VKSF 423 System Administration III Authentication Kerberos.

Slides:



Advertisements
Similar presentations
Kerberos: An Authentication Service for Open Network Systems Jennifer G. Steiner, Clifford Neuman, and Jeffrey I. Schiller Massachusetts Institute of Technology.
Advertisements

Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi
Chapter 10 Real world security protocols
Security Protocols Sathish Vadhiyar Sources / Credits: Kerberos web pages and documents contained / pointed.
Chapter 14 – Authentication Applications
Authentication Applications The Kerberos Protocol Standard
SCSC 455 Computer Security
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Kerberos Part 2 CNS 4650 Fall 2004 Rev. 2. PARC Once Again Once again XEROX PARC helped develop the basis for wide spread technology Needham-Schroeder.
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
The Kerberos Authentication System Brad Karp UCL Computer Science CS GZ03 / M th November, 2008.
AUTHENTICATION APPLICATIONS - Chapter 14 Kerberos X.509 Directory Authentication (S/MIME)
Authentication & Kerberos
Kerberos Jean-Anne Fitzpatrick Jennifer English. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open.
1 Authentication Applications Digital Signatures Security Concerns X.509 Authentication Service Kerberos Based on slides by Dr. Lawrie Brown of the Australian.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Kerberos: An Authentication Service for Open Network Systems Jennifer G. Steiner Clifford Neuman Jeffrey I. Schiller.
Unit 1: Protection and Security for Grid Computing Part 2
Authentication Applications Unit 6. Kerberos In Greek and Roman mythology, is a multi-headed (usually three-headed) dog, or "hellhound” with a serpent's.
Chapter 21 Distributed System Security Copyright © 2008.
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
Kerberos. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open source or in supported commercial software.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Lecture 5.2: Key Distribution: Private Key Setting CS 436/636/736 Spring 2012 Nitesh Saxena.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
Kerberos By Robert Smithers. History of Kerberos Kerberos was created at MIT, and was named after the 3 headed guard dog of Hades in Greek mythology Cerberus.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
1 Kerberos – Private Key System Ahmad Ibrahim. History Cerberus, the hound of Hades, (Kerberos in Greek) Developed at MIT in the mid 1980s Available as.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
AUTHENTICATION APPLICATIONS - Chapter 14 Kerberos X.509 Directory Authentication (S/MIME)
1 Kerberos n Part of project Athena (MIT). n Trusted 3rd party authentication scheme. n Assumes that hosts are not trustworthy. n Requires that each client.
VKSF 423 System Administration III Final Review. Announcements Practical Exam Practical Checklist Make appt. with either Mitch or myself by group All.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
1 Authentication Protocols Rocky K. C. Chang 9 March 2007.
KERBEROS SYSTEM Kumar Madugula.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
1 Example security systems n Kerberos n Secure shell.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Authentication.
PPP – Point to Point Protocol
Network Security Unit-VI
Tutorial on Creating Certificates SSH Kerberos
Kerberos: An Authentication Service for Open Network Systems
Network Security – Kerberos
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
Kerberos Part of project Athena (MIT).
CDK: Chapter 7 TvS: Chapter 9
KERBEROS Miah, Md. Saef Ullah.
Computer Security Protection in general purpose Operating Systems
COEN 351 Authentication.
Presentation transcript:

VKSF 423 System Administration III Authentication Kerberos

Announcements Slight modification to the syllabus Office hours Tuesday Thursday 10-12, 2-3 Lab Three: Virtualized Storage Veritas Storage Central OpenAFS LVM or EVMS Dynamic Disks (MS DFS)

Syllabus Modifications Old Component WeightNew Component Due date Labs25%No changeAll sign offs and submission by the end of 10 th week Practical25%No changeDemonstrated before exam week begins Group Presentation 10%In labIn lab approximately 5 minutes Group Report 10%Site BookDue by end of 10 th week Homework10%Group Evaluation How did the individuals contribute to the completion of the labs Final Exam20%No changeDuring the final exam period

Definitions Identification- assertion of who you are Authentication-process of proving one’s identity Authorization-The privileges that accrue to an identity Access control-Provide the correct services to the correct users

Two Types of Authentication User authentication Machine to machine authentication Cryptographic Other (weak)

Identification Who are you? Who do you claim to be? Who are you acting as?

