How To Use Kerberos
|
|
|
- Kristian Taylor
- 5 years ago
- Views:
Transcription
1 KERBEROS 1 Kerberos Authentication Service Developed at MIT under Project Athena in mid 1980s Versions 1-3 were for internal use; versions 4 and 5 are being used externally Version 4 has a larger installed base, is simpler, and has better performance, but works only with TCP/IP networks Version 5 developed in mid 90 s (RFC-1510) corrects some of the security deficiencies of Version 4 Kerberos (intended) Services: Authentication Accounting Audit The last two were never implemented 2 Page 1
2 Objective To provide a trusted third-party service (based on the Needham/Schroeder authentication protocol), named Kerberos, that can perform authentication between any pair of entities in TCP/IP networks primarily used to authenticate user-atworkstation to server Authentication is two-way Not meant for high risk operations (e.g., bank transactions, classified government data, student grades) 3 Needham-Schroeder Protocol original third-party key distribution protocol, for session between A and B mediated by KDC protocol overview is: 1. A KDC: ID A ID B N 1 2. KDC A: E Ka [Ks ID B N 1 E Kb [Ks ID A ]] 3. A B: E Kb [Ks ID A ] 4. B A: E Ks [N 2 ] 5. A B: E Ks [f(n 2 )] 4 Page 2
3 Physical Security CLIENT WORKSTATIONS None, so cannot be trusted SERVERS Moderately secure rooms, with moderately diligent system administration KERBEROS Highly secure room, with extremely diligent system administration 5 Design Goals Impeccability No cleartext passwords on the network No client passwords on servers (server must store secret server key) Minimum exposure of client key on workstation (smartcard solution would eliminate this need) Containment Compromise affects only one client (or server) Limited authentication lifetime (8 hours, 24 hours, more) Transparency Password required only at login Minimum modification to existing applications 6 Page 3
4 Kerberos model Network consists of clients and servers clients may be users, or programs that can, e.g., download files, send messages, access databases and access printers Kerberos keeps a database of clients and servers with a secret key for each one (selected at the time of registration) O(n+m) keyspace, instead of O(nm) keyspace with n clients and m servers Kerberos provides authentication of one entity to another and issues session key Issues tickets for access rights temporary rights issued by authentication server tickets time-stamped to reduce replay attacks 7 Where To Start Every principal has a master (secret) key Human user s master key is derived from the password Other resources must have their keys configured in Every principal is registered with the Kerberos server AS All principals master keys are stored in the AS database (encrypted using the AS master key) 8 Page 4
5 Encryption and clocks Note: Each user has a password which is converted to a DES key Client and server do not initially share an encryption key Any symmetric key system would work Clocks All machines that use Kerberos are loosely synchronized (within a few minutes) to prevent replays 9 Kerberos Components Key Distribution Center (KDC) consists of two logical components: Kerberos Database with secret key for each principal (user or service) Authentication Service (AS) uses the Kerberos database to verify the identity of users requesting the use of network services Ticket Granting Server (TGS) issues tickets to clients for communicating with network servers after the AS has verified the identity of the client 10 Page 5
6 Kerberos Operation The Kerberos protocol is simple and straightforward. First, the Client requests a ticket for a Ticket-Granting Service (TGS) from Kerberos (Msg 1). This ticket is sent to the client encrypted using the client s secret key (Msg 2). To use a particular server, the client requests a ticket for that server from the TGS (Msg 3). 11 Kerberos Operation If everything is in order, the TGS sends back a ticket to the client for the server (Msg 4). At this point the client presents this ticket to the server along with an authenticator (Msg 5). If there is nothing wrong with the client s credentials, the server permits access to the service. 12 Page 6
7 Getting an Initial Ticket When Bob logs into a workstation (WS), WS sends Bob s user id to AS in the clear AS returns to the WS, encrypted with Bob s secret key K Bob : A session key K Bob,TGS (a secret key to be used during the current session) A ticket-granting ticket (TGT) containing the session key, the user id, and an expiration time, encrypted with K TGS 13 Getting an Initial Ticket After receiving the message from AS, WS prompts Bob for his password and uses it to derive Bob s secret key K Bob Bob s secret key is then used to decipher the session key K Bob,TGS and the TGT WS discards both Bob s password and his secret key Note that When Bob requires access to a service (Alice), WS will need to send the TGT to TGS. Bob cannot read the contents of the TGT encrypted with TGS secret key. Since TGT contains all the information TGS needs about the initial login session, Kerberos can be stateless. 14 Page 7
