Single Sign-on with Kerberos 1 Chris Eberle Ryan Thomas RC Johnson Kim-Lan Tran CS-591 Fall 2008.

Slides:



Advertisements
Similar presentations
KERBEROS A NETWORK AUTHENTICATION PROTOCOL Nick Parker CS372 Computer Networks.
Advertisements

Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
Kerberized Credential Translation Olga Kornievskaia Peter Honeyman Bill Doster Kevin Coffman Center for Information Technology Integration University of.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
Chapter 9 Deploying IIS and Active Directory Certificate Services
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Secure Shell – SSH Tam Ngo Steve Licking cs265. Overview Introduction Brief History and Background of SSH Differences between SSH-1 and SSH- 2 Brief Overview.
Chapter 7 HARDENING SERVERS.
NIS Consistent configuration across the network. Why NIS? Primary reason is to provide same user configuration across the network Users go any machine.
14.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Apache : Installation, Configuration, Basic Security Presented by, Sandeep K Thopucherela, ECE Department.
APACHE SERVER By Innovationframes.com »
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
TAM STE Series 2008 © 2008 IBM Corporation WebSEAL SSO, Session 108/2008 TAM STE Series WebSEAL SSO, Session 1 Presented by: Andrew Quap.
Ins and Outs of Authenticating Users Requests to IIS 6.0 and ASP.NET Chris Adams Program Manager IIS Product Unit Microsoft Corporation.
1 SAMBA. 2 Module - SAMBA ♦ Overview The presence of diverse machines in the network environment is natural. So their interoperability is critical. This.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Chapter 7: Using Windows Servers to Share Information.
Overview: Identify the Internet protocols and standards Identify common vulnerabilities and countermeasures Identify specific IIS/WWW/FTP concerns Identify.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Securing Microsoft® Exchange Server 2010
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Copyright ®xSpring Pte Ltd, All rights reserved Versions DateVersionDescriptionAuthor May First version. Modified from Enterprise edition.NBL.
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
SSH and SSL CIT304 University of Sunderland Harry R. Erwin, PhD.
Course ILT Internet/intranet support Unit objectives Use the Internet Information Services snap-in to manage IIS, Web sites, virtual directories, and WebDAV.
1 Apache and Virtual Sites and SSL Dorcas Muthoni.
Postfix Mail Server Postfix is used frequently and handle thousands of messages. compatible with sendmail at command level. high performance program easier-
Simplify and Strengthen Security with Oracle Application Server Allan L Haensgen Senior Principal Instructor Oracle Corporation Session id:
Module 4 Planning and Deploying Client Access Services in Microsoft® Exchange Server 2010 Presentation: 120 minutes Lab: 90 minutes After completing.
TWSd - Security Workshop Part I of III T302 Tuesday, 4/20/2010 TWS Distributed & Mainframe User Education April 18-21, 2010  Carefree Resort  Carefree,
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
1 Electronic Messaging Module - Electronic Messaging ♦ Overview Electronic messaging helps you exchange messages with other computer users anywhere in.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Linux Networking Security Sunil Manhapra & Ling Wang Project Report for CS691X July 15, 1998.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
1 Linux Networking and Security Chapter 5. 2 Configuring File Sharing Services Configure an FTP server for anonymous or regular users Set up NFS file.
Security, Accounting, and Assurance Mahdi N. Bojnordi 2004
Kerberos By Robert Smithers. History of Kerberos Kerberos was created at MIT, and was named after the 3 headed guard dog of Hades in Greek mythology Cerberus.
Internet Services.  Basically, an Internet Service can be defined as any service that can be accessed through TCP/IP based networks, whether an internal.
1 Kerberos – Private Key System Ahmad Ibrahim. History Cerberus, the hound of Hades, (Kerberos in Greek) Developed at MIT in the mid 1980s Available as.
Linux Services Configuration
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Advanced Authentication Campus-Booster ID: Copyright © SUPINFO. All rights reserved Kerberos.
SECURE SHELL MONIKA GUPTA COT OUTLINE What is SSH ? What is SSH ? History History Functions of Secure Shell ? Functions of Secure Shell ? Elements.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
1 Example security systems n Kerberos n Secure shell.
Windows interoperability with Unix/Linux
File System Implementation
Chapter 5 : Designing Windows Server-Level Security Processes
Jim Fawcett CSE686 – Internet Programming Summer 2005
Radius, LDAP, Radius used in Authenticating Users
Single Sign-on with Kerberos
Configuring Internet-related services
APACHE WEB SERVER.
Presentation transcript:

Single Sign-on with Kerberos 1 Chris Eberle Ryan Thomas RC Johnson Kim-Lan Tran CS-591 Fall 2008

Introduction: Services Example of network services ▫ ▫Shell Accounts ▫Websites Each traditionally responsible for authenticating users ▫Duplicate user information LDAP solves duplication problem by acting as directory service ▫User must still authenticate each time service is accessed 2

