of Computer Science 03 Dec
1 Kerberos – Private Key System Ahmad Ibrahim. History Cerberus, the hound of Hades, (Kerberos in Greek) Developed at MIT in the mid 1980s Available as.
Winter 2006Prof. R. Aviv: Kerberos1 Kerberos Authentication Systems.
AUTHENTICATION APPLICATIONS - Chapter 14 Kerberos X.509 Directory Authentication (S/MIME)
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
KERBEROS SYSTEM Kumar Madugula.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Dr. Nermi hamza.  A user may gain access to a particular workstation and pretend to be another user operating from that workstation.  A user may eavesdrop.
1 Cryptography CSS 329 Lecture 12: Kerberos. 2 Lecture Outline Kerberos - Overview - V4 - V5.
Computer and Network Security
Chapter 14 – Authentication Applications
Cryptography and Network Security
CSCE 715: Network Systems Security
Authentication Applications
Authentication Protocol
CSCE 715: Network Systems Security
Kerberos: An Authentication Service for Open Network Systems
CS 378 Kerberos Vitaly Shmatikov.
KERBEROS Miah, Md. Saef Ullah.
Kerberos and X.509 Fourth Edition by William Stallings
Presentation transcript:

Information Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:

Kerberos  An authentication service developed by MIT.  Distributed environment: workstations and servers distributed throughout the network  Users at workstations access to services on servers  provides centralised authentication  Employment of conventional encryption.  two versions in use: 4 & 5

 first published report identified its requirements as:  security  reliability  transparency  scalability  implemented using an authentication protocol based on Needham-Schroeder

A simple authentication dialogue  Each server authenticates users who apply the server’s services.  When a user applies a service from a server, the server can authenticate the user.  There is too much burden for the servers.  Authentication Server  shares a secret key with each server.  Be Responsible for authentication of users.  Other servers is free of authentication burden.

(1) C  AS: ID C || P C || ID V (2) AS  C: Ticket (3) C  V : ID C || Ticket Ticket=E K V [ID C ||AD C || ID V ] C: client AS : Authentication Server V : server ID C : identifier of user on C ID V : identifier of V P C : password of user on C AD C : network address of C K V : secret key shared between AS and server V CV AS (1) (2) (3)

 Problems  Password is transmitted as a plaintext from workstation to AS.  Users have to re-enter passwords from time to time.  Solutions  ticket reusable  Employment of ticket-granting server, TGS

Improved protocol Once per user logon session: (1) C  AS : ID C || ID tgs (2) AS  C : E K C [Ticket tgs ] Once per type of service (3) C  TGS : ID C || ID v || Ticket tgs (4) TGS  C : Ticket V Once per service session (5) C  V : ID C || Ticket V Ticket tgs = E K tgs [ID C ||AD C ||ID tgs ||TS 1 ||Lifetime 1 ] Ticket V = E K V [ID C ||AD C ||ID V ||TS 2 ||Lifetime 2 ] CV AS (1)(2) (3) TGS (4) (5) Kerberos

Details (1) Client applies for a ticket-granting ticket from AS by sending identity of the user and identity of TGS (ID C, ID TGS ) to AS. (2) AS returns an encrypted ticket with a key derived from the user ’ s password. Ticket TGS =[ID C, AD, ID TGS, TS, Lifetime] (3) The client applies for a service-granting ticket from TGS by sending (ID C, ID V, Ticket TGS ). (4) TGS verifies the validness of Ticket TGS by decryption of the ticket, and grant Ticket V. (5) The client presents (ID C, Ticket V ) to the server. (6) Server V verifies the validness of Ticket V and provide services to the user.

Two problems  Lifetime of Ticket TGS ;  If too short, the user will be asked for password frequently.  If too long, Eve may have a greater opportunity to steal the ticket.  When Eve gets Ticket TGS or Ticket V, she will have access to the corresponding service.  Without authentication of the server to the user.  Eve configures a false server to act as a real one  Capture information from the user.  Denial of service.