8 Getting a Server Ticket When Bob wants to access a service (Alice), WS sends to TGS the name Alice, and an authenticator which proves that WS knows the session key Authenticator consists of the time of day encrypted with the session key (in this case K Bob,TGS ) TGS decrypts the TGT to obtain K Bob,TGS, and verifies the timestamp (times can be off by some amount). If so, TGS generates a new session key K Bob, Alice (session key to be shared by Bob and Alice), finds Alice s master key, and sends to WS a ticket for Alice and K Bob, Alice, encrypted with the session key K Bob,TGS The ticket for Alice consists of Bob s identity, an expiration time, and K Bob, Alice encrypted using Alice s master key 15 Requesting a Service Upon receiving the message from TGS, WS decrypts the message using K Bob,TGS WS sends the ticket for Alice (that it cannot read) and an authenticator to Alice Alice uses K Alice to decrypt the ticket to obtain K Bob,Alice and decrypts the authenticator using K Bob,Alice to verify the timestamp If everything checks out, Alice knows that the message is from Bob 16 Page 8
9 Use of session key Kerberos establishes a session key K Bob,Alice to be used by the applications for client to server authentication (no additional step required in the protocol) mutual authentication (requires the additional step of sending another message from server to client { f(a Bob, Alice ) } K Bob, Alice, using some known (hash) function f) message confidentiality using K Bob, Alice message integrity using K Bob, Alice 17 Kerberos Version 4 Terms: C = Client AS = authentication server V = server IDc = identifier of user on C IDv = identifier of V ADc = network address of C Kv = secret encryption key shared by AS and V Kc,v = secret encryption key shared by C and V TS = timestamp = concatenation 18 Page 9
10 How Kerberos works Kerberos uses two types of credentials tickets (to convey keys and identity) authenticators (to verify identity ) Ticket tgs = E Ktgs [K c,tgs ID c AD c ID tgs TS Life ] Authenticator c = E Kc,tgs [ ID c AD c TS ] A client uses a ticket (that he/she cannot read or modify) to access a server It can be used multiple times until it expires A client generates an authenticator to use a service on the server (once only) 19 V4 Authentication Dialogue Authentication Service Exhange: To obtain Ticket-Granting Ticket (1) C AS: ID c ID tgs TS1 (2) AS C: E Kc [K c,tgs ID tgs TS 2 Lifetime 2 Ticket tgs ] 20 Page 10
11 V4 Authentication Dialogue Ticket-Granting Service Echange: To obtain Service-Granting Ticket (3) C TGS: ID v Ticket tgs Authenticator c (4) TGS C: E Kc,tgs [K c,v ID v TS4 Ticket v ] 21 V4 Authentication Dialogue Client/Server Authentication Exhange: To Obtain Service (5) C V: Ticket v Authenticator c (6) V C: E Kc,v [TS5 +1] 22 Page 11
12 Replicated Kerberos Servers To avoid single point of failure and performance bottleneck, it is possible to replicate Kerberos server Mutual consistency of copies of password database could be maintained as follows: All updates are made to a primary (master) copy Other (slave) copies are read only; these copies are replaced periodically by downloading the master copy The database (with encrypted keys) is transferred in the clear To ensure that an attacker has not rearranged data in transit, a cryptographic checksum is also exchanged To ensure that an attacker does not replace a copy by an older copy, a timestamp is also sent 23 Kerberos V4 Realm A full-service Kerberos environment consists of the following entities: A Kerberos server A set of one, or more, clients A set of one, or more, application servers This environment is known as a realm. Networks of clients and servers under different administrative organizations typically constitute different realms. 24 Page 12
13 Cross-Realm Operation The Kerberos protocol is designed to operate across organizational boundaries: a client in one organization can be authenticated to a server in another. Each organization wishing to run a Kerberos server establishes its own "realm". The name of the realm in which a client is registered is part of the client's name, and can be used by the endservice to decide whether to honor a request. 25 Cross-Realm Operation By establishing "interrealm" keys, the administrators of two realms can allow a client authenticated in the local realm to use its authentication remotely. With appropriate permissions, a client could arrange registration of a separately-named principal in a remote realm, and engage in normal exchanges with that realm's services. 26 Page 13
14 Cross-Realm Operation: Message Exchange Typically, cross-realm message exchange operates as follows: C AS: ID C ID tgs TS 1 AS C: E KC [K C, tgs ID tgs TS 2 Lifetime 2 Ticket tgs ] C TGS: ID tgsrem Ticket tgs Authenticator C 27 Cross-Realm Operation: Message Exchange TGS C: E Kc,tgs [K C, tgsrem ID tgsrem TS 4 Ticket tgsrem ] C TGS rem : ID vrem Ticket tgsrem Authenticator C TGS rem C: E Kc,tgsrem [K c, vrem ID vrem TS 6 Ticket vrem ] C V rem : Ticket vrem Authenticator C 28 Page 14