Single Sign-on Motivation ▫Gets rid of constant password prompts ▫System administrator manages one group of users instead of several groups for different services ▫User only has one password to remember 3 Technique used to validate user's identity only once and give secure access to all network services

Project Outline Setup Kerberos ▫Popular mechanism used to achieve single sign-on Setup 3 virtual machines on a network Setup various network services ▫SSH ▫FTP ▫NFS ▫Mail 4

LDAP Overview Lightweight Directory Access Protocol Stores information about users, groups, DNS, or any database utilizing service Can add, modify, and query for information 5

LDAP Choice Chose OpenLDAP ▫Created in 1998 ▫Loosely based on LDAP server at University of Michigan ▫Uses insecure communication mechanism ▫“One of the team members may have killed himself if we used a proprietary implementation” Other LDAP choices ▫Active Directory by Microsoft ▫Open Directory by Novell ▫Red Hat Directory Server by Red Hat 6

SSL Overview Secure Socket Layer Protocol used to ensure that data transferred over networks are encrypted ▫Prevents tampering and eavesdropping Use OpenSSL ▫Implements SSL and newer protocol TLS (Transport Layer Security) ‏ 7

Kerberos Overview Way to securely prove one's identity over network Open source application developed by MIT Made up of two parts ▫Authentication server ▫Ticket granting server Ticket is granted after user authenticated ▫Use symmetric key cryptography ▫Expires after period of time User presents ticket to service ▫Service authenticates user without prompting for password 8

Kerberos Diagram 9

Project Design 10 3 Virtual Machines named Kenny, Cartman, and Stan Cartman (Debian Lenny)‏  Central server  LDAP, Kerberos, NTPserver Stan (Debian Lenny)‏  Secondary server  Mail, NFS, FTP Kenny (Ubuntu 8.04)‏  Client All three run SSH servers Kenny and Cartman mount Stan's NFS share Does not accept RSA or DSA keys in SSH Mail client on Kenny does not store passwords

LDAP Setup Serves as base for user information Used BDB database for backend Challenge to find different configuration files on Debian and Ubuntu Tell name services to use LDAP Configure PAM (Pluggable Authentication Modules) to authenticate against LDAP Removed all local accounts from machines 11

SSL Setup Generate certificates Problems with pointing to correct certificates ▫Needed to fix configuration files Problems with nomenclature ▫References to ldaps or StartTLS protocols Changed configuration from ldaps to ldap and enabled StartTLS 12

Kerberos Setup Create and initialize realm Create principles for all hosts, users, and services Change PAM from using LDAP to Kerberos LDAP still needed for other reasons Install Kerberos keys into the key stores of all clients All machines must have the correct date and time ▫Validate session for ticket 13 Example principles:

Kerberos (contd) ‏ User authentication handled by Kerberos, but user information (user id, groups, shell, home directory, etc) still handled by LDAP. Users must recreate their password, so migrating from LDAP on a large network may not be feasible. 14

SSH Setup Modify the SSH Server configuration to accept GSSAPI (Kerberos) credentials GSSAPIAuthentication yes GSSAPICleanupCredentials yes GssapiKeyExchange yes AllowTcpForwarding yes Modify the SSH Client configuration to send GSSAPI credentials when connecting GSSAPIAuthentication yes GSSAPIDelegateCredentials yes Users only need to log in once to SSH anywhere, or use any other Kerberos services. 15

FTP Setup Setup FTP on Stan Needed package “krb5-ftpd” ▫“Kerberized” version of FTP Problem in not realizing that server daemon, inetd, wasn't installed ▫Manages services by mapping them to a specific ports and launches correct services Used “krb-ftp” command on Kenny to test FTP ▫Came with the”krb-client” package 16

NFS Setup NFSv4 Setup Server ▫Added principles to Kerberos ▫Modified exports file ▫Ensure RPC services were starting correctly (idmap) ‏ Setup Client ▫RPC services (idmap) ‏ ▫Import Kerberos Keys ▫Recreated key files on all machines ▫Verified permissions and mount points ▫Setup to automatically mount home directories 17

IMAP Server Set up dovecot (popular IMAP server) with secure SSL extensions on Stan. Kerberos used for authentication, regular password authentication disabled LDAP used for user information (e.g. path to their mail directories) ‏ Set up a quick-n-dirty postfix install to allow delivery of mail (no Kerberos though) ‏ 18

IMAP Client Used thunderbird on Kenny as IMAP client Must tell thunderbird to use Kerberos ▫Option is “Use secure authentication” (different than SSL/TSL) ‏ Client can receive after logging in to the desktop without being asked for a password. Bonus: Thunderbird doesn’t have to store your password anywhere, so it’s more secure. 19

Future Directions Add firewall security Add more services such as Apache Add multiple platforms Add security to SMTP 20

References Debian ( ‏ Ubuntu (ubuntuforums.org) ‏ en.gentoo-wiki.com Chris 21