Specifying Kerberos 5 Cross-Realm Authentication Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, and Chris Walstad Supported by ONR, NSF, NRL.

Slides:



Advertisements
Similar presentations
Kerberos Authentication. Kerberos Requires shared secret with KDC ( perhaps not for PKINIT) Shared session key established Time synchronization needed.
Advertisements

Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.6 Kerberos.
AUTHENTICATION AND KEY DISTRIBUTION
CMSC 414 Computer (and Network) Security Lecture 22 Jonathan Katz.
Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi
Authentication Applications Kerberos And X.509. Kerberos Motivation –Secure against eavesdropping –Reliable – distributed architecture –Transparent –
Security Protocols Sathish Vadhiyar Sources / Credits: Kerberos web pages and documents contained / pointed.
Efficient Kerberized Multicast Olga Kornievskaia University of Michigan Giovanni Di Crescenzo Telcordia Technologies.
1 Authentication Applications Ola Flygt Växjö University, Sweden
Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
Chapter 14 – Authentication Applications
KERBEROS
Authentication Applications The Kerberos Protocol Standard
SCSC 455 Computer Security
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Akshat Sharma Samarth Shah
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Network Security Essentials Chapter 4
Deeper Security Analysis of Web-based Identity Federation Apurva Kumar IBM Research – India.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Analyzing the Performance of Authentication Protocols 1 A Methodology for Analyzing the performance of Authentication Protocols Alan Harbitter Daniel A.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
The Kerberos Authentication System Brad Karp UCL Computer Science CS GZ03 / M th November, 2008.
Winter 2006Prof. R. Aviv: Kerberos1 Kerberos Authentication Systems.
AUTHENTICATION APPLICATIONS - Chapter 14 Kerberos X.509 Directory Authentication (S/MIME)
1 Lecture 12: Kerberos terms and configuration phases –logging to network –accessing remote server replicated KDC multiple realms message privacy and integrity.
Authentication & Kerberos
Cryptography and Network Security Chapter 15 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Authentication Applications Digital Signatures Security Concerns X.509 Authentication Service Kerberos Based on slides by Dr. Lawrie Brown of the Australian.
1 Authentication Applications Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW.
Recitation Introduction to Computer and Network Security Iliano Cervesato 18 September 2008 – Breaking and Fixing Public-Key Kerberos Joint work.
Kerberos: A Network Authentication Tool Seth Orr University of Missouri – St. Louis CS 5780 System Administration.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 24 Jonathan Katz.
Proof Methods for an MSR Analysis of Kerberos 5 Frederick Butler, Iliano Cervesato, Aaron D. Jaggard, and Andre Scedrov Supported by ONR URI.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
KerberSim CMPT 495 Fall 2004 Jerry Frederick. Project Goals Become familiar with Kerberos flow Create a simple Kerberos simulation.
Introduction to Kerberos Kerberos and Domain Authentication.
Information Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
Computationally Sound Mechanized Proofs of Basic and Public-key Kerberos FormaCrypt meeting, Nov. 30, 2007 B. Blanchet 1, A. D. Jaggard 2, A. Scedrov 3,
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Netprog: Kerberos1 KERBEROS. Contents: Introduction History Components Authentication Process Strengths Weaknesses and Solutions Applications References.
Authentication Applications Unit 6. Kerberos In Greek and Roman mythology, is a multi-headed (usually three-headed) dog, or "hellhound” with a serpent's.
Cryptography and Network Security Chapter 14 Authentication Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed and extended by.
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
Protocol Analysis: The SPYCE Perspective Joe Halpern.
Kerberos. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open source or in supported commercial software.
Key Management. Given a computer network with n hosts, for each host to be able to communicate with any other host would seem to require as many as n*(n-1)
Lecture 5.2: Key Distribution: Private Key Setting CS 436/636/736 Spring 2012 Nitesh Saxena.
Cerberus (from Kerberos, demon of the pit): Monstrous three-headed dog (sometimes said to have fifty or one- hundred heads), (sometimes) with a snake for.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Kerberos Guilin Wang School of Computer Science 03 Dec
ICOS BOF EAP Applicability Bernard Aboba IETF 62, Minneapolis, MN.
AUTHENTICATION APPLICATIONS - Chapter 14 Kerberos X.509 Directory Authentication (S/MIME)
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
KERBEROS SYSTEM Kumar Madugula.
1 SUBMITTED BY- PATEL KUMAR C.S.E(8 th - sem). SUBMITTED TO- Mr. DESHRAJ AHIRWAR.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
Kerberos Miha Pihler MVP – Enterprise Security Microsoft Certified Master | Exchange 2010.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Kerberos is a three-headed dog Available as open source or in supported.
Dr. Nermi hamza.  A user may gain access to a particular workstation and pretend to be another user operating from that workstation.  A user may eavesdrop.
1 Cryptography CSS 329 Lecture 12: Kerberos. 2 Lecture Outline Kerberos - Overview - V4 - V5.
Cryptography and Network Security
Authentication Applications
CS60002: Distributed Systems
Presentation transcript:

Specifying Kerberos 5 Cross-Realm Authentication Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, and Chris Walstad Supported by ONR, NSF, NRL

Outline ● Introduction ● Kerberos 5 ● Formalization ● Properties ● Vulnerabilities

Overview of Results ● Formalize cross-realm authentication in Kerberos 5 Use MSR ● Adapt Dolev-Yao intruder to cross-realm setting ● Prove property of a critical field in cross-realm ticket ● Highlight vulnerabilities in the presence of compromised intermediate realms Kerberos specifications disclaim responsibility for these

Background and Related Work ● Kerberos – intra-realm has been extensively studied Kerberos 4 analyzed using inductive approach (Bella & Paulson) Kerberos 5 Simplified version analysed with Murφ (Mitchell, Mitchell, & Stern) Detailed formalization of intra-realm authentication analyzed using MSR (Butler, Cervesato, Jaggard, Scedrov) Current project is a continuation of this work ● Cross-realm authentication Hierarchical organization of authentication servers (Birrell et al.) Similar to natural organization for Kerberos Define local trust policies that mitigate global security exposure (Gligor et al.)

Kerberos 5 ● Authentication Single sign-on Repeatedly authenticate a client to multiple servers ● Authentication Server (KAS) Provides long term (e.g., 1 day) ticket called a Ticket Granting Ticket (TGT) Uses client's long term key (e.g., derived from password) ● Ticket Granting Server (TGS) Provides short term (e.g., 5 minutes) ticket called Service Ticket (ST) based on client's TGT Client uses ST to access the server 5

Intra-Realm Messages Client (C)KAS TGS (T) Server (S) Want to use T Credentials (TGT) Want to use S; here is TGT Credentials to use S (ST) Want to use S; here is ST OK Application Messages

Cross-Realm Kerberos 5 ● Authenticate clients across organizational boundaries Simpler administration Better user experience UPENN.EDU CIS.UPENN.EDU MATH.UPENN.EDU Realm KDCClients Servers

Cross-Realm Kerberos 5 ● Register KDC of foreign realm as a server in local realm Cross-realm key Service ticket for foreign KDC is interpreted as a TGT Client KDC 1 KDC 2 Server 2 Local Realm Foreign Realm Server 1 Cross-realm key Want S 2 ST for S 1 =TGT K 2 ST for S 2

Cross-Realm Messages C KDC 1 R1R1 R2R2 R n-1 RnRn KDC 2 KDC n-1 KDC n S... IR ST 1 =TGT 2 ST 2 =TGT 3 ST n-2 =TGT n-1... ST n-1 =TGT n ST n Application Messages

Cross-Realm Kerberos 5 ● Recommended organization of realms is hierarchical “Shortcuts” allowed ● Authentication path is path through traversed realms TGS adds previous realm name to TRANSITED field

Formalization ● Use MSR 2.0 (Cervesato) ● Models both intra- and cross-realm authentication Is a continuation of prior work done on intra-realm authentication ● Includes the minimum level of detail we believe necessary to prove properties on authentication, confidentiality, and the effect of compromised realms ● Validation using MSR implementation developed by Cervesato, Reich, and Stehr underway

Formalization ● Realm type Each principal is parameterized by realm it lives in ● Database keys modified to handle cross-realm keys ● rTGS allows us to view this principal as an application server in one realm and a TGS in another realm ● Support for TRANSITED field ● Rule for TGS returning a cross-realm ticket ● Existing rules and types updated

Intruder Model ● Intra-realm setting: unavoidable assumption is that the KAS and TGS behave honestly ● Cross-realm setting: must consider compromised remote KDC Local system administrator has no control over other realms How can a compromised remote KDC affect the rest of the Kerberized network? ● If a realm is compromised then the intruder possesses all of the database (long-term) keys ● Assume a worst-case scenario in which all principals communicate on the same network

Theorem ● If there are any compromised realms involved in authentication then at least one of them will appear in the TRANSITED field ● If invalid/improper authentication took place then the intruder possessed one of the following keys The client's long-term secret key A cross-realm key for some pair of TGSs on the authentication path The key shared by the end-server and the TGS of that realm C KDC 1 KDC n S... KDC i KDC i+1

Proof Methods ● Rank and corank functions Inspired by Schneider's rank functions in CSP k-Rank - work done using key k (data origin authentication) E-Corank - work needed using keys from E (secrecy) ● Valid credential presented to S has positive rank No MSR facts of positive rank at start of protocol run Examine principal and intruder rules Which keys must be lost to allow intruder to increase rank? Which honest principals can increase this rank?

Proof Outline ● S sees a valid request (a fact with positive rank) ● If honest principal created this fact, he did so after seeing a fact of (a different) positive rank Every honest TGS adds name of preceding realm ● If intruder created this fact, then the key used has been lost to the intruder ● Chain this argument backwards (reaching a fact created by the intruder or C's initial request---no facts of positive rank initially, so this process must stop) If intruder created some fact in the chain, then some key has been lost; the compromised realm is named in the request If the intruder did not, then exactly the transited realms appear in the transited field

Vulnerabilities ● Kerberos specifications make no guarantees if a trusted foreign realm becomes compromised Therefore these vulnerabilities are not attacks and the specification disclaims responsibility for them ● System administrators should be made aware of exactly what damage can be done by a compromised foreign realm ● Identified 3 vulnerabilities There may be more

Vulnerability 1 ● All TGSs on the authentication path are capable of learning the key shared between the server and the client as well as all of the session keys shared by the client and each TGS on the authentication path C KDC n S KDC i KDC i+1 Session keys...

Vulnerability 2 ● Remote TGS can impersonate a client anywhere outside of the client's realm C TGS i TGS i+1... S I'm C, here is cross-realm ticket TGS i gave me OK, here is cross-realm ticket for TGS i+2 I'm,C here is service ticket TGS n gave me TGS n OK C ?

Vulnerability 3 ● If there is a compromised KDC on the authentication path then that KDC can trick the client into believing she is following a false authentication path C KDC i Knows session keys KDC b1... KDC bn C believes Auth. Path = KDC 1,..., KDC n Actual Auth. Path = KDC 1,..., KDC i, KDC b1,..., KDC bn

Conclusions ● Formalized cross-realm authentication in Kerberos 5 ● Extended Dolev-Yao intruder ● Characterized minimum requirements in view of assessing confidentiality and authentication properties ● Documented a range of harmful behaviors

Future Work ● Prove traditional confidentiality and authentication properties ● Analyze PKINIT and PKCROSS subprotocols that may help mitigate the harm that a compromised KDC can inflict

Sample Rule  X: msg  T: TGS R T  T n : ts R n  AK : shK C T  t C : time if Auth C (X,T,AK), DesiredHop(C,T n,R T,R n ),clock C (t C ).   n 2 : nonce N(X,{C,t C } AK,C,T n,n 2 ) L(C,T n,T,AK,n 2 ) ● This is part of the client's role in TGS exchange  C: client R C

Intruder Model ● Assume a worst-case scenario in which all principals communicate on the same network ● Single Dolev-Yao intruder that can impersonate clients, end-servers, and KDCs  R : realm  P : tcs R  k : dbK R P  I(k). if compromised(R)