15 Kerberos V5 vs. V4 addresses environmental shortcomings encryption system dependence (only DES) internet protocol dependence (only IP addresses) byte order (sender s choosing + tag) ticket lifetime (only 8bit of 5 min units = 21 hrs) authentication forwarding (not allowed) Inter-realm authentication (n 2 relationships in V4, fewer in V5) 29 Kerberos V5 vs. V4 and technical deficiencies double encryption (of ticket= not necessary) non-std mode of DES Propagating CBC (now CBC DES for encryption and separate integrity checks) session keys (used too often: now subsession keys) password attacks (still possible) 30 Page 15
16 Kerberos V5 Realm For a realm to function, it requires the following: The Kerberos server must have the user ID (UID) and hashed password of all participating users in its database. All users are registered with the Kerberos server. The Kerberos server must share a secret key with each server. All servers are registered with the Kerberos server. 31 Kerberos V5 Multiple Realms Kerberos provides a mechanism for support multiple realms and inter-realm authentication. Inter-realm authentication adds the following third requirement: The Kerberos server in each inter-operating realm share a secret key with the server in the other realm. The two Kerberos servers are registered with each other. This inter-realm scheme requires that the Kerberos server in one realm trust the Kerberos server in the other realm to authenticate its users. In a similar fashion, the participating servers in the second realm must also be willing to trust the Kerberos server in the first realm. 32 Page 16
17 Realms: Hierarchical Organization Realms are typically organized hierarchically. Each realm shares a key with its parent and a different key with each child. If an inter-realm key is not directly shared by two realms, the hierarchical organization allows an authentication path to be easily constructed. If a hierarchical organization is not used, it may be necessary to consult some database in order to construct an authentication path between realms. 33 Kerberos V5 Credentials: Ticket A Kerberos ticket used to pass to server identity of client for whom the ticket was issued. also contains information that server uses to ensure that client using ticket is same client to whom ticket was issued. Some of the information, encrypted using the server s secret key, in a ticket include Client s name Client s network address Timestamp Session key A ticket is good for a single server and a single client; it can, however, be used multiple times to access a server until the ticket expires. Ticket security is assured since its critical elements are encrypted using the server s secret key. 34 Page 17
18 Kerberos V5 Tickets Kerberos version 5 tickets are renewable, so service can be maintained beyond maximum ticket lifetime. Ticket can be renewed until minimum of: requested end time start time + requesting principal s max renewable lifetime start time + requested server s max renewable lifetime start time + max renewable lifetime of realm 35 Kerberos V5 Authenticator A Kerberos authenticator is generated each time a client wishes to use a service on a server. Some of the information, encrypted using the key between the client and the server, in an authenticator includes: Client s name Timestamp Session key Unlike a ticket, an authenticator can be used only once. However, a client can create authenticators as needed. 36 Page 18
19 Kerberos V5 Message Types Kerberos uses six message types: Client to Kerberos Authentication Server (AS) Kerberos Authentication Server (AS) to Client Client to Ticket-Granting Server Ticket-Granting Server to Client Client to Server Server to Client 37 Getting the Initial Ticket The client has one piece of information to prove client s identity the password. However, sending the password over the network is not advisable. Instead, the client sends a message containing its name and the name of the TGS to the Kerberos Authentication Server (AS). A network may have multiple TGS servers. 38 Page 19
20 Client to Authentication Server In Kerberos V5 the initial message from the client to the Kerberos Authentication Server would look as follows: C AS: Options ID C Realm ID tgs Times Nonce 1 Options: Used to request that certain flags be set in the returned ticket. ID C : The identifier of the client C. Realm: Indicates the realm of the user. ID tgs : Used to represent the identifier of the Ticket-Granting Server. 39 Client to Authentication Server Times: Used by the client to request the following time settings in the ticket: from: desired start time for requested ticket. till: requested expiration time for the requested ticket. rtime: requested renew-till time. Nonce: A random number to be repeated in the message back to the client to assure that the response is fresh and has not been replayed by an attacker. 40 Page 20
