24
Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution-NonCommercial-ShareAlike License. Some Rights Reserved

Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Embed Size (px)

Citation preview

Page 1: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Why Kerberos?Presented by Beth Lynn Eicher

CPLUG Security Conference

March 5, 2005

Released Under The Creative Commons Attribution-

NonCommercial-ShareAlike License.

Some Rights Reserved

Page 2: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Kerberos IS...

Page 3: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

The mythical character

Page 4: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

A Network Authentication Protocol

● MIT took an idea from Xerox: “The Needham-

Schroeder Protocol”●Centralized, single sign-on, encrypted logins

Page 5: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Kerberos is everywhere•Required for OpenAFS•With Heimdal (from Sweden) you

can use Kerberos anywhere•Becoming a built-in option

• Microsoft Active Directory• LDAP• Fedora Core (PAM)

Page 6: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Yes, you can use telnet again

If you “kerberize” your service, you can use

services that otherwise pass your passwords in the

clear.

Page 7: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Allows many methods of

authentication...

Page 8: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Something that you know

Your password

Page 9: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Something that you have...

Your Securid

Page 10: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Something that you are...

Bio-authentication

Page 11: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Since there are multiple ways of

authenticating...

Let's just call it secret

Page 12: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Provides the 3 A's

● Authentication – verifying secrets●Authorization – control access

●Auditing – logging

Page 13: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

NOT to be confused with...

Page 14: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Fluffy from Harry Potter

Page 15: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

A directory service

● Kerberos doesn't know

your full name, your

favorite shell, or your

home address

● Use LDAP or NIS(+)

WITH Kerberos

Page 16: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Kerberos does encrypt your

password....● But if you are using what you assume to be

Kerberos may not be if your your system has

been exploited!

● Be aware of trojans and key stroke logging

Page 20: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Single Sign-On

1) I login to my desktop

2) After that initial login I'm given a ticket

3) I can ssh/telnet to other machines on the network

without typing a password again!

My password is not cached or resent.

My ticket allows me to request more tickets.

Page 21: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

When I want to be root

● I authenticate with my

[email protected] password

● Now I have full root privileges on the local host

● I can also use this ticket to ssh/telnet to other

machines to also be root on them too

Page 22: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

What I didn't tell you

● How Kerberos works.

● MIT vs Heimdal

● Who is Cerberus?

● How to configure Kerbeors

● How OpenAFS uses Kerberos

Page 23: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

O'Reilly to the Rescue

● “Kerberos The

Definitive Guide” by

Jason Garman

● The Owl book

● $34.95

Page 24: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Thanks!