Solutions  To prove the ticket presenter is just the same user for whom the ticket was issued.  AS acts as KDC to distribute a session key to the Client and TGS.  To proves the identity of the user, the client shows to TGS that he knows the session key shared between the Client and TGS.  TGS acts as KDC to distribute a session key to the Client and Server V.  To proves the identity of the user, the client shows to Server V that he knows the session key shared between the Client and Server V.

Kerberos Realms and Multiple Kerberos  An Kerberos environment consists of  a Kerberos server  A number of users  A number of application servers  Requirement  Users are registered with the Kerberos server. the Kerberos server stores identity of the user and password.  All application servers are registered with the Kerberos server. The Kerberos server must share a secret key with each server.

Kerberos V4 Authentication Service Exchange: to obtain ticket- granting ticket.  (1) C  AS : ID C || ID tgs || TS 1  (2) AS  C : E K C [ K c,tgs || ID tgs || TS 2 || Lifetime 2 || Ticket tgs ] Ticket tgs = E K tgs [ K c,tgs || ID C || AD C || ID tgs || TS 2 || Lifetime 2 ]

Kerberos V4 Ticket-Granting Service Exchange: to obtain service-granting ticket  (3) C  TGS : ID V || Ticket tgs || Authenticator c  (4) TGS  C : E K c,tgs [K c,v || ID V || TS 4 || Ticket v ] Ticket tgs = E K tgs [ K c,tgs || ID C || AD C || ID tgs || TS 2 || Lifetime 2 ] Ticket v = E K V [ K c,v ||ID C ||AD C || ID v ||TS 4 ||Lifetime 4 ] Authenticator c = E K c,tgs [ID c ||AD c ||TS 3 ]

Kerberos V4 Client/Server authentication exchange: to obtain service  (5) C  V : Ticket v || Authenticator c  (6) V  C : E K c,v [TS 5 +1] ( bidirectional authentication) Ticket v = E K V [ K c,v ||ID c ||AD c ||ID v ||TS 4 ||Lifetime 4 ] Authenticator c = E K c,v [ID c ||AD c ||TS 5 ]

Kerberos 4 Overview  a basic third-party authentication scheme  have an Authentication Server (AS)  users initially negotiate with AS to identify self  AS provides a non-corruptible authentication credential (ticket granting ticket TGT)  have a Ticket Granting server (TGS)  users subsequently request access to other services from TGS on basis of users TGT

Kerberos 4 Overview

Kerberos Realms  a Kerberos environment consists of:  a Kerberos server  a number of clients, all registered with server  application servers, sharing keys with server  this is termed a realm  typically a single administrative domain  if have multiple realms, their Kerberos servers must share keys and trust

Multiple Kerberos Realms  An Kerberos environment consists of  a Kerberos server  A number of users  A number of application servers  Requirement  Users are registered with the Kerberos server. the Kerberos server stores identity of the user and password.  All application servers are registered with the Kerberos server. The Kerberos server must share a secret key with each server.  Any two Kerberos servers are registered with each other. The Kerberos server in each interoperating realm shares a secret key with the server in the other realm.

To access an application server in another realm 1. Apply a ticket to access the local TGS ; 2. Local TGS issues a ticket to access the remote TGS; 3. The remote TGS issues a ticket to access the remote application server.

details (1) C  AS :ID C || ID tgs || TS 1 (2) AS  C :E K C [K c,tgs || ID tgs || TS 2 || Lifetime 2 || Ticket tgs ] (3) C  TGS:ID tgsrem || Ticket tgs || Authenticator c (4) TGS  C: E K c,tgs [K c,tgsrem || ID tgsrem || TS 4 || Ticket tgsrem ] (5) C  TGS rem : ID vrem || Ticket tgsrem || Authenticator c (6) TGS  C: E K c,tgsrem [K c,vrem || ID vrem || TS b || Ticket vrem ] (7) C  V rem :Ticket vrem || Authenticator c C ASTGSTGS rem V rem (1) (2) (3) (4) (5) (6) (7)

Kerberos Version 5  developed in mid 1990’s  provides improvements over v4  addresses environmental shortcomings  encryption alg, network protocol, byte order, ticket lifetime, authentication forwarding, interrealm auth  and technical deficiencies  double encryption, non-std mode of use, session keys, password attacks  specified as Internet standard RFC 1510