21 Authentication Server to Client The Kerberos Authentication Server (AS) looks up the client in its database. If the client exists in the database, Kerberos generates a session key to be used between the client and the TGS known as the Ticket Granting Ticket (TGT). In Kerberos V5 the message from the Authentication Server to the client would look as follows: AS C: Realm C ID C Ticket tgs E KC [K C,tgs Times Nonce 1 Realm tgs ID tgs ] 41 Ticket Granting Ticket Format The format for the TGT ticket is as follows: Ticket tgs = E ktgs [Flags K C,tgs Realm C ID C AD C Times] What is encrypted using the TGS s encryption key: Flags Encryption key Client C to TGS Realm and ID for C (optional) Addresses for which ticket valid Time setting information 42 Page 21
22 Getting Server Tickets A client has to obtain a separate ticket for each service it wants to use. When a client needs a ticket that it does not already have, it sends a request to the Ticket- Granting Server (TGS). In reality, in most cases the program would do this automatically and it would be invisible to the user. 43 Client to TGS The format for the this message is as follows: C TGS: Options ID V Times Nonce 2 Ticket tgs Authenticator C Options: Used to request that certain flags be set in the return ticket. ID V : The ID of the server for which the ticket is being requested. Nonce 2 : A different random number between the client and the TGS. Ticket tgs : The ticket provided by the Ticket-Granting Ticket server. Authenticator C : An authenticator created by Client C to validate it to the TGS. 44 Page 22
23 Client: Authenticator Format The format for the client authenticator is as follows: Authenticator C = K KC,tgs [ID C Realm C TS 1 ] Notice that the following information is encrypted using the secret key between Client C and the TGS: ID C : ID of Client C Realm C : Realm of Client C TS1: Timestamp when the authenticator was created. 45 Getting Server Tickets When TGS receives the request, it decrypts the Ticket Granting Ticket (TGT) with the secret key and uses the session key in the TGT to decrypt the authenticator. It compares the information in the authenticator with the information in the ticket: Client s network address Timestamp [Clocks must be in close synchronization] If all is correct, the TGS returns a valid ticket for the client to present to the requested server. TGS creates new session key for client and server encrypted with the session key shared by the client and the TGS. Information is sent back to client via a message. 46 Page 23
24 TGS to Client The format for the this message is as follows: TGS C: Realm C ID C Ticket V E KC, tgs [K C,V Times Nonce 2 Realm V ID V ] The message from the TGS to C, encrypted using secret key shared by Client and the TGS, contains the following information: ID and Realm information for Server V Session key to be used by Client C and Server V Time setting information Return nonce 47 Requested Server: Ticket Format The format for the TGT ticket is as follows: Ticket V = E KV [Flags K C,V Realm C ID C AD C Times] Notice what is encrypted using the secret key between the TGS and Server V: Flags Encryption key from Client C to Server V Realm and ID for C (optional) Addresses for which ticket valid Time setting information 48 Page 24
25 Client to Server Now, the client is able to authenticate itself to the server that will provide the requested service The format for the message from the client to a server to request the service is as follows: C V: Options Ticket V Authenticator C 49 Client to Server: Ticket Formats The format for the ticket between the client and the server is: Ticket V = E KV [Flags K C, V Realm C ID C AD C Times] 50 Page 25
26 Client to Server: Authenticator Format The authenticator sent by client to sever is: Authenticator C = E KV, C [ID C Realm C TS 2 Subkey Seq #] The subkey field is a client s choice for an encryption key to be used to protect this specific application session. If omitted, session key from the ticket K C, V is used. The Seq# field is an optional field that specifies the starting sequence number to used by server for messages sent to the client during this session. Messages may be sequenced numbered to detect replays. 51 Message: Server to Client The server decrypts and check the ticket, the authenticator, and the client s address and timestamp. If everything checks out, server is assured by the Kerberos protocol that the client is who it says it is. For applications that require mutual authentication, the server sends the client back a message consisting of the timestamp encrypted with the session key. This demonstrates that the server knew the secret key and could decrypt the ticket and authenticator. Now, the client and serve can encrypt future messages with the shared key. 52 Page 26
27 Message: Server to Client The format for the message from the server back to the client to provide mutual authentication is: V C: E KC, V [TS 2 Subkey Seq#] 53 Kerberos V5 Ticket Flags The flags field was added in Kerberos V5. The standard defines 11 flags (see Table 4.4 on Page 104 of text for the complete lists). INITIAL: This flag indicates that a ticket was issued using the AS protocol and not issued based on a ticket-granting ticket. INVALID: This flag indicates that a ticket is invalid, which means that application servers must reject tickets which have this flag set. 54 Page 27
