Network Security Lecture 25 Presented by: Dr. Munam Ali Shah.

Slides:



Advertisements
Similar presentations
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.6 Kerberos.
Advertisements

Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi
Authentication Applications Kerberos And X.509. Kerberos Motivation –Secure against eavesdropping –Reliable – distributed architecture –Transparent –
Authentication Applications
1 Authentication Applications Ola Flygt Växjö University, Sweden
Chapter 14 – Authentication Applications
NETWORK SECURITY.
Kerberos and X.509 Fourth Edition by William Stallings
CSCE 815 Network Security Lecture 10 KerberosX.509 February 13, 2003.
IT 221: Introduction to Information Security Principles Lecture 8:Authentication Applications For Educational Purposes Only Revised: October 20, 2002.
Authentication Applications The Kerberos Protocol Standard
SCSC 455 Computer Security
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
PIS: Unit III Digital Signature & Authentication Sanjay Rawat PIS Unit 3 Digital Sign Auth Sanjay Rawat1 Based on the slides of Lawrie.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Authentication Applications We cannot enter into alliance with neighbouring princes until we are acquainted with their designs. —The Art of War, Sun Tzu.
Network Security Essentials Chapter 4
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 23: Internet Authentication Applications.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
Winter 2006Prof. R. Aviv: Kerberos1 Kerberos Authentication Systems.
AUTHENTICATION APPLICATIONS - Chapter 14 Kerberos X.509 Directory Authentication (S/MIME)
Kerberos versions 4 and 5 X.509 Authentication Service
Lecture 23 Internet Authentication Applications
Authentication & Kerberos
CSCE 815 Network Security Lecture 9 Digital Signatures & Authentication Applications Kerberos February 13, 2003.
1 Authentication Applications Digital Signatures Security Concerns X.509 Authentication Service Kerberos Based on slides by Dr. Lawrie Brown of the Australian.
Henric Johnson1 Chapter 4 Authentication Applications Henric Johnson Blekinge Institute of Technology,Sweden
1 Authentication Applications Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW.
Authentication Applications
Authentication applications
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Information Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Authentication Applications Unit 6. Kerberos In Greek and Roman mythology, is a multi-headed (usually three-headed) dog, or "hellhound” with a serpent's.
1 Authentication Applications Behzad Akbari Fall 2010 In the Name of the Most High.
Chapter 21 Distributed System Security Copyright © 2008.
Network Security Lecture 23 Presented by: Dr. Munam Ali Shah.
Cryptography and Network Security Chapter 14 Authentication Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed and extended by.
Network Security Essentials Chapter 4 Fourth Edition by William Stallings (Based on lecture slides by Lawrie Brown.
Authentication 3: On The Internet. 2 Readings URL attacks
Module 4 Network & Application Security: Kerberos – X509 Authentication service – IP security Architecture – Secure socket layer – Electronic mail security.
KERBEROS. Introduction trusted key server system from MIT.Part of project Athena (MIT).Developed in mid 1980s. provides centralised private-key third-party.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
31/03/2005Authentication Applications 1 Authentication Applications: Kerberos, X.509 and Certificates REYHAN AYDOĞAN.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
AUTHENTICATION APPLICATIONS - Chapter 14 Kerberos X.509 Directory Authentication (S/MIME)
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Dr. Nermi hamza.  A user may gain access to a particular workstation and pretend to be another user operating from that workstation.  A user may eavesdrop.
Cryptography and Network Security Chapter 14
Chapter 14. Authentication Applications
Chapter 14 – Authentication Applications
Cryptography and Network Security
KERBEROS.
Authentication Applications
Cryptography and Network Security Chapter 14
Cryptography and Network Security Chapter 14
Cryptography and Network Security Chapter 14
Kerberos and X.509 Fourth Edition by William Stallings
Cryptography and Network Security Chapter 14
Authentication Applications
Presentation transcript:

Network Security Lecture 25 Presented by: Dr. Munam Ali Shah

Part – 2 (e): Incorporating security in other parts of the network

Summary of the Previous Lecture In previous lecture we explored talked about Needham- Schroeder Protocol and will see how does it work Digital Signature Standard (DSS) and Digital Signature Algorithm (DSA) were discussed We briefly talked about authentication applications And studied Kerberos (which is an authentication service)

Outlines of today’s lecture We will continue our discussion on Authentication Applications and more precisely we will talk about Kerberos in detail Kerberos versions, threats and vulnerabilities will also be discussed

Objectives You would be able to present an understanding Authentication Application. You would be able demonstrate knowledge about Kerberos and how it could be deployed in the network to achieve secuirty

Authentication Applications 1.Kerberos 2.X.509

Kerberos Authentication service developed at MIT Uses trusted key server system Provides centralised private-key third-party authentication in a distributed network allows users access to services distributed through network without needing to trust all workstations rather all trust a central authentication server two versions in use: 4 & 5

Threat in distributed environment A user gain access to a workstation and pretend to be another user from that workstation alter the network addr. of workstation, so that request sent will be appear from impersonate system may evasdrop on exchanges and use the replay attack to gain entrance to the server or to disrupt the operations Authentication at each server ?? Kerberos is used to authenticate user to servers and servers to users

Three approaches for security Rely on client workstation to ensure the identity of its users and rely on each server to enforce a security policy based on user id. Require the client system to authentication themselves to servers, but trust the client system concerning the id of users. Require the user to prove its id for each service invoked. Also require that servers prove their id to clients

Kerberos Requirements Its first report identified requirements as: Secure: opponent should not be able to get information to impersonate a user Reliable: should be reliable and provides a distributed server architecture Transparent: ideally user should not be aware of authentication service Scalable: system should be capable of supporting large number of clients

Kerberos Requirements Kerberos server must have UserID and hashed password of all the users in its database All server share a secret key with Kerberos server

Kerberos v4 Dialogue 1. obtain ticket granting ticket from AS once per session 2. obtain service granting ticket from TGS for each distinct service required 3. client/server exchange to obtain service on every service request

Kerberos v4 A simple authentication Dialogue 1. C  AS : ID C ||P C ||ID V 2. AS  C : Ticket 3. C  V : ID C ||Ticket Ticket = E(K v, [ID C ||AD C ||ID V ]) An opponent could capture the ticket and transmit it from different workstation, the AD (network address) is use to cop this problem Two problem needs to be address – Minimize the No. of time user enter a password – Avoid plaintext transmission of password

Vulnerabilities 1. Life time associate with ticket-granting ticket small lifetime : user need to enter password repeatedly long lifetime : opponent has great opportunity for reply opponent copy the ticket granting ticket waits for the legitimate user to logout forge the legitimate user network address and send message of step 3 to the TGS A network service (TGS) must be able to prove that the person using a ticket is the same person to whom that ticket was issued 2. Server to authenticate themselves to users false server would be in position to act as a real server and capture any information from the user

15 Kerberos Overview

Kerberos v4 Message Exchanges Authentication Service Exchange to obtain ticket- granting ticket The problem of captured ticket-granting tickets and the need to determine that the ticket presenter is the same as the client for whom the ticket was issued To get around this problem, the AS provide both the client and the TGS with a secret piece of information (K c,tgs ) in a secure manner The client can prove its identity to the TGS by revealing the secret information, again in a secure manner

Cont. Authenticator is used only once and has short lifetime TGS decrypts the ticket with key that it shares with the AS (K tgs ). Ticket indicates that user C has a session key Kc,tgs. The ticket says "Anyone who uses K c,tgs must be C.“ The TGS uses the session key K c,tgs to decrypt the authenticator C has a reusable service-granting ticket for V.

