KERBEROS LtCdr Samit Mehra (05IT 6018).

Slides:



Advertisements
Similar presentations
Kerberos: An Authentication Service for Open Network Systems Jennifer G. Steiner, Clifford Neuman, and Jeffrey I. Schiller Massachusetts Institute of Technology.
Advertisements

1 Kerberos Anita Jones November, Kerberos * : Objective Assumed environment Assumed environment –Open distributed environment –Wireless and Ethernetted.
AUTHENTICATION AND KEY DISTRIBUTION
Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi
Chapter 10 Real world security protocols
Security Protocols Sathish Vadhiyar Sources / Credits: Kerberos web pages and documents contained / pointed.
KERBEROS A NETWORK AUTHENTICATION PROTOCOL Nick Parker CS372 Computer Networks.
Authentication Applications
Chapter 14 – Authentication Applications
KERBEROS
IT 221: Introduction to Information Security Principles Lecture 8:Authentication Applications For Educational Purposes Only Revised: October 20, 2002.
Authentication Applications The Kerberos Protocol Standard
SCSC 455 Computer Security
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Kerberos Part 2 CNS 4650 Fall 2004 Rev. 2. PARC Once Again Once again XEROX PARC helped develop the basis for wide spread technology Needham-Schroeder.
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Akshat Sharma Samarth Shah
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
1 Distributed Computer Security: Authentication and Key Distribution Vijay Jain CSc 8320, Spring 2007.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
The Kerberos Authentication System Brad Karp UCL Computer Science CS GZ03 / M th November, 2008.
Winter 2006Prof. R. Aviv: Kerberos1 Kerberos Authentication Systems.
1 Lecture 12: Kerberos terms and configuration phases –logging to network –accessing remote server replicated KDC multiple realms message privacy and integrity.
Kerberos Jean-Anne Fitzpatrick Jennifer English. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open.
Lecture 25 Secure Communications CPE 401 / 601 Computer Network Systems slides are modified from Jim Kurose & Keith Ross and Dave Hollinger.
SMUCSE 5349/73491 Authentication Protocols. SMUCSE 5349/73492 The Premise How do we use perfect cryptographic mechanisms (signatures, public-key and symmetric.
Kerberos Authenticating Over an Insecure Network.
Wireless Security In wireless networks. Security and Assurance - Goals Integrity Modified only in acceptable ways Modified only by authorized people Modified.
Lecture 22 Network Security CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger.
Kerberos: A Network Authentication Tool Seth Orr University of Missouri – St. Louis CS 5780 System Administration.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
Kerberos Presented By: Pratima Vijayakumar Rafi Qureshi Vinay Gaonkar CS 616 Course Instructor: Dr. Charles Tappert.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Information Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
Kerberos: An Authentication Service for Open Network Systems Jennifer G. Steiner Clifford Neuman Jeffrey I. Schiller.
Netprog: Kerberos1 KERBEROS. Contents: Introduction History Components Authentication Process Strengths Weaknesses and Solutions Applications References.
Authentication Applications Unit 6. Kerberos In Greek and Roman mythology, is a multi-headed (usually three-headed) dog, or "hellhound” with a serpent's.
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
Kerberos. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open source or in supported commercial software.
Authentication 3: On The Internet. 2 Readings URL attacks
Lecture 13 Page 1 Advanced Network Security Authentication and Authorization in Local Networks Advanced Network Security Peter Reiher August, 2014.
Key Management. Given a computer network with n hosts, for each host to be able to communicate with any other host would seem to require as many as n*(n-1)
1 KERBEROS: AN AUTHENTICATION SERVICE FOR OPEN NETWORK SYSTEMS J. G. Steiner, C. Neuman, J. I. Schiller MIT.
Kerberos By Robert Smithers. History of Kerberos Kerberos was created at MIT, and was named after the 3 headed guard dog of Hades in Greek mythology Cerberus.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Kerberos Guilin Wang School of Computer Science 03 Dec
1 Kerberos – Private Key System Ahmad Ibrahim. History Cerberus, the hound of Hades, (Kerberos in Greek) Developed at MIT in the mid 1980s Available as.
Winter 2006Prof. R. Aviv: Kerberos1 Kerberos Authentication Systems.
1 Kerberos n Part of project Athena (MIT). n Trusted 3rd party authentication scheme. n Assumes that hosts are not trustworthy. n Requires that each client.
KERBEROS SYSTEM Kumar Madugula.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
1 SUBMITTED BY- PATEL KUMAR C.S.E(8 th - sem). SUBMITTED TO- Mr. DESHRAJ AHIRWAR.
1 Example security systems n Kerberos n Secure shell.
What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Kerberos is a three-headed dog Available as open source or in supported.
Dr. Nermi hamza.  A user may gain access to a particular workstation and pretend to be another user operating from that workstation.  A user may eavesdrop.
KERBEROS. Introduction trusted key server system from MIT.Part of project Athena (MIT).Developed in mid 1980s. provides centralised private-key third-party.
1 Cryptography CSS 329 Lecture 12: Kerberos. 2 Lecture Outline Kerberos - Overview - V4 - V5.
Radius, LDAP, Radius used in Authenticating Users
Kerberos Kerberos is a network authentication protocol and it is designed to provide strong authentication for client server applications. It uses secret.
Kerberos.
Network Security – Kerberos
Kerberos Kerberos is an authentication protocol for trusted hosts on untrusted networks.
Kerberos Part of project Athena (MIT).
KERBEROS.
KERBEROS Miah, Md. Saef Ullah.
Presentation transcript:

KERBEROS LtCdr Samit Mehra (05IT 6018)

What is Kerberos? Motivation Why Kerberos? Firewall Vs Kerberos Kerberos assumptions How does Kerberos work? Weakness and solutions Conclusion

WHAT IS KERBEROS? NETWORK AUTHENTICATION PROTOCOL DEVELOPED AT MIT IN THE MID 1980s AVAILABLE AS OPEN SOURCE OR IN SUPPORTED COMMERCIAL SOFTWARE REQUIRES THAT EACH CLIENT (EACH REQUEST FOR SERVICE) PROVE IT’S IDENTITY. DOES NOT REQUIRE USER TO ENTER PASSWORD EVERY TIME A SERVICE IS REQUESTED!

WHAT IS KERBEROS? Contd AUTHENTICATION SERVICE FOR INTERACTIVE SERVICES LIKE TELNET,FTP etc. HERE USER PROMPTED FOR PASSWORD AND MUST LOGIN IN REAL TIME SYMMETRIC KEY ENCRYPTION USED IT IS FAST AND ALLOWS REAL TIME AUTHENTICATION

MOTIVATION WITHOUT KNOWLEDGE OF IDENTITY OF PERSON REQUESTING AN OPERATION DIFFICULT TO DECIDE IF IT SHOULD BE ALLOWED. TRADITIONAL AUTHENTICATION METHODS ARE NOT SUITABLE FOR USE IN COMPUTER NETWORKS WHERE ATTACKERS CAN MONITOR NETWORK TRAFFIC AND INTERCEPT PASSWORDS. USE OF STRONG AUTHENTICATION METHODS IS IMPERATIVE.

MOTIVATION IN A COMMON DISTRIBUTED ARCHIETECTURE THREE APPROACHES TO SECURITY ENVISAGED: RELY ON INDIVIDUAL CLIENT WORK STATIONS TO ASSURE IDENTITY OF USER. REQUIRE CLIENT SYSTEMS TO AUTHENTICATE THEMSELVES TO SERVERS. REQUIRE USER TO PROVE IDENTITY FOR EACH SERVICE INVOKED.

MOTIVATION IN A CLOSED ENVIRONMENT WHERE ALL SYSTEMS OWNED AND OPERATED BY SINGLE ORGANISATION FIRST OR SECOND APPROACH MAY SUFFICE. BUT IN AN OPEN ENVIRONMENT THIRD APPROACH (SUPPORTED BY KERBEROS) NEEDED TO PROTECT USER INFORMATION AND RESOURCES HOUSED ON SERVER.

WHY KERBEROS? AUTHENTICATION IS A KEY FEATURE IN A MULTI USER ENVIRONMENT. SENDING USERNAMES AND PASSWORDS IN THE CLEAR JEOPARDIZES THE SECURITY OF THE NETWORK. EACH TIME A PASSWORD IS SENT IN THE CLEAR, THERE IS A CHANCE FOR INTERCEPTION.

FIREWALL Vs KERBEROS FIREWALLS MAKE A RISKY ASSUMPTION: THAT ATTACKERS ARE COMING FROM THE OUTSIDE. IN REALITY, ATTACKS FREQUENTLY COME FROM WITHIN. KERBEROS ASSUMES THAT NETWORK CONNECTIONS (RATHER THAN SERVERS AND WORK STATIONS) ARE THE WEAK LINK IN NETWORK SECURITY.

KERBEROS ASSUMPTIONS THE USER WONT USE SIMPLE PASSWORDS LIKE HIS OWN USER NAME ETC… WHICH CAN BE EASILY BROKEN BY A PASSWORD CRACKER …IN FACT NO AUTHENTICATION MECHANISM TILL DATE CAN COPE FOR PASSWORD GUESSING. THE WORKSTATIONS OR MACHINES ARE MORE OR LESS SECURE I.E. THERE IS NO WAY FOR AN ATTACKER TO INTERCEPT COMMUNICATION BETWEEN A USER AND A CLIENT (USER PROCESS).