28 Kerberos V5 Ticket Flags RENEWABLE: This flag is normally only interpreted by the ticket-granting service, not by application servers, and can be used to obtain a replacement ticket that expires at a later date. POSTDATED: The POSTDATED flag indicates that a ticket has been postdated. The application server can check the auth-time field in the ticket to see when the original authentication occurred. Some services may choose to reject postdated tickets, or they may only accept them within a certain period after the original authentication. 55 Kerberos V5 Ticket Flags PROXIABLE: normally interpreted by the ticketgranting service and ignored by application servers. When set, this flag tells the ticket-granting server that it is OK to issue a new (proxy) client ticket with a different network address based on this ticket. PROXY: This flag is set in a ticket by the TGS when it issues a proxy ticket. FORWARDABLE: This flag has an interpretation similar to that of the PROXIABLE flag, except ticket-granting tickets may also be issued with different network addresses (to be used with remote TGS) 56 Page 28
29 Limitations of Kerberos It is possible to cache and replay old authenticators during the lifetime (typically 8 hours) of the ticket If a server can be fooled about the correct time, old tickets can be reused Vulnerable to password guessing attacks (attacker collects tickets and does trial decryptions with guessed passwords) Active intruder on the network can cause denial of service by impersonation of Kerberos IP address 57 Not Addressed by Kerberos V5 "Denial of service" attacks are not solved with Kerberos. There are places in these protocols where an intruder can prevent an application from participating in the proper authentication steps. Principals must keep their secret keys secret. If an intruder steals a principal's key, can masquerade as that principal or impersonate any server to the legitimate principal. 58 Page 29
30 Not Addressed by Kerberos V5 "Password guessing" attacks are not solved by Kerberos. If a user chooses a poor password, it is possible for an attacker to successfully mount an offline dictionary attack by repeatedly attempting to decrypt, with successive entries from a dictionary, messages obtained which are encrypted under a key derived from the user's password. 59 Kerberos V5 availability Kerberos is not in the public domain, but MIT freely distributes the code. Integrating it into the UNIX environment is another story. A number of companies sell versions of Kerberos Microsoft has incorporated it into the Windows 2000 Server product line. ( Additional references S. M. Bellovin and M. Merritt, Limitations of the Kerberos Authentication System, Proc. USENIX, Winter B. C. Neuman and T. Ts o, Kerberos: An authentication service for computer networks, IEEE Communications, September 1994, pp Page 30
Authentication Application
Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be
Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1
Chapter 4 Authentication Applications COSC 490 Network Security Annie Lu 1 OUTLINE Kerberos X.509 Authentication Service COSC 490 Network Security Annie Lu 2 Authentication Applications authentication
Authentication Applications
Authentication Applications CSCI 454/554 Authentication Applications will consider authentication functions developed to support application-level authentication & digital signatures Kerberos a symmetric-key
4.2: Kerberos Kerberos V4 Kerberos V5. Chapter 5: Security Concepts for Networks. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Secure Applications Network Authentication Service: Kerberos 4.2:
Kerberos. Login via Password. Keys in Kerberos
Kerberos Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Secure Applications Network Authentication Service: Kerberos
Kerberos. Guilin Wang. School of Computer Science, University of Birmingham [email protected]
Kerberos Guilin Wang School of Computer Science, University of Birmingham [email protected] 1 Entity Authentication and Key Exchange In the last talk, we discussed key exchange and reviewed some concrete
Authentication Applications
Authentication Applications will consider authentication functions developed to support application-level authentication & digital signatures will consider Kerberos a private-key authentication service
Chapter 15 User Authentication
Chapter 15 User Authentication 2015. 04. 06 Jae Woong Joo SeoulTech ([email protected]) Table of Contents 15.1 Remote User-Authentication Principles 15.2 Remote User-Authentication Using Symmetric
10.2 World Wide Web Security S-HTTP (secure hypertext transfer protocol) SEA (security extension architecture)
Contents 1 / 55 10.1 Kerberos Kerberos V4 Kerberos V5 10.2 World Wide Web Security S-HTTP (secure hypertext transfer protocol) SEA (security extension architecture) Kerberos V4 / Contents 2 / 55 Kerberos
Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530 520 BC. From Italy (?).
