Network Security Lecture 5b - 103426
Network Security Lecture 5b - 103426
Network Security Lecture 5b - 103426
SECURITY
KERBEROS AUTHENTICATION AND AUTHORIZATION PROTOCOL
KERBEROS AUTHENTICATION AND AUTHORIZATION PROTOCOL
What is Kerberos?
• Kerberos is a protocol for authenticating service requests between trusted hosts
across an untrusted network, such as the internet.
• Kerberos support is built on to all major computer operating systems, including Microsoft
Windows, Apple macOS, FreeBSD and Linux.
• The name was taken from Greek mythology; Kerberos (Cerberus) was a three-headed
dog who guarded the gates of Hades.
• The three heads of the Kerberos protocol represent the following:
KERBEROS AUTHENTICATION AND AUTHORIZATION PROTOCOL
• KDC "tickets" provide mutual authentication, allowing nodes to prove their identity
to one another in a secure manner.
• Kerberos authentication uses conventional shared secret cryptography to prevent
packets traveling across the network from being read or changed.
• It also protects messages from eavesdropping and replay attacks.
• What does the Kerberos authentication protocol do?
• The original objective of Kerberos was to provide a way for users of the MIT network to
securely authenticate themselves to the systems they needed to use.
• It also enabled those users to be authorized to access those systems.
KERBEROS AUTHENTICATION AND AUTHORIZATION PROTOCOL
• At that time, networked systems typically authenticated users with a user ID and
password combination.
• Systems routinely transmitted passwords "in the clear," meaning unencrypted.
• Attackers with access to the network could easily eavesdrop on network transmissions,
intercept user IDs and passwords, and then attempt to access systems for which they were
not authorized.
• Kerberos developers set out to provide a network authentication protocol that could be
used to authenticate trusted hosts communicating over untrusted networks.
• In particular, they intended to provide system administrators a mechanism for
authenticating access to systems over an open network -- the internet.
KERBEROS AUTHENTICATION AND AUTHORIZATION PROTOCOL
• For example, application servers can include file and print services, terminal emulation,
remote computing and email.
• Kerberos Key Distribution Center - KDC. The Kerberos authentication process depends
on the following KDC components:
• Kerberos database. This maintains a record for each principal in the realm. This is the
centralized repository for Kerberos authentication information. It includes identifying
information of the principal and the systems and services for which that principal can be
authenticated to use.
• Kerberos authentication service. Network clients use this Kerberos service to authenticate
themselves to get a ticket granting ticket (TGT), also known as an authentication ticket.
• Kerberos ticket granting service. This Kerberos service accepts the TGT so that clients can
access their application servers.
KERBEROS AUTHENTICATION AND AUTHORIZATION PROTOCOL
• The service ticket sent by the TGS enables the client to access the service.
• The service ticket is timestamped, so a single ticket can be used for a specific period
without having to be re-authenticated.
• KERBEROS - IN PRACTICE
• Currently we have two Kerberos versions:
• Kerberos Version 4 and version 5
• Kerberos v5 is an Internet standard
KERBEROS AUTHENTICATION AND
AUTHORIZATION PROTOCOL
• To use Kerberos:
• There is need to have a KDC on your network
• You also need to have Kerberised applications running on all participating systems
• major problem - US export restrictions
• A Kerberos realm is a set of managed nodes that share the same Kerberos database.
• Kerberos: Version 4 – Inter-realm Services is shown on the next slide
KERBEROS AUTHENTICATION AND
AUTHORIZATION PROTOCOL