Download presentation
Presentation is loading. Please wait.
Published byCassandra Walton Modified over 9 years ago
1
Kerberos: Man’s Best Friend
2
Introduction and Summary The Authentication Problem Password-Based Authentication Kerberos Comparison Conclusion
3
The Authentication Problem Users and Services Who are you? What do you want? Why do you keep touching me?
4
Password-Based Authentication Users and Services Redux Password Files and Hashing One User, One Password, One Service Password Synchronization Methods
5
Kerberos Why the Silly Name? A Bit of History General Aims and Goals
6
Building Security: A Real World Example Authentication: The Guards Know You Services: Why You Don’t Show Your Badge at the Water Cooler
7
Encryption: How to Use Your Password Without Using Your Password Everything is a Number Public-Key vs. Private-Key (Conventional) Passwords = Shared Knowledge
8
Basics of a Kerberos Transaction Son of Users and Services Everybody Gets a Password Centralized Password Authority A Sample Packet: Example Ticket password{user:client:service:expires:time}
9
Session Keys and Services Why Do We Need Session Keys? –Replay Attacks –Passwords != Shared Knowledge –Authenticating the Authenticator A Sample Packet: User Authentication session{username:address} + password{session:user:client:service:expires:time}
10
Ticket-Granting Tickets (And Other Self-Referential Nonsense) Tickets Are a Service Too –Ticket-Granting Servers Grant Tickets –Timestamps Stamp Times –Expiration Expires One User, One Password, Many Services
11
Realms Kerberos’ Scalability Problems Remote Ticket-Granting Servers Hierarchical Encapsulation
12
Why You Should Use Kerberos (An Unbiased Review) Unified Password Schemes and Psychology Synchronization Issues Disappear Secure Passwords are Secure Administrators Save Time and Energy
13
Problems with Kerberos Unified Password Schemes and Psychology Public Terminals and Replay Attacks Supported Applications
14
General Security Problems (Users Aren’t Too Bright) Bad Passwords are Bad Good Passwords are Bad Security Workarounds for Convenience
15
Conclusion: Is Kerberos Right for Me? Size Does Matter (A Little) Predicting the Future for Fun and Profit Windows 2000: Engulfed in Evil
16
Any Questions? Thank you for enduring my presentation. Those of you with questions, please ask them. The rest of you may watch a dancing monkey:
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.