IT 221: Introduction to Information Security Principles Lecture 8:Authentication Applications For Educational Purposes Only Revised: October 20, 2002.

Slides:



Advertisements
Similar presentations
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.6 Kerberos.
Advertisements

1 Kerberos Anita Jones November, Kerberos * : Objective Assumed environment Assumed environment –Open distributed environment –Wireless and Ethernetted.
Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi
The Authentication Service ‘Kerberos’ and It’s Limitations
Henric Johnson1 Chapter 4 Authentication Applications Henric Johnson Blekinge Institute of Technology,Sweden
CS5204 – Operating Systems 1 A Private Key System KERBEROS.
Chapter 10 Real world security protocols
Security Protocols Sathish Vadhiyar Sources / Credits: Kerberos web pages and documents contained / pointed.
KERBEROS LtCdr Samit Mehra (05IT 6018).
Authentication Applications
1 Authentication Applications Ola Flygt Växjö University, Sweden
Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
Chapter 14 – Authentication Applications
NETWORK SECURITY.
Kerberos and X.509 Fourth Edition by William Stallings
Authentication Applications The Kerberos Protocol Standard
SCSC 455 Computer Security
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
The Kerberos Authentication System Brad Karp UCL Computer Science CS GZ03 / M th November, 2008.
Winter 2006Prof. R. Aviv: Kerberos1 Kerberos Authentication Systems.
IIIT Security Workshop1 Chapter Authentication Applications ADAPTED FROM THE PRESENTATION by Henric Johnson Blekinge Institute of Technology,Sweden
Information Security Principles & Applications Topic 4: Message Authentication 虞慧群
Kerberos versions 4 and 5 X.509 Authentication Service
1 Authentication Applications Digital Signatures Security Concerns X.509 Authentication Service Kerberos Based on slides by Dr. Lawrie Brown of the Australian.
Henric Johnson1 Chapter 4 Authentication Applications Henric Johnson Blekinge Institute of Technology,Sweden
1 Authentication Applications Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW.
Kerberos: A Network Authentication Tool Seth Orr University of Missouri – St. Louis CS 5780 System Administration.
Authentication Applications
Authentication applications
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Information Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
IT 221: Introduction to Information Security Principles Lecture 6:Digital Signatures and Authentication Protocols For Educational Purposes Only Revised:
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Kerberos: An Authentication Service for Open Network Systems Jennifer G. Steiner Clifford Neuman Jeffrey I. Schiller.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Netprog: Kerberos1 KERBEROS. Contents: Introduction History Components Authentication Process Strengths Weaknesses and Solutions Applications References.
Authentication Applications Unit 6. Kerberos In Greek and Roman mythology, is a multi-headed (usually three-headed) dog, or "hellhound” with a serpent's.
1 Authentication Applications Behzad Akbari Fall 2010 In the Name of the Most High.
Chapter 21 Distributed System Security Copyright © 2008.
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
Authentication 3: On The Internet. 2 Readings URL attacks
KERBEROS. Introduction trusted key server system from MIT.Part of project Athena (MIT).Developed in mid 1980s. provides centralised private-key third-party.
31/03/2005Authentication Applications 1 Authentication Applications: Kerberos, X.509 and Certificates REYHAN AYDOĞAN.
Kerberos By Robert Smithers. History of Kerberos Kerberos was created at MIT, and was named after the 3 headed guard dog of Hades in Greek mythology Cerberus.
Network Security Lecture 25 Presented by: Dr. Munam Ali Shah.
Kerberos Guilin Wang School of Computer Science 03 Dec
1 Kerberos – Private Key System Ahmad Ibrahim. History Cerberus, the hound of Hades, (Kerberos in Greek) Developed at MIT in the mid 1980s Available as.
Winter 2006Prof. R. Aviv: Kerberos1 Kerberos Authentication Systems.
1 Kerberos n Part of project Athena (MIT). n Trusted 3rd party authentication scheme. n Assumes that hosts are not trustworthy. n Requires that each client.
Dr. Nermi hamza.  A user may gain access to a particular workstation and pretend to be another user operating from that workstation.  A user may eavesdrop.
KERBEROS. Introduction trusted key server system from MIT.Part of project Athena (MIT).Developed in mid 1980s. provides centralised private-key third-party.
1 Cryptography CSS 329 Lecture 12: Kerberos. 2 Lecture Outline Kerberos - Overview - V4 - V5.
Computer and Network Security
Chapter 14 – Authentication Applications
Radius, LDAP, Radius used in Authenticating Users
Authentication Protocol
CS60002: Distributed Systems
CS 378 Kerberos Vitaly Shmatikov.
Kerberos Part of project Athena (MIT).
KERBEROS.
KERBEROS Miah, Md. Saef Ullah.
Kerberos and X.509 Fourth Edition by William Stallings
Authentication Applications
Presentation transcript:

IT 221: Introduction to Information Security Principles Lecture 8:Authentication Applications For Educational Purposes Only Revised: October 20, 2002

1 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Outline: Context and Overview Security Concerns: Problem Statement Security Concerns: Network Threats Kerberos: Background Kerberos: Basics Kerberos: Terms Simple Dialogue: Steps Simple Dialogue: Steps (Cont) Version 4 Dialogue Examples Kerberos: Pictorial Version 4 Problems Version 5 Realms Kerberos in Practice Resources Lecture Outline

2 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Context and Overview Context [2]: In todays distributed computing environment, consisting of dedicated user workstations & servers, three approaches to security can be envisioned: -(1) Rely on each workstation to assure user identities, and rely on each server to enforce a security policy based on user Ids. -(2) Require that client systems authenticate themselves to servers, but trust the client systems concerning the identity of its user. -(3) Require the user to prove identity for each service invoked. Also require that servers prove their identity to clients. Issues [2]: In a small, closed environment, in which all systems are owned and operated by one IT group, the first or perhaps second strategy might suffice. But in a more open environment, the need for the third approach is needed to protect user information and resources housed on the server. The focus of this lecture will focus on one of the most widely used services to support this third approach - Kerberos.

3 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Security Concerns: Problem Statement Problem Statement [2]: Assume an open, distributed environment in which users at workstations wish to access services on servers distributed across the network. Servers need to restrict access to authorized users, and to authenticate requests for service. In this environment, a workstation cannot be trusted to identify its users correctly to network services. Specifically, three types of network threats exist:

4 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Security Concerns: Network Threats Network Threats [2]: (1) A user may gain access to a particular workstation and pretend to be another user operating from that workstation. (2) A user may alter the network address of a workstation so that the requests sent from the altered workstation appear to come from the impersonated workstation. (3) A user may eavesdrop on exchanges and use a replay attack to gain entrance to a server or to disrupt operations. In any of these cases, an unauthorized user may be able to gain access to services and or data that s/he is not authorized to access.

5 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Kerberos: Background Background [2]: (1) Authentication Service developed as part of Project Athena at MIT. Overcomes the aforementioned Security Concerns. (2) Named after Kerberos – In Greek Mythology, the three headed guard dog of Hades. (3) Rather than building in elaborate authentication protocols at each server (which is exponentially expensive (labor/costs)), Kerberos provides a centralized authentication server that functions as a broker between users and servers. KERBEROS

6 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Kerberos: Basics Basics [3]: Provides a centralized authentication server (AS) to authenticate users to servers and servers to users. Relies on conventional encryption, making no use of public-key encryption Two versions: version 4 and 5 Version 4 makes use of DES

7 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Kerberos: Terms Terms [2]: C = Client AS = Authentication server V = Server IDc = identifier of user on C IDv = identifier of V P c = password of user on C ADc = network address of C Kv = secret encryption key shared by AS an V TS = timestamp || = concatenation

8 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Simple Dialogue: Steps Steps [2]: (1) User logs into workstation and requests access to Server (V). (2) Client module (C) in the workstation requests the users password and then sends a message to the Authentication Server (AS) that includes the users ID, the servers ID, and the users password. (3) AS checks its database for proper authentication, and whether user has authorization to access Server (V). (4) If both tests are passed, the AS accepts the user as authentic and must now convince the the Server (V) that the user is authentic. (4.1) AS creates ticket that includes users ID and network address and the servers ID. Ticket is encrypted and share and the key is shared by AS and V. (4.2) Encrypted ticket is sent back to Client (C) (5) With the newly generated ticket, the C can now apply to V for service by sending a message to V containing the Cs ID an the ticket.

9 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Simple Dialogue: Steps (Cont) Steps [2]: (6) With the ticket, the C can now apply to V for service by sending a message to V containing the Cs ID and the ticket. (6.1) V decrypts the ticket and verifies that the user ID in the ticket is the same as the unencrypted user ID in the message. (6.2) If the two match, the server considers the user authenticate and grants the requested service. (7) Simply stated: (6.1)C AS: IDc || P c || IDv (6.2)AS C:Ticket (6.3)C V:IDc || Ticket

10 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Version 4 Dialogue Examples Authentication Service Exhange: To obtain Ticket-Granting Ticket [3] (1) C AS:IDc || IDtgs ||TS1 (2) AS C: E Kc [K c,tgs || IDtgs || TS 2 || Lifetime 2 || Tickettgs] Ticket-Granting Service Exchange: To obtain Service-Granting Ticket [3] (3) C TGS: IDv ||Ticket tgs ||Authenticatorc (4) TGS C: E Kc [K c,¨v || IDv || TS 4 || Ticketv] Client/Server Authentication Exhange: To Obtain Service ((5) C V: Ticket v || Authenticatorc (6) V C: EKc,v[TS5 +1]

11 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Kerberos: Pictorial

12 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Version 4 Problems Problems [3]: Lifetime associated with the ticket-granting ticket If to short repeatedly asked for password If to long greater opportunity to replay The threat is that an opponent will steal the ticket and use it before it expires

13 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Version 5 Realms Realms [2]: (1) A full-service Kerberos environment consisting of a Kerberos server, a number of clients, and a number of application servers. (2) User Ids and hashed passwords are store at each Kerberos server. (3) Authenticated users can access services across realms. KERBEROS

14 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Kerberos in Practice In Practice [3]: Currently, two Kerberos versions: -V4 : Restricted to a single realm -V5 : Allows inter-realm authentication and is an Internet standard To use Kerberos [3]: Need to have a KDC on your network Need to have Kerberized apps running on all participating systems Major problem - US export restrictions. Cannot be directly distributed outside the US in source format (& binary versions must obscure cryptographic routine entry points and have no encryption)

15 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only [1] Pfleeger, Charles. Security In Computing, Prentice Hall, Chapter 6. [2] Stallings, William. Cryptography and Network Security, Prentice Hall, Chapter 11. [3] Johnson, Hedric. Authentication Applications. Blekinge Institute of Technology,Sweden. Lecture based on Stallings, William. Cryptography and Network Security, Prentice Hall, Chapter 11. Resources