Rationale for the Elements of the Kerberos v4 Protocol Message (1) Client requests ticket-granting ticket IDC:Tells AS identity of user from this client IDtgs:Tells AS that user requests access to TGS TS1: Allows AS to verify that client's clock is synchronized with that of AS Message (2) AS returns ticket-granting ticket Kc:Encryption is based on user's password, enabling AS and client to verify password, and protecting contents of message (2) Kc,tgs: session key accessible AS to permit secure exchange between client and TGS IDtgs: Confirms that this ticket is for the TGS TS2: Informs client of time this ticket was issued Lifetime2: Informs client of the lifetime of this ticket Tickettgs: Ticket to be used by client to access TGS

Kerberos Realms A Kerberos environment consists of:  a Kerberos server  a number of clients, all registered with server  application servers, sharing keys with server this is termed a realm typically a single administrative domain if have multiple realms,  Kerberos servers must have the user ID and hashed passwords of all participating users in its database.  The Kerberos server must share a secret key with each server  The Kerberos server in each interoperating realm shares a secret key with the server in the other realm. The two Kerberos servers are registered with each other

Kerberos Realms

Kerberos Version 5 Provides improvements over v4 addresses environmental shortcomings  Encryption Algo: v4 uses DES, v5 uses any encryption technique  Internet protocol: v4 uese IP address, v5 allows any addr. types  Message byte order: v4 user define, v5 uses (Abstract Syntax Notation) ASN.1 & Basic Encoding Rules (BER)  Ticket lifetime: v4 uses 8 bits (unit of 5 min) 2 8 *5 = 1280 min  v5 includes start time and end time explicitly  Authentication forwarding: v5 allows a client to issue a request to print server that then accesses the client’s file from a file server  Interrealm auth: v4 requires on order of N 2 kerberos to kerberos relationships, v5 requires fewer relationships

X.509 Authentication Service X.509 certificates are widely used X.509 certificate associates public key with its user defines framework for authentication services directory may store public-key certificates with public key of user signed by certification authority uses public-key crypto & digital signatures algorithms not standardised, but RSA recommended

X.509 Certificates Issued by a Certification Authority (CA), containing: version (1, 2, or 3) : serial number (unique within CA) identifying certificate: signature algorithm identifier: issuer X.500 name (CA): period of validity (from - to dates)

X.509 Certificates subject X.500 name (name of owner): subject public-key info (algorithm, parameters, key) : issuer unique identifier (v2+): subject unique identifier (v2+) extension fields (v3) signature (of hash of all fields in certificate):

Obtaining a Certificate Any user with access to the public key CA can get any certificate from it Only the CA can modify a certificate Because cannot be forged, certificates can be placed in a public directory

CA Hierarchy If both users share a common CA then they are assumed to know its public key Otherwise CA's must form a hierarchy Each client trusts parents certificates Enable verification of any certificate from one CA by users of all other CAs in hierarchy

Certificate Revocation Certificates have a period of validity May need to revoke before expiry, eg: 1. user's private key is compromised 2. user is no longer certified by this CA 3. CA's certificate is compromised CA’s maintain list of revoked certificates the Certificate Revocation List (CRL) Users should check certificates with CA’s CRL

Authentication Procedures X.509 includes three alternative (all use public-key signatures) authentication procedures: One-Way Authentication Two-Way Authentication Three-Way Authentication Assumed that two parties know each other's public key, through certificates or directory

One-Way Authentication One message ( A->B) used to establish 1. the identity of A and that message is from A 2. message was intended for B 3. integrity & originality of message Message must include timestamp, nonce, B's identity and is signed by A Only identity of initiator is verified may include additional info for B e.g. session key

Two-Way Authentication Two messages (A->B, B->A) which also establishes in addition: 4. the identity of B and that reply is from B 5. that reply is intended for A 6. integrity & originality of reply reply includes original nonce from A, also timestamp and nonce from B may include additional info for A 30

Three-Way Authentication Three messages (A->B, B->A, A->B) which enables above authentication without synchronized clocks a final message from A to B is included, which contains a signed copy of the nonce r B means that timestamps need not be checked or relied upon 31

Summary In today’s we talked about Kerberos as an authentication application. Its different versions were also discussed. We talked about one way, two way, and three way authentication in X.509 We also glanced how certificates are issued by CA.

Next lecture topics Our discussion on more interesting topics on incorporating security in networks will continue.

The End