Kerberos Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530 520 BC. From Italy (?). 1 Kerberos Kerberos is an authentication protocol and a software suite implementing this
TOPIC HIERARCHY. Distributed Environment. Security. Kerberos
KERBEROS TOPIC HIERARCHY Distributed Environment Security Privacy Authentication Authorization Non Repudiation Kerberos ORIGIN MIT developed Kerberos to protect network services. Developed under the Project
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 9: Authentication protocols, digital signatures Ion Petre Department of IT, Åbo Akademi University 1 Overview of
How To Protect Your Data From Being Hacked On A Network (Kerberos) On A Pc Or Mac Or Ipad (Ipad) On An Ipad Or Ipa (Networking) On Your Computer Or Ipam (Network
Introduction to Network Security, Authentication Applications Information: is defined as knowledge obtained from investigation, Study or Instruction, Intelligence, news, facts, data, a Signature or Character
Chapter 16: Authentication in Distributed System
Chapter 16: Authentication in Distributed System Ajay Kshemkalyani and Mukesh Singhal Distributed Computing: Principles, Algorithms, and Systems Cambridge University Press A. Kshemkalyani and M. Singhal
Kerberos: An Authentication Service for Computer Networks by Clifford Neuman and Theodore Ts o. Presented by: Smitha Sundareswaran Chi Tsong Su
Kerberos: An Authentication Service for Computer Networks by Clifford Neuman and Theodore Ts o Presented by: Smitha Sundareswaran Chi Tsong Su Introduction Kerberos: An authentication protocol based on
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
Implementing a Kerberos Single Sign-on Infrastructure
Implementing a Kerberos Single Sign-on Infrastructure Gary Tagg IT Security Consultant, Tagg Consulting Ltd [email protected] Abstract Kerberos provides secure authentication, single sign-on
Kerberos and Active Directory symmetric cryptography in practice COSC412
Kerberos and Active Directory symmetric cryptography in practice COSC412 Learning objectives Understand the function of Kerberos Explain how symmetric cryptography supports the operation of Kerberos Summarise
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
Network Security Standards. Key distribution Kerberos SSL/TLS
Network Security Standards Key distribution Kerberos SSL/TLS 1 Many-to-Many Authentication? Users Servers How do users prove their identities when requesting services from machines on the network? Naïve
Scenario. Roadmap. ! The simplified architecture! The complete architecture Pre-authentication Delegation. Realms
erberos' erberos! erberos is based on the Needham-Schroeder protocol (1978)! erberos was developed at MIT in1980! erberos V4 and erberos V5 (RFC 1510)! erberos if part of OSF DCE and Windows 2 (e later)!
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4, Issue 6, November - December (2013), pp. 62-69 IAEME: www.iaeme.com/ijcet.asp Journal
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.
CSC 490 Special Topics Computer and Network Security Key Management Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin [email protected] Slide 09-1 Overview Key exchange Session vs. interchange
Network Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
Troubleshooting Kerberos Errors
Troubleshooting Kerberos Errors Abstract Microsoft Corporation Published: March 2004 This white paper can help you troubleshoot Kerberos authentication problems that might occur in a Microsoft Windows
Two SSO Architectures with a Single Set of Credentials
Two SSO Architectures with a Single Set of Credentials Abstract Single sign-on (SSO) is a widely used mechanism that uses a single action of authentication and authority to permit an authorized user to
Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques
Computer Security process of reliably verifying identity verification techniques what you know (eg., passwords, crypto key) what you have (eg., keycards, embedded crypto) what you are (eg., biometric information)
Taming the beast : Assess Kerberos-protected networks
Taming the beast : Assess Kerberos-protected networks [ Work in progress Black Hat EU 2009] Emmanuel Bouillon Commissariat à l'energie Atomique, Centre DAM-Île de France, Bruyères-le-Châtel 91297 Arpajon
A Secure Authenticate Framework for Cloud Computing Environment
A Secure Authenticate Framework for Cloud Computing Environment Nitin Nagar 1, Pradeep k. Jatav 2 Abstract Cloud computing has an important aspect for the companies to build and deploy their infrastructure
1. a. Define the properties of a one-way hash function. (6 marks)
1. a. Define the properties of a one-way hash function. (6 marks) A hash function h maps arbitrary length value x to fixed length value y such that: Hard to reverse. Given value y not feasible to find
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. 1 Opening quote. 2 The topics of cryptographic key management
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1
