Download presentation
Presentation is loading. Please wait.
Published byAndre Harlowe Modified over 10 years ago
1
A less formal view of the Kerberos protocol J.-F. Pâris
2
Dramatis personae The client logged on a workstation The client logged on a workstation The Kerberos server The Kerberos server The Ticket Granting Service The Ticket Granting Service A server s the client wants to access A server s the client wants to access
3
The three acts Talk to Kerberos and get a reply Talk to Kerberos and get a reply Talk to TGS and get a reply Talk to TGS and get a reply Talk to server s Talk to server s
4
Act One WS K S TGS Ticket granting service KerberosServer Client c on workstation WS 1
5
Act One Client sends to Kerberos a message Client sends to Kerberos a message Hello! Hello! I am client c I am client c I want a ticket for TGS I want a ticket for TGS
6
Act One WS K S TGS Ticket granting service KerberosServer Client c on workstation WS 2 1
7
Act One Kerberos replies Kerberos replies Here are the ticket and an encrypted session password Kc,tgs Here are the ticket and an encrypted session password Kc,tgs
8
What if the client lied to Kerberos? He still gets the ticket but this ticket is worthless He still gets the ticket but this ticket is worthless Why? Why?
9
What guarantees ticket integrity?
10
How is Kc,tgs encrypted?
11
How is Kc,tgs passed to the TGS?
12
How long is the ticket valid?
13
Why? Kerberos cannot revoke individual tickets Kerberos cannot revoke individual tickets It can only revoke all tickets It can only revoke all tickets
14
Act Two WS K S TGS Ticket granting service KerberosServer Client c on workstation WS 2 1 3
15
Act Two Client sends to TGS Client sends to TGS A request for server s A request for server s The ticket he/she got from Kerberos The ticket he/she got from Kerberos An authenticator encrypted with Kc,tgs and stating An authenticator encrypted with Kc,tgs and stating Who sent the ticket Who sent the ticket From which address From which address At which time At which time
16
Act Two TGS TGS Decrypts ticket using its Ktgs key Decrypts ticket using its Ktgs key Checks that ticket is valid Checks that ticket is valid Extracts session key Kc,tgs from ticket Extracts session key Kc,tgs from ticket Checks that ticket is not a duplicate by looking at timestamp inside authenticator Checks that ticket is not a duplicate by looking at timestamp inside authenticator
17
Detecting duplicates TGS will reject all tickets accompanied with authenticators whose timestamps are TGS will reject all tickets accompanied with authenticators whose timestamps are Too old Too old Same as the timestamp of a recently sent authenticator Same as the timestamp of a recently sent authenticator
18
Act Two WS K S TGS Ticket granting service KerberosServer Client c on workstation WS 2 1 34
19
Act Two TGS replies TGS replies Here is the ticket for server s and an encrypted session password Kc,s Here is the ticket for server s and an encrypted session password Kc,s
20
What guarantees ticket integrity?
21
How is Kc,s encrypted?
22
How is Kc,s passed to server s?
23
How long is the ticket valid? For a limited time as all ticket should For a limited time as all ticket should
24
Act Three WS K S TGS Ticket granting service KerberosServer Client c on workstation WS 2 1 34 5
25
Act Three Client sends to server s Client sends to server s The ticket he/she got from the TGS The ticket he/she got from the TGS An authenticator encrypted with Kc,s and stating An authenticator encrypted with Kc,s and stating Who sent the ticket Who sent the ticket From which address From which address At which time At which time
26
Act Three Server s processes ticket and authenticator as TGS did in act two Server s processes ticket and authenticator as TGS did in act two
27
Act Three WS K S TGS Ticket granting service KerberosServer Client c on workstation WS 2 1 34 5 6
28
Act Three If mutual authentication is needed, server s sends to client If mutual authentication is needed, server s sends to client Authenticator it received from c with Authenticator it received from c with Timestamp incremented by one Timestamp incremented by one
29
Why? It proves to the client that s can decrypt the authenticator It proves to the client that s can decrypt the authenticator Requires being able to decrypt the ticket issued by TGS Requires being able to decrypt the ticket issued by TGS Requires knowledge of server key Ks Requires knowledge of server key Ks
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.