+ All Categories
Home > Documents > VKSF 423 System Administration III Authentication Kerberos.

VKSF 423 System Administration III Authentication Kerberos.

Date post: 12-Jan-2016
Category:
Upload: aron-mason
View: 217 times
Download: 0 times
Share this document with a friend
32
VKSF 423 System Administration III Authentication Kerberos
Transcript
Page 1: VKSF 423 System Administration III Authentication Kerberos.

VKSF 423 System Administration III

Authentication Kerberos

Page 2: VKSF 423 System Administration III Authentication Kerberos.

Announcements

Slight modification to the syllabus Office hours

Tuesday 10-12 Thursday 10-12, 2-3

Lab Three: Virtualized Storage Veritas Storage Central OpenAFS LVM or EVMS Dynamic Disks (MS DFS)

Page 3: VKSF 423 System Administration III Authentication Kerberos.

Syllabus Modifications

Old Component

Weight New Component

Due date

Labs 25% No change All sign offs and submission by the end of 10th week

Practical 25% No change Demonstrated before exam week begins

Group Presentation

10% In lab In lab approximately 5 minutes

Group Report

10% Site Book Due by end of 10th week

Homework 10% Group Evaluation

How did the individuals contribute to the completion of the labs

Final Exam 20% No change During the final exam period

Page 4: VKSF 423 System Administration III Authentication Kerberos.

Definitions

Identification- assertion of who you are

Authentication-process of proving one’s identity

Authorization-The privileges that accrue to an identity

Access control-Provide the correct services to the correct users

Page 5: VKSF 423 System Administration III Authentication Kerberos.

Two Types of Authentication

User authentication Machine to machine authentication

Cryptographic Other (weak)

Page 6: VKSF 423 System Administration III Authentication Kerberos.

Identification

Who are you? Who do you claim to be? Who are you acting as?

Page 7: VKSF 423 System Administration III Authentication Kerberos.

Authentication

Can you prove who you say you are?

How? Something you know

Passwords Something you are

Biometrics Something you have

Access tokens

Page 8: VKSF 423 System Administration III Authentication Kerberos.

Access Control

All of the above Allow the correct users

Into a system Access to appropriate resources

Disallow invalid users Entry to the systems Deny access to restricted resources

Page 9: VKSF 423 System Administration III Authentication Kerberos.

Something you KnowPasswords

Oxymoron: Large random string != easy to remember

Password design/assignment Multiple words/syllables Mixed case/digits/punctuation

Storage Weak/strong encryption

Users perceive the risks as minimal vs. need to get work done

Page 10: VKSF 423 System Administration III Authentication Kerberos.

Passwords

Myth: never write down a password Recovery Helps more complicated passwords Multiple passwords

Clues/questions One time passwords

Page 11: VKSF 423 System Administration III Authentication Kerberos.

Something you areBiometrics

Voice, retinal, DNA, body geometry, signature, finger prints

Hard to change Easy to forge

Page 12: VKSF 423 System Administration III Authentication Kerberos.

Something you haveAccess Tokens

Physical keys Smart cards Translators Problems

Stolen Duplicated Spoofed

Page 13: VKSF 423 System Administration III Authentication Kerberos.

Authentication Protocols

Cryptographic methods to authenticate over a network

Multiple vulnerabilities

Page 14: VKSF 423 System Administration III Authentication Kerberos.

Network Authentication Options

Do nothing- trust machine to prevent unauthorized user access (control physical access)

Require machine to prove identity to network, then trust machine to authenticate users and provide access control

Require identification and authentication at each resource

Page 15: VKSF 423 System Administration III Authentication Kerberos.

Authentication Requirements

Must be Secure A.k.a. secure enough to push hackers

elsewhere Must be reliable

Manageable level of false negatives and false positives

Transparent to users Scalable to enterprise networks

Page 16: VKSF 423 System Administration III Authentication Kerberos.