KERBEROS DESIGN USER MUST IDENTIFY HIMSELF ONCE AT THE BEGINNING OF A WORKSTATION SESSION (LOGIN SESSION). PASSWORDS ARE NEVER SENT ACROSS THE NETWORK IN CLEARTEXT (OR STORED IN MEMORY)

KERBEROS DESIGN (CONT.) EVERY USER HAS A PASSWORD. EVERY SERVICE HAS A PASSWORD. THE ONLY ENTITY THAT KNOWS ALL THE PASSWORDS IS THE AUTHENTICATION SERVER.

Server Server Server Server Workstation Ticket Granting Server Server Server Kerberos Database Workstation Authentication Server Kerberos Key Distribution Service

SECRET KEY CRYPTOGRAPHY THE ENCRYPTION USED BY KERBEROS IMPLEMENTATIONS IS DES, ALTHOUGH KERBEROS V5 ALLOWS OTHER ALGORITHMS CAN BE USED. ENCRYPTION PLAINTEXT CIPHERTEXT KEY CIPHERTEXT PLAINTEXT DECRYPTION

HOW DOES KERBEROS WORK? INSTEAD OF CLIENT SENDING PASSWORD TO APPLICATION SERVER: REQUEST TICKET FROM AUTHENTICATION SERVER TICKET AND ENCRYPTED REQUEST SENT TO APPLICATION SERVER HOW TO REQUEST TICKETS WITHOUT REPEATEDLY SENDING CREDENTIALS? TICKET GRANTING TICKET (TGT)

AUTHENTICATION SERVER THE CLIENT SENDS A PLAINTEXT REQUEST TO THE AS ASKING FOR A TICKET IT CAN USE TO TALK TO THE TGS. REQUEST: LOGIN NAME TGS NAME SINCE THIS REQUEST CONTAINS ONLY WELL-KNOWN NAMES, IT DOES NOT NEED TO BE SEALED.

AUTHENTICATION SERVER THE AS FINDS THE KEYS CORRESPONDING TO THE LOGIN NAME AND THE TGS NAME. THE AS CREATES A TICKET: LOGIN NAME TGS NAME CLIENT NETWORK ADDRESS TGS SESSION KEY THE AS SEALS THE TICKET WITH THE TGS SECRET KEY.

AUTHENTICATION SERVER RESPONSE THE AS ALSO CREATES A RANDOM SESSION KEY FOR THE CLIENT AND THE TGS TO USE. THE SESSION KEY AND THE SEALED TICKET ARE SEALED WITH THE USER (LOGIN NAME) SECRET KEY. Sealed with TGS key Ticket: login name TGS name net address TGS session key TGS session key Sealed with user key

ACCESSING THE TGS THE CLIENT DECRYPTS THE MESSAGE USING THE USER’S PASSWORD AS THE SECRET KEY. THE CLIENT NOW HAS A SESSION KEY AND TICKET THAT CAN BE USED TO CONTACT THE TGS. THE CLIENT CANNOT SEE INSIDE THE TICKET, SINCE THE CLIENT DOES NOT KNOW THE TGS SECRET KEY.

TICKET GRANTING TICKETS

ACCESSING A SERVER sealed with TGS key sealed with session key WHEN A CLIENT WANTS TO START USING A SERVER (SERVICE), THE CLIENT MUST FIRST OBTAIN A TICKET. THE CLIENT COMPOSES A REQUEST TO SEND TO THE TGS: sealed with TGS key TGS Ticket Authenticator sealed with session key Server Name

TGS RESPONSE THE TGS DECRYPTS THE TICKET USING IT’S SECRET KEY. INSIDE IS THE TGS SESSION KEY. THE TGS DECRYPTS THE AUTHENTICATOR USING THE SESSION KEY. THE TGS CHECK TO MAKE SURE LOGIN NAMES, CLIENT ADDRESSES AND TGS SERVER NAME ARE ALL OK. TGS MAKES SURE THE AUTHENTICATOR IS RECENT.

TGS RESPONSE ONCE EVERYTHING CHECKS OUT - THE TGS: BUILDS A TICKET FOR THE CLIENT AND REQUESTED SERVER. THE TICKET IS SEALED WITH THE SERVER KEY. CREATES A SESSION KEY SEALS THE ENTIRE MESSAGE WITH THE TGS SESSION KEY AND SENDS IT TO THE CLIENT.

CLIENT ACCESSES SERVER THE CLIENT NOW DECRYPTS THE TGS RESPONSE USING THE TGS SESSION KEY. THE CLIENT NOW HAS A SESSION KEY FOR USE WITH THE NEW SERVER, AND A TICKET TO USE WITH THAT SERVER. THE CLIENT CAN CONTACT THE NEW SERVER USING THE SAME FORMAT USED TO ACCESS THE TGS.