Chapter 15 Key Management Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1 Symmetric-key Distribution Symmetric-key cryptography is more efficient than asymmetric-key
Juniper Networks Secure Access Kerberos Constrained Delegation
Juniper Networks Secure Access Kerberos Constrained Delegation Release 6.4 CONTENT 1. BACKGROUND...3 2. SETTING UP CONSTRAINED DELEGATION...5 2.1 ACTIVE DIRECTORY CONFIGURATION...5 2.1.1 Create a Kerberos
Security: Focus of Control. Authentication
Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized
TELE 301 Network Management. Lecture 18: Network Security
TELE 301 Network Management Lecture 18: Network Security Haibo Zhang Computer Science, University of Otago TELE301 Lecture 18: Network Security 1 Security of Networks Security is something that is not
SECURE USER AUTHENTICATION IN CLOUD COMPUTING USING KERBEROS
SECURE USER AUTHENTICATION IN CLOUD COMPUTING USING KERBEROS R.Vijayakumari Asst. Professor, Dept. of Computer Science, Krishna University, Machilipatnam Abstract Cloud Computing may be considered as the
An Efficient Online Data Storage in Cloud using Kerberos
Proc. of Int. Conf. on Advances in Communication, Network, and Computing, CNC An Efficient Online Data Storage in Cloud using Kerberos 1 R.Jeena and 2 Dr.S.Saravana Kumar 1 Research Scholar, Department
Leverage Active Directory with Kerberos to Eliminate HTTP Password
Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: [email protected] Website: www.pistolstar.com
Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security
UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,
How To Make A Trustless Certificate Authority Secure
Network Security: Public Key Infrastructure Guevara Noubir Northeastern University [email protected] Network Security Slides adapted from Radia Perlman s slides Key Distribution - Secret Keys What if
Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service
Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service Sazzad Masud and Ram Krishnan University of Texas at San Antonio [email protected], [email protected] Abstract Cloud
Attestation and Authentication Protocols Using the TPM
Attestation and Authentication Protocols Using the TPM Ariel Segall June 21, 2011 Approved for Public Release: 11-2876. Distribution Unlimited. c 2011. All Rights Reserved. (1/28) Motivation Almost all
Architecture of Enterprise Applications III Single Sign-On
Architecture of Enterprise Applications III Single Sign-On Haopeng Chen REliable, INtelligent and Scalable Systems Group (REINS) Shanghai Jiao Tong University Shanghai, China e-mail: [email protected]
Part 2 D(E(M, K),K ) E(M, K) E(M, K) Plaintext M. Plaintext M. Decrypt with private key. Encrypt with public key. Ciphertext
Part 2 Plaintext M Encrypt with public key E(M, K) Ciphertext Plaintext M D(E(M, K),K ) Decrypt with private key E(M, K) Public and private key related mathematically Public key can be published; private
Lecture 10: Network Security Protocols
ENTS 689i Lecture 10: Network Security Protocols Part III: Network Security Part III: Outline November 13 (Today) IP Security (IPSec) Secure Socket Layer (SSL)/Transport Layer Security (TLS) Kerberos DNS
Guide to SASL, GSSAPI & Kerberos v.6.0
SYMLABS VIRTUAL DIRECTORY SERVER Guide to SASL, GSSAPI & Kerberos v.6.0 Copyright 2011 www.symlabs.com Chapter 1 Introduction Symlabs has added support for the GSSAPI 1 authentication mechanism, which
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
CS 494/594 Computer and Network Security
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Exercise: Chapters 13, 15-18 18 1. [Kaufman] 13.1
Introduction to Computer Security
Introduction to Computer Security Authentication and Access Control Pavel Laskov Wilhelm Schickard Institute for Computer Science Resource access: a big picture 1. Identification Which object O requests
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
Kerberos authentication made easy on OpenVMS
Kerberos authentication made easy on OpenVMS Author: Srinivasa Rao Yarlagadda [email protected] Co-Author: Rupesh Shantamurty [email protected] OpenVMS Technical Journal V18 Table of contents
Single Sign-On for Kerberized Linux and UNIX Applications
Likewise Enterprise Single Sign-On for Kerberized Linux and UNIX Applications AUTHOR: Manny Vellon Chief Technology Officer Likewise Software Abstract This document describes how Likewise facilitates the
Module 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
Cryptography and Network Security Digital Signature
Cryptography and Network Security Digital Signature Xiang-Yang Li Message Authentication Digital Signature Authentication Authentication requirements Authentication functions Mechanisms MAC: message authentication
Stealing credentials for impersonation
Stealing credentials for impersonation Emmanuel Bouillon [email protected] October 29, 2010 Disclaimer Introduction This expresses my own views and does not involve my previous, current and future employers.