Authentication Can you prove who you say you are? How? Something you know Passwords Something you are Biometrics Something you have Access tokens

Access Control All of the above Allow the correct users Into a system Access to appropriate resources Disallow invalid users Entry to the systems Deny access to restricted resources

Something you Know Passwords Oxymoron: Large random string != easy to remember Password design/assignment Multiple words/syllables Mixed case/digits/punctuation Storage Weak/strong encryption Users perceive the risks as minimal vs. need to get work done

Passwords Myth: never write down a password Recovery Helps more complicated passwords Multiple passwords Clues/questions One time passwords

Something you are Biometrics Voice, retinal, DNA, body geometry, signature, finger prints Hard to change Easy to forge

Something you have Access Tokens Physical keys Smart cards Translators Problems Stolen Duplicated Spoofed

Authentication Protocols Cryptographic methods to authenticate over a network Multiple vulnerabilities

Network Authentication Options Do nothing- trust machine to prevent unauthorized user access (control physical access) Require machine to prove identity to network, then trust machine to authenticate users and provide access control Require identification and authentication at each resource

Authentication Requirements Must be Secure A.k.a. secure enough to push hackers elsewhere Must be reliable Manageable level of false negatives and false positives Transparent to users Scalable to enterprise networks

Simple Protocol Bob enters password on client Client sends password to server Server looks up id and password in database of ids and passwords If it matches, validation message sent to client & Bob is in

Problems with simple scenario Clear text password in database Clear text password in transfer Confirmation spoofing

Password Database Hide Encrypt Salt Multiple serial encryptions

Transfer Hashing Encryption

Confirmation spoofing Simple T/F Alternate hash of password/known key Encryption

Improved Protocol: Challenge Avoid clear text transfer of password Bob informs server of desire to access Server offers a phrase to Bob Bob encrypts phrase with Bob’s password and sends to server Server, who already knows Bob’s password, also encrypts phrase with Bob’s password and compares

Problems with improved version Server needs clear text copy of Bob’s password Given enough instances of a login the original password could be determined

Use of a “Trusted Third Party” The “Blind Date” protocol I don’t know Kathy She doesn’t know me We both know Loretta We both separately contact Loretta Loretta “vouches” for me to Kathy Loretta “vouches” for Kathy to me

Levels of Kerberos Protection Authentication at initiation of network session, assume future messages from same address come from same machine Authentication of each message, no encryption of message Private messages-each message is authenticated and encrypted

Kerberos Modules Applications library Encryption library Database library Database administration programs Administration server Authentication server Db propagation software User programs applications

Kerberos Misc. Model based on Needham and Schroeder key distribution protocol Encryption done with DES Extendable to DES Cypher Block Chaining Database Contains one record/principal Record contains name, private key, expiration date of principal Name-

Kerberos Ticket Used to securely pass the identity of the person to whom the ticket was issued between the authentication server and the end server. Authenticator Contains additional information which when compared against the ticket proves that the client presenting the ticket is the same one to which the ticket was issued.

Kerberos Keeps database of clients and private keys If client is user, key is encrypted password Generates temporary private keys (session keys) Session keys are given to two clients to encrypt messages between them.

Kerberos Ticket Ticket is good for a single server and a single client Contains name of the server Name of the client IP address of the client Timestamp Lifetime Random session key Encrypted using the private key of the server for which the ticket will be used May be used until lifetime expires

Kerberos Authenticator Contains Name of the client Client’s IP address Client’s current time Can only be used once, must be regenerated each time a client wants to use a service Can be regenerated by the client (without going to the server) Encrypted in the session key that is part of the ticket

Enhanced protocol: Kerberos Bob asks K-server to access Mary’s server K-server checks to see if Bob has access permissions K-server sends Bob a ticket and a session key Bob uses session key to create an authenticator to prove to Mary he is Bob Bob send ticket and authenticator to Mary Mary checks both

Main Problem Authentication of user or device given zero prior information Does Kerberos do this?