THE APPLICATION SERVER

TICKETS EACH REQUEST FOR A SERVICE REQUIRES A TICKET. A TICKET PROVIDES A SINGLE CLIENT WITH ACCESS TO A SINGLE SERVER.

TICKETS (cont.) TICKETS ARE DISPENSED BY THE “TICKET GRANTING SERVER” (TGS), WHICH HAS KNOWLEDGE OF ALL THE ENCRYPTION KEYS. TICKETS ARE MEANINGLESS TO CLIENTS, THEY SIMPLY USE THEM TO GAIN ACCESS TO SERVERS.

TICKETS (cont.) THE TGS SEALS (ENCRYPTS) EACH TICKET WITH THE SECRET ENCRYPTION KEY OF THE SERVER. SEALED TICKETS CAN BE SENT SAFELY OVER A NETWORK - ONLY THE SERVER CAN MAKE SENSE OUT OF IT. EACH TICKET HAS A LIMITED LIFETIME (A FEW HOURS).

TICKET CONTENTS CLIENT NAME (USER LOGIN NAME) SERVER NAME CLIENT HOST NETWORK ADDRESS SESSION KEY FOR CLIENT/SERVER TICKET LIFETIME CREATION TIMESTAMP

SESSION KEY RANDOM NUMBER THAT IS SPECIFIC TO A SESSION. SESSION KEY IS USED TO SEAL CLIENT REQUESTS TO SERVER. SESSION KEY CAN BE USED TO SEAL RESPONSES (APPLICATION SPECIFIC USAGE).

AUTHENTICATORS AUTHENTICATORS PROVE A CLIENT’S IDENTITY. INCLUDES: CLIENT USER NAME. CLIENT NETWORK ADDRESS. TIMESTAMP. AUTHENTICATORS ARE SEALED WITH A SESSION KEY.

RECAP EACH TIME A CLIENT WANTS TO CONTACT A SERVER, IT MUST FIRST ASK THE 3RD PARTY (TGS) FOR A TICKET AND SESSION KEY. IN ORDER TO REQUEST A TICKET FROM THE TGS, THE CLIENT MUST ALREADY HAVE A TG TICKET AND A SESSION KEY FOR COMMUNICATING WITH THE TGS!

THE TICKET GRANTING SERVICE

KERBEROS SUMMARY EVERY SERVICE REQUEST NEEDS A TICKET. TICKETS COME FROM THE TGS (EXCEPT THE TICKET FOR THE TGS!). WORKSTATIONS CANNOT UNDERSTAND TICKETS, THEY ARE ENCRYPTED USING THE SERVER KEY. EVERY TICKET HAS AN ASSOCIATED SESSION KEY. TICKETS ARE REUSABLE.

KERBEROS SUMMARY (cont.) TICKETS HAVE A FINITE LIFETIME. AUTHENTICATORS ARE ONLY USED ONCE (NEW CONNECTION TO A SERVER). AUTHENTICATORS EXPIRE FAST ! SERVER MAINTAINS LIST OF AUTHENTICATORS (PREVENT STOLEN AUTHENTICATORS). THERE IS A LOT MORE TO KERBEROS!!!

WEAKNESSES AND SOLUTIONS IF TGT STOLEN, CAN BE USED TO ACCESS NETWORK SERVICES. ONLY A PROBLEM UNTIL TICKET EXPIRES IN A FEW HOURS. SUBJECT TO DICTIONARY ATTACK. TIMESTAMPS REQUIRE HACKER TO GUESS IN 5 MINUTES. VERY BAD IF AUTHENTICATION SERVER COMPROMISED. PHYSICAL PROTECTION FOR THE SERVER.

YOUR SECURITY IS IN YOUR OWN HANDS….

REFERENCES CRYPTOGRAPHY AND NETWORK SECURITY – WILLIAM STALLINGS THE MORONS GUIDE TO KERBEROS – VERSION 1.2.2 UNDERSTANDING KERBEROS V5 AUTHENTICATION PROTOCOL FABRICE KAH GIAC SECURITY ESSENTIALS CERTIFICATION (GSEC) - NOVEMBER 2003 THE KERBEROS NETWROK AUTHENTICATION SERVICE (V5) – J KOHL, C NEWMAN – 1993 KERBEROS: AN AUTHENTICATION SERVICE FOR COMPUTER NETWORKS B. CLIFFORD NEUMAN AND THEODORE TS'O – 2001 http://www.kerberos.isi.edu/ - THE KERBEROS HOMEPAGE

QUESTIONS??? THANK YOU….