Securing Session Initiation Protocol for VOIP Services
Securing Session Initiation Protocol for VOIP Services Amina.M.Elmahalwy Information Technology Dept. Faculty of Computers and Information, Menoufia University, Egypt Wail.S.Elkilani Computer Systems Dept.
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
CSCI 4250/6250 Fall 2015 Computer and Networks Security
CSCI 4250/6250 Fall 2015 Computer and Networks Security Network Security Goodrich, Chapter 5-6 Tunnels } The contents of TCP packets are not normally encrypted, so if someone is eavesdropping on a TCP
: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT
Subject Code Department Semester : Network Security : XCS593 : MSc SE : Nineth Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Part A (2 marks) 1. What are the various layers of an OSI reference
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
CSE/EE 461 Lecture 23
CSE/EE 461 Lecture 23 Network Security David Wetherall [email protected] Last Time Naming Application Presentation How do we name hosts etc.? Session Transport Network Domain Name System (DNS) Data
Authentication Protocols
Authentication Protocols Guevara Noubir College of Computer and Information Science Northeastern University [email protected] Network Security, C. Kaufman, R. Perlman, M. Speciner, Second Edition, Addison-Wesley,
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
Enabling Active Directory Authentication with ESX Server 1
1 Enabling Active Directory Authentication with ESX Server 1 This document provides information about how to configure ESX Server to use Active Directory for authentication. ESX Server system includes
Enterprise SSO Manager (E-SSO-M)
Enterprise SSO Manager (E-SSO-M) Many resources, such as internet applications, internal network applications and Operating Systems, require the end user to log in several times before they are empowered
Microsoft Auditing Events for Windows 2000/2003 Active Directory. By Ed Ziots Version 1.6 9/20/2005
Microsoft Auditing Events for Windows 2000/2003 Active Directory. By Ed Ziots Version 1.6 9/20/2005 Revision 1.3: Cleaned up resources and added additional detail into each auditing table. Revision 1.4:
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Efficient nonce-based authentication scheme for Session Initiation Protocol
Efficient nonce-based authentication scheme for Session Initiation Protocol Jia Lun Tsai National Chiao Tung University, Taiwan, R.O.C. [email protected] Abstract: In recent years, Session Initiation
IPsec Details 1 / 43. IPsec Details
Header (AH) AH Layout Other AH Fields Mutable Parts of the IP Header What is an SPI? What s an SA? Encapsulating Security Payload (ESP) ESP Layout Padding Using ESP IPsec and Firewalls IPsec and the DNS
Remote Administration
Windows Remote Desktop, page 1 pcanywhere, page 3 VNC, page 7 Windows Remote Desktop Remote Desktop permits users to remotely execute applications on Windows Server 2008 R2 from a range of devices over
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
Cryptography and network security CNET4523
1. Name of Course 2. Course Code 3. Name(s) of academic staff 4. Rationale for the inclusion of the course/module in the programme Cryptography and network security CNET4523 Major The Great use of local
Efficient Nonce-based Authentication Scheme for. session initiation protocol
International Journal of Network Security, Vol.9, No.1, PP.12 16, July 2009 12 Efficient Nonce-based Authentication for Session Initiation Protocol Jia Lun Tsai Degree Program for E-learning, Department
Web Application Entity Session Management using the eid Card Frank Cornelis 03/03/2010. Fedict 2010. All rights reserved
Web Application Entity Session Management using the eid Card Frank Cornelis 03/03/2010 Fedict 2010. All rights reserved What is Entity Authentication? Entity authentication is the process whereby one party
Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
Secure Authentication and Session. State Management for Web Services
Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
Potential Targets - Field Devices
Potential Targets - Field Devices Motorola Field Devices: Remote Terminal Units ACE 3600 Front End Devices ACE IP Gateway ACE Field Interface Unit (ACE FIU) 2 Credential Cracking Repeated attempts to
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Chapter 2: Introduction to Cryptography What is cryptography? It is a process/art of mangling information in such a way so as to make it
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Contents. Supported Platforms. Event Viewer. User Identification Using the Domain Controller Security Log. SonicOS
SonicOS User Identification Using the Domain Controller Security Log Contents Supported Platforms... 1 Event Viewer... 1 Configuring Group Policy to Enable Logon Audit... 2 Events in Security Log... 4
