Kerberos V5. Raj Jain. Washington University in St. Louis



Similar documents
4.2: Kerberos Kerberos V4 Kerberos V5. Chapter 5: Security Concepts for Networks. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Kerberos. Login via Password. Keys in Kerberos

10.2 World Wide Web Security S-HTTP (secure hypertext transfer protocol) SEA (security extension architecture)

How To Use Kerberos

Key Management and Distribution

Authentication Applications

Authentication Applications

Chapter 15 User Authentication

Authentication Application

Key Management and Distribution

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

Kerberos and Active Directory symmetric cryptography in practice COSC412

Cryptography and network security CNET4523

Network Security Part II: Standards

Digital Signature. Raj Jain. Washington University in St. Louis

mod_ssl Cryptographic Techniques

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

, SNMP, Securing the Web: SSL

NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

How To Protect Your Data From Being Hacked On A Network (Kerberos) On A Pc Or Mac Or Ipad (Ipad) On An Ipad Or Ipa (Networking) On Your Computer Or Ipam (Network

Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016

Internet Protocol Version 6 (IPv6)

Application Layer (1)

SNMP and Network Management

How To Make A Trustless Certificate Authority Secure

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

ENABLING SINGLE SIGN-ON: SPNEGO AND KERBEROS Technical Bulletin For Use with DSView 3 Management Software

CS 494/594 Computer and Network Security

Neutralus Certification Practices Statement

Dr. Arjan Durresi. Baton Rouge, LA These slides are available at:

Client Server Registration Protocol

Network Security: Public Key Infrastructure

Configuring SSL Termination

Network Security Protocols

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University

CS 356 Lecture 28 Internet Authentication. Spring 2013

Lecture 9 - Network Security TDTS (ht1)

Juniper Networks Secure Access Kerberos Constrained Delegation

Introduction to Computer Security

WATCHING THE WATCHDOG: PROTECTING KERBEROS AUTHENTICATION WITH NETWORK MONITORING

Key Management (Distribution and Certification) (1)

Institute of Computer Technology - Vienna University of Technology. L96 - SSL, PGP, Kerberos

Configure the Application Server User Account on the Domain Server

Chapter 10. Network Security

TOPIC HIERARCHY. Distributed Environment. Security. Kerberos

Lecture 9: Application of Cryptography

Message authentication and. digital signatures

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

NETWORK ADMINISTRATION AND SECURITY

Electronic Mail Security

Security in Computer Networks

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

The English translation Of MBA Standard 0301

The Misuse of RC4 in Microsoft Word and Excel

Asymmetric cryptosystems fundamental problem: authentication of public keys

Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, BC. From Italy (?).

Cryptography and Network Security: Overview

Principles of Network Security

MarshallSoft AES. (Advanced Encryption Standard) Reference Manual

SNMP....Simple Network Management Protocol...

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Implementing a Kerberos Single Sign-on Infrastructure

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Chapter 7: Network security

Network Security Technology Network Management

Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques

Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service

Standards and Products. Computer Security. Kerberos. Kerberos

Scenario. Roadmap. ! The simplified architecture! The complete architecture Pre-authentication Delegation. Realms

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631

Security. Raj Jain. Washington University in St. Louis

PGP - Pretty Good Privacy

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

Security Digital Certificate Manager

Security Digital Certificate Manager

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Transport Level Security

Detailed Specifications

TechNote 0006: Digital Signatures in PDF/A-1

Kerberos. Guilin Wang. School of Computer Science, University of Birmingham

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 13

Practice Questions. CS161 Computer Security, Fall 2008

CS 758: Cryptography / Network Security

Security Policy Revision Date: 23 April 2009

IPsec Details 1 / 43. IPsec Details

OPENID AUTHENTICATION SECURITY

Transcription:

Kerberos V5 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-09/ 11-1

Overview Kerberos V4 Issues ASN.1 and BER Names, Delegation of Rights Ticket Lifetimes Cryptographic Algorithms Hierarchy of Realms 11-2

Kerberos V4 Issues 1. Names, Instance, Realm (non standard) 1. Only DES encryption 2. Only IPv4 addresses 3. Byte ordering indicated in the message (ASN.1 better) 4. Maximum life time limited to 21 hours: 8 bit life time in units of 5 minutes 5. No delegation 6. Inter-realm authentication limited to pairs N 2 pairs 7. Double encryption of the ticket: K client [K server [...]] 8. PCBC does not detect interchange of cipher blocks 9. No subsession keys for long sessions 10. Brute force password attack 11-3

ASN.1 Abstract Syntax Notation One Joint ISO and ITU-T standard, Original 1984, latest 2002. Used to specify protocol data structures X.400 electronic mail, X.500 and LDAP directory services, H.323 VOIP, SNMP, etc use ASN.1 Pre-Defined: INTEGER, BOOLEAN, BIT STRING, OCTET STRING Constructed: SEQUENCE (structure), SEQUENCE OF (lists), CHOICE,... 11-4

ASN.1 Example AddressType ::= SEQUENCE { name OCTET STRING, number INTEGER, street OCTET STRING, city OCTET STRING, state OCTET STRING, zipcode INTEGER } 11-5

Encoding Rules ASN.1 only specifies the structure. Encoding rules indicate how to encode the structure in to bits on the wire. Examples: Basic Encoding Rules (BER), Packed Encoding Rules (PER), XML Encoding rules (XER), Distinguished Encoding Rules (DER),... In BER, everything is encoded as Tag-Length-Value. 11-6

BER Example John Miller, 126 Main Street, Big City, MO 63130 30 80 04 0B 4A 6F 68 6E 20 4D 69 6C 6C 65 72 Seq. Len Oct Str Len J o h n M i l l e r 02 01 FE Int Len 123 04 0B 4D 61 69 6E 20 53 74 72 65 65 74 Oct str 11 M a i n S t r e e t 04 08 42 69 67 20 43 69 74 79 Oct Str Len B i g C i t y 04 02 4D 4F 02 02 F6 96 0 Oct Str Len M O Int len 63130 Null 11-7

Names V4: Name, Instance, Realm (40 character each. Null terminated). Dot "." is illegal. V5: Name can contain dot and can have many parts., e.g., jain.raj V4: Realms are DNS names. V5: Realms can be DNS names, X.500 names, etc 11-8

Delegation of Rights Need: Backup job requires operators to access files V5 allows requesting a TGT with a different address Can include many addresses or no addresses Anyone. TGT with operator's address can then be passed to the operator. Can also request to include application specific restrictions in the TGT These restrictions are copied in the server tickets Can request that TGT be forwardable One operator can pass it to another operator. Can request that TGT be proxiable Alice can request a ticket from TGT for use by the operator. Allowing delegation, forwarding, proxy, many addresses, no addresses are policy decisions 11-9

Ticket Lifetimes V4: Lifetime is one octet max 256 in units of 5 minutes Max 21 hours V5: Many timestamps, each in ASN.1 format (17 bytes in s) Start Time End Time Auth Time: Time at which initial TGT was obtained Renew Till: Must renew after this time Start Time < End Time < Renew Till 11-10

Renewable Tickets Tickets cannot be invalidated Long term use permitted only if renewed frequently Expired tickets cannot be renewed KDC does not have to remember revoked tickets for long time 11-11

Start Time in future Postdated Tickets Pre-invalidated Must be validated at the start time Allows revoking the authentication May-Postdate flag in TGT TGS can issue post-dated tickets 11-12

Key Versions Allows principals to change keys Multiple versions of keys are kept at KDC and TGS Each key is stored as <Key, Principal_KeyVersionNo, KDC_KeyVersionNo> Allows the possibility of KDC changing its key Helpful for renewable and post-dated tickets Renewal Tickets are issued with the latest keys 11-13

Master Keys in Different Realms Password-to-key hash function uses realm name also Attacker cannot use the same key in multiple realms (Attacker can still use the same password in multiple realms) 11-14

Optimizations V4: Ticket is encrypted with client's key Ticket is already encrypted with Server's key Double encryption V5: Ticket is not encrypted again V4: Target's name inside the ticket V5: No name inside the ticket 11-15

V4: DES Cryptographic Algorithms V5: Encryption field is type-value encoded Any encryption 11-16

Integrity-Only Algorithm V4: Jueneman Checksum V5: Choice of algorithms rsa-md5-des des-mac des-mac-k res-md4-des (optional) rsa-md4-des-k (Optional) 11-17

Encryption for Privacy and Integrity Choice: des-cbc-crc, des-cbc-md4, des-cbc-md5 Checksum is combined with the message and then encrypted with DES in CBC mode. 11-18

V4: Limits to pairs V5: Transition allowed. Hierarchy of Realms B is registered with A and C is registered with B x@a can get to y@c via B List of all transited KDC's is put in the ticket It is the applications responsibility to decide if some transited KDC is trustworthy G B E x A C y D F 11-19

Password Attacks V4: Initial request in clear. Anyone can request TGT for president@whitehouse.gov and use it for offline attack. V5: Need to send pre-authentication data. Current time encrypted by user's key. One can still do offline analysis of tickets received for another user. V5 does not allow tickets for human users (weaker keys). Attackers can still monitor pre-authenticated data and analyze it offline. 11-20

Key Inside Authenticator Alice having two conversations with Bob Attacker can inter-mingle packets and confuse V5 allows Alice to use two different keys. Alice puts a key in the authenticator along with the ticket. Bob uses Alice-bob session key to decrypt the authenticator and then uses the key proposed by Alice to continue the conversation. 11-21

Double TGT Authentication User's workstation get a TGT for the user and discard the master key generated from the password. Xwindows applications need to authenticate to the user in order to write to his windows. These tickets are encrypted with user's master keys The workstation can send the user's TGT and the tickets to TGS and get back tickets encrypted with session key. 11-22

Public Keys for Users Users can send a certificate to the KDC and get a reply encrypted with their public key. KDC also keep a translation table to translate X.500 names in the certificate to Kerberos style names. Kerberos style names are used in the tickets. User can then send the ticket to older servers that do not know about public key. This is called PKINIT 11-23

Summary Kerberos V5 is design follows ISO ASN.1 General General encryption, addresses, names Allows delegation, post-dated tickets, renewals Inter-realm authentication Public Keys for users 11-24

Homework 11 Read chapter 14 of the text book Submit answer to the following exercises: Exercise 14.1: Suppose the Kerberos V5 password to key conversion function is identical to V4 but then takes the output that V4 would compute and xors it with the realm name. This would produce a different key in each realm, as desired. What is wrong with this algorithm? Exercise 14.2: Consider the following variant of Kerberos. Instead of having postdated or renewable tickets, a server which notes that the authorization time is older than some limit presents the ticket to the TGS and asks if it should believe the ticket. What are the trade-offs of this approach relative to the Kerberos V5 approach. Hint: Compare TGS s work and consider revoked authentications. 11-25