25
Authentication Applications The Kerberos Protocol Standard Rabie A. Ramadan Lecture 7

Authentication Applications The Kerberos Protocol Standard Rabie A. Ramadan Lecture 7

Embed Size (px)

Citation preview

Page 1: Authentication Applications The Kerberos Protocol Standard Rabie A. Ramadan Lecture 7

Authentication ApplicationsThe Kerberos Protocol Standard

Rabie A. Ramadan

Lecture 7

Page 2: Authentication Applications The Kerberos Protocol Standard Rabie A. Ramadan Lecture 7

Outline

I. Introduction

II. Introduction to Kerberos v4

III. Details of Kerberos v4

IV. Kerberos v5

V. Realms and Inter-Realm Authentication

Page 3: Authentication Applications The Kerberos Protocol Standard Rabie A. Ramadan Lecture 7

Introduction

Page 4: Authentication Applications The Kerberos Protocol Standard Rabie A. Ramadan Lecture 7

Introduction Open distributed environment

• Users at workstations wish to access servers distributed throughout the network

• Servers must restrict access to authorized users

• Servers must authenticate request for service

Workstation

Page 5: Authentication Applications The Kerberos Protocol Standard Rabie A. Ramadan Lecture 7

Introduction

Workstation (your computer) can not be trusted to authenticate its user correctly to network services:

Three threats exist:

• User pretends to be another user.

• User alters the network address of a workstation.

• User eavesdrops on exchanges and use a replay attack.

Page 6: Authentication Applications The Kerberos Protocol Standard Rabie A. Ramadan Lecture 7

Solutions

Server (V)

Authentication Server (AS)

Client (C)

AS knows all the passwords of all users

AS shares unique secret Keys with each server

Page 7: Authentication Applications The Kerberos Protocol Standard Rabie A. Ramadan Lecture 7

A Simple Authentication Dialogue

Security holes? • Password sent as plain ASCII

• No time limits for tickets

• Man-in-the middle can steal the ticket and fake IDC ( simple, because it is sent as clear text).

Server (V)

Authentication Server (AS)

Client (C)

Page 8: Authentication Applications The Kerberos Protocol Standard Rabie A. Ramadan Lecture 7

More Secure Dialogue Idea:-Introducing a Ticket Granting Server (TGS)

- Kc’ : A key that is derived from the user password

Page 9: Authentication Applications The Kerberos Protocol Standard Rabie A. Ramadan Lecture 7

Problems with the Previous Protocol

Problems ?1. Lifetime associated with the ticket-granting ticket:

If too short → the user is repeatedly asked for the password

If too long → a greater opportunity to replay exists.• The threat is that an opponent will steal the ticket and use it

before it expires.

2. There may be a requirement for servers to authenticate themselves to users. • The false server would then be in a position to act as a real

server and capture any information from the user and deny the true service to the user.

Page 10: Authentication Applications The Kerberos Protocol Standard Rabie A. Ramadan Lecture 7

What is Kerberos? Network authentication protocol

Developed at MIT in the mid 1980s

Relies on conventional encryption, making no use of public-key encryption.

Available as open source or in supported commercial software

Two versions: version 4 (passing slowly away) and 5 coexist.

Page 11: Authentication Applications The Kerberos Protocol Standard Rabie A. Ramadan Lecture 7

Kerberos 4 Overview

Page 12: Authentication Applications The Kerberos Protocol Standard Rabie A. Ramadan Lecture 7

Version 4: Authentication Dialogue

Authenticatorc

Page 13: Authentication Applications The Kerberos Protocol Standard Rabie A. Ramadan Lecture 7

First Step : C to AS

Page 14: Authentication Applications The Kerberos Protocol Standard Rabie A. Ramadan Lecture 7

Second step: AS to C

Page 15: Authentication Applications The Kerberos Protocol Standard Rabie A. Ramadan Lecture 7

Third step: C to TGS

Page 16: Authentication Applications The Kerberos Protocol Standard Rabie A. Ramadan Lecture 7

Fourth step: TGS to C

Page 17: Authentication Applications The Kerberos Protocol Standard Rabie A. Ramadan Lecture 7

Fifth step: C to V

Page 18: Authentication Applications The Kerberos Protocol Standard Rabie A. Ramadan Lecture 7

Sixth step: V to C

Page 19: Authentication Applications The Kerberos Protocol Standard Rabie A. Ramadan Lecture 7

Kerberos Realms

A Kerberos environment consists of:• a Kerberos server

• a number of clients, all registered with server

• application servers, sharing keys with server

This is termed a realm• typically a single administrative domain

Page 20: Authentication Applications The Kerberos Protocol Standard Rabie A. Ramadan Lecture 7

Request for Service in Another Realm V.4

Users on one realm may need access to servers in other realms

Please consult the book for more details

Page 21: Authentication Applications The Kerberos Protocol Standard Rabie A. Ramadan Lecture 7

Difference Between Version 4 and 5 Encryption system dependence (v.4 DES)

Message byte ordering (v.4 arbitrary; v.5 defined by ASN1 Standard)

Ticket lifetime (v.4 21h max; v.5 arbitrary)

Authentication forwarding to other hosts (v.4 no; v.5 yes),• A client accesses a server. The server can not act on another

server on behalf of the client)

Inter-realm authentication: v.4 (v5. simpler)

Page 22: Authentication Applications The Kerberos Protocol Standard Rabie A. Ramadan Lecture 7

Kerberos Version 5

Developed in mid 1990’s Provides improvements over v4

• addresses environmental shortcomings• encryption algoithms, network protocol, byte order,

ticket lifetime, authentication forwarding, interrealm authentication

Specified as Internet standard RFC 1510

Page 23: Authentication Applications The Kerberos Protocol Standard Rabie A. Ramadan Lecture 7

New Fields in V5

Realm: Indicates realm of userOptions: Used to request that certain flags be set in the returned ticketTimes: Used by the client to request the following time settings in the ticket:

from: the desired start time for the requested tickettill: the requested expiration time for the requested ticketrtime: requested renew-till time

Nonce: A random value to be repeated in message (2) to assure that the response is fresh and has not been replayed by an opponent

Page 24: Authentication Applications The Kerberos Protocol Standard Rabie A. Ramadan Lecture 7

New Fields in V5

Subkey: The client's choice for an encryption key to be used to protect this specific application session. If this field is omitted, the session key from the ticket (Kc,v) is used.

Sequence number: An optional field that specifies the starting sequence number to be used by the server for messages sent to the client during this session. Messages may be sequence numbered to detect replays.

Page 25: Authentication Applications The Kerberos Protocol Standard Rabie A. Ramadan Lecture 7

Kerberos Limitations Every network service must be individually modified for use with Kerberos

Doesn’t work well in time sharing environment

Requires a secure Kerberos Server

Requires a continuously available Kerberos Server

Stores all passwords encrypted with a single key

Assumes workstations are secure

Scalability