Simple Protocol

Bob enters password on client Client sends password to server Server looks up id and password in

database of ids and passwords If it matches, validation message

sent to client & Bob is in

Page 17: VKSF 423 System Administration III Authentication Kerberos.

Problems with simple scenario

Clear text password in database Clear text password in transfer Confirmation spoofing

Page 18: VKSF 423 System Administration III Authentication Kerberos.

Password Database

Hide Encrypt

Salt Multiple serial encryptions

Page 19: VKSF 423 System Administration III Authentication Kerberos.

Transfer

Hashing Encryption

Page 20: VKSF 423 System Administration III Authentication Kerberos.

Confirmation spoofing

Simple T/F Alternate hash of password/known

key Encryption

Page 21: VKSF 423 System Administration III Authentication Kerberos.

Improved Protocol: Challenge

Avoid clear text transfer of password Bob informs server of desire to

access Server offers a phrase to Bob Bob encrypts phrase with Bob’s

password and sends to server Server, who already knows Bob’s

password, also encrypts phrase with Bob’s password and compares

Page 22: VKSF 423 System Administration III Authentication Kerberos.

Problems with improved version

Server needs clear text copy of Bob’s password

Given enough instances of a login the original password could be determined

Page 23: VKSF 423 System Administration III Authentication Kerberos.

Use of a “Trusted Third Party”

The “Blind Date” protocol I don’t know Kathy She doesn’t know me We both know Loretta We both separately contact Loretta Loretta “vouches” for me to Kathy Loretta “vouches” for Kathy to me

Page 24: VKSF 423 System Administration III Authentication Kerberos.

Levels of Kerberos Protection

Authentication at initiation of network session, assume future messages from same address come from same machine

Authentication of each message, no encryption of message

Private messages-each message is authenticated and encrypted

Page 25: VKSF 423 System Administration III Authentication Kerberos.

Kerberos Modules

Applications library Encryption library Database library Database administration programs Administration server Authentication server Db propagation software User programs applications

Page 26: VKSF 423 System Administration III Authentication Kerberos.

Kerberos Misc.

Model based on Needham and Schroeder key distribution protocol

Encryption done with DES Extendable to DES Cypher Block Chaining

Database Contains one record/principal Record contains name, private key,

expiration date of principal Name- name.instance@realm

Page 27: VKSF 423 System Administration III Authentication Kerberos.

Kerberos

Ticket Used to securely pass the identity of the

person to whom the ticket was issued between the authentication server and the end server.

Authenticator Contains additional information which when

compared against the ticket proves that the client presenting the ticket is the same one to which the ticket was issued.

Page 28: VKSF 423 System Administration III Authentication Kerberos.

Kerberos

Keeps database of clients and private keys If client is user, key is encrypted

password Generates temporary private keys

(session keys) Session keys are given to two clients

to encrypt messages between them.

Page 29: VKSF 423 System Administration III Authentication Kerberos.

Kerberos Ticket

Ticket is good for a single server and a single client Contains name of the server Name of the client IP address of the client Timestamp Lifetime Random session key

Encrypted using the private key of the server for which the ticket will be used

May be used until lifetime expires

Page 30: VKSF 423 System Administration III Authentication Kerberos.

Kerberos Authenticator

Contains Name of the client Client’s IP address Client’s current time

Can only be used once, must be regenerated each time a client wants to use a service

Can be regenerated by the client (without going to the server)

Encrypted in the session key that is part of the ticket

Page 31: VKSF 423 System Administration III Authentication Kerberos.

Enhanced protocol: Kerberos

Bob asks K-server to access Mary’s server K-server checks to see if Bob has access

permissions K-server sends Bob a ticket and a

session key Bob uses session key to create an

authenticator to prove to Mary he is Bob Bob send ticket and authenticator to

Mary Mary checks both

Page 32: VKSF 423 System Administration III Authentication Kerberos.

Main Problem

Authentication of user or device given zero prior information

Does Kerberos